• Should we let iPhones in? Security, iPhone and the Enterprise

    Attempting to assess the pros/cons of using Blackberry vs ActiveSync (specifically iPhone) for remote access to email, calendar and contacts, as well as WAP-enabled access to internal information systems and databases. We are a Healthcare organization running Exchange 2007. Security is a concern...

    ResearchAssistant855 pointsBadges:
  • nETGEAR SECURITY

    I am new to Netgear. How do I make my Netgear secured? Right now it shows unsecured. I would like to change to secured. Thanks

    Mustangsally5 pointsBadges:
  • Blocking spyware and inappropriate sites

    Can we monitor and filter our wireless network? Are there free tools for this? We want to block porn and spyware sites.

    Troubleshooter24755 pointsBadges:
  • How fast and secured is Wi-Fi?

    How secured is Wi-Fi as compared to Wired Network? What are its Pros and Cons?

    Jaideep Khanduja9,160 pointsBadges:
  • Disabling wireless internet at specific times

    Is there a method for disabling wireless internet from our routers at a specified time every day? When the offices close the wifi closes as well. We have seen some horrible traffic from late nights presumably from the parking lot.

    Troubleshooter24755 pointsBadges:
  • Assigning wireless encryption

    What methods of assigning wireless encryption codes to our users do we have? I want the process to be automated where they connect to the network and see a web page where they can log in and retrieve their codes. What options do I have?

    TeachMeIT975 pointsBadges:
  • Authentication against Active Directory

    How can I only allow employees to connect to our WiFi? Is there a method of authentication against active directory? Is there a guide on setting this up?

    NewnanIT1,110 pointsBadges:
  • Checking networks for flaws and defects

    Is there security testing equipment that will check my wireless and wired network for flaws or defects that would allow it to be taken over or infiltrated?

    NewnanIT1,110 pointsBadges:
  • Data encryption best practices

    What is the best practice for data encryption? We use wifi and sometimes connect to unsecured networks. How can we use free encryption technology to keep our data safe from prying eyes? Even if someone gets our data I want it to be useless.

    ITKE346,360 pointsBadges:
  • TZ 100 Hang, ping with no response and vpn drop and reconnect

    TZ 100 is keep working but there is no response through http management. Firmware 5521 and 5520 have used but no improvemenet. VPN drops and reconnect all the times. I have adjusted the TCP/IP timeout to 60 Seconds. Unfortunately, it is useless.

    Atracc5 pointsBadges:
  • Blocking cell phone activity or wireless broadband cards from within our server room

    Is it possible to block cell phone activity or wireless broadband cards from being able to function within our server room to prevent data theft? Is there a way to capture what they are trying to send? Can I have activity set off an alarm?

    ITKE346,360 pointsBadges:
  • Blocking unsecured networks

    When I am scanning for wireless networks in my companies head quarters we see all sorts of unsecured outside networks. How can we prevent them from showing up and infiltrating our offices?

    ITKE346,360 pointsBadges:
  • Can I connect to a server over Bluetooth?

    I have a laptop that has Bluetooth and wifi. My server also has Bluetooth. Can I connect to the server using Bluetooth? Is it more secure than over wifi? Will I be able to open a telnet or mstsc session over Bluetooth or just transfer files?

    ITKE346,360 pointsBadges:
  • Disabling wifi capabilities in corporate desktops

    Our latest shipment of corporate desktops have wifi. We want the machines only to be able to connect with a wired connection and only via dhcp. Can I do this via group policy and force these options? I want to make sure no one can change the settings manually.

    ITKE346,360 pointsBadges:
  • Wireless security on Belkin 54g router

    What is the most secure form of wireless security that I can apply from my Belkin 54g router? I want to protect my data on my network as well as make sure no one else is able to access my line.

    ITKE346,360 pointsBadges:
  • Connecting to VPN over an unsecured network

    When connecting to a remote VPN over an unsecured network am I putting the VPN server at risk when transmitting credentials? What is the preferred method of connecting to VPN over unsecured network?

    MelanieYarbrough6,345 pointsBadges:
  • Setting up wireless network at a remote office

    When setting up my wireless network at a remote office what steps should I take to make sure it is secure and no one else can access the routers web console and change port forwarding and firewall rules? Is there a check list somewhere?

    ITKE346,360 pointsBadges:
  • AP-5131 WAP RADIUS Configuration?

    I am in the process of helping my boss apply some basic security to our current WLAN. The company has not applied security to this point since the information we have is not really that confidential and we are in a cynder block building which kills most of the signal before it even leaves the...

    erin0201215 pointsBadges:
  • Simple solutions for tracking Wi-Fi networks in an office environment?

    Hi all, I'm looking for ways to keep WiFi access under control in our office. We have a Panera and a other few open hotspots around us, and I just wanted to monitor what was out there and help keep everyone on the right networks. I've heard some people used Back Track LiveCD, but wondering what...

    ITKE346,360 pointsBadges:
  • Security of MAC-based wireless access permissions

    A colleague and I were recently debating whether it's an OK policy to allow wireless access based on users MAC addresses. He has a small office where most people are wired, but a few are wireless and are part of that notorious gang that can't be bothered with passwords. He also said that basing...

    ITKE346,360 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following