New User? Need help? Click here to register for free! Registering removes the advertisements.

Computer Cops
image image image image image image image image
Donations
If you found this site helpful, please donate to help keep it online
Don't want to use PayPal? Try our physical address
image
Prime Choice
· Head Lines
· Advisories (All)
· Dnld of the Week!
· CCSP News Ltrs
· Find a Cure!

· Ian T's (AR 23)
· Marcia's (CO8)
· Bill G's (CO11)
· Paul's (AR 5)
· Robin's (AR 2)

· Ian T's Archive
· Marcia's Archive
· Bill G's Archive
· Paul's Archive
· Robin's Archive
image
Security Central
· Home
· Wireless
· Bookmarks
· CLSID
· Columbia
· Community
· Downloads
· Encyclopedia
· Feedback (send)
· Forums
· Gallery
· Giveaways
· HijackThis
· Journal
· Members List
· My Downloads
· PremChat
· Premium
· Private Messages
· Proxomitron
· Quizz
· RegChat
· Reviews
· Google Search
· Sections
· Software
· Statistics
· Stories Archive
· Submit News
· Surveys
· Top
· Topics
· Web Links
· Your Account
image
CCSP Toolkit
· Email Virus Scan
· UDP Port Scanner
· TCP Port Scanner
· Trojan TCP Scan
· Reveal Your IP
· Algorithms
· Whois
· nmap port scanner
· IPs Banned [?]
image
Survey
How much can you give to keep Computer Cops online?

$10 up to $25 per year?
$25 up to $50 per year?
$10 up to $25 per month?
$25 up to $50 per month?
More than $50 per year?
More than $50 per month?
One time only?
Other (please comment)



Results
Polls

Votes: 990
Comments: 20
image
Translate
English German French
Italian Portuguese Spanish
Chinese Greek Russian
image
image wireless: Security HeadLines: IBM Tightens Up WLAN Security image
Wireless
IBM Tightens Up WLAN Security
By Dennis Fisher

NEW YORK—IBM on Wednesday announced a wireless LAN security solution that combines some new technology with a set of services from the company's consulting division.

The announcement signals an increased interest in the wireless security market from IBM, which has until now focused most of its security efforts on the PC and network segments. But the solution isn't a complete departure for IBM. The wireless intrusion detection system (IDS) utilizes the company's strength in access control and identity management for the wireless world, where such technologies have been all but ignored to this point.

IBM executives said the solution underscores their belief that wireless networks need not be inherently less secure than the wired infrastructure.

I think they can be just as secure as wired networks. It takes some education and some better technology to do it, said Arvind Krishna, vice president of security products for the Tivoli division of IBM, based in Armonk, N.Y.

The main function of the new solution is to detect a variety of attacks—including man-in-the-middle attacks, denial-of-service, address spoofing and encryption breaches—against both wireless access points and wireless-enabled laptops and other client devices. The system utilizes a new sniffing technology from IBM Research running on Linux-based sensors to identify attacks and other types of misuse.

Check out eWEEK.com's Security Center for security news, views and analysis.

The IDS system can also identify rogue access points as well as access points that don't conform to the customer's security policy. All of this information is monitored by analysts at an IBM facility, who generate reports, look for attack trends and help customers respond to attacks. The round-the-clock monitoring is a feature unique to the IBM solution, and one that has proven valuable in recent years in the traditional world of wired networks.

Another aspect of the solution, announced at an IBM security event here, is a service known as Wi-Dog that protects the IDS sensors against physical tampering.

IBM's solution is similar in function and scope to others already on the market, most notably products from Air Defense Inc., which also makes a WLAN intrusion detection system. However, unlike most of the other products, the IBM solution will be delivered strictly as a managed service from the company's Global Services consulting group.

The solution is available now.

eWeek
Posted on Friday, 10 October 2003 @ 04:45:00 EDT by phoenix22
image

 
Login
Nickname

Password

· New User? ·
Click here to create a registered account.
image
Related Links
· TrackBack (0)
· Linux.com
· IBM
· SuSE
· HotScripts
· W3 Consortium
· More about Wireless
· News by phoenix22


Most read story about Wireless:
First Ever GSM Cellphone Exploit

image
Article Rating
Average Score: 0
Votes: 0

Please take a second and vote for this article:

Bad
Regular
Good
Very Good
Excellent


image
Options

Printer Friendly Page  Printer Friendly Page

image
"Login" | Login/Create an Account | 0 comments
Threshold
The comments are owned by the poster. We aren't responsible for their content.

No Comments Allowed for Anonymous, please register