Wednesday, March 18, 2015 by
Though using IEEE 802.1X is the most secure approach to Wi-Fi
authentication, this method is typically only implemented for
devices managed by IT staff - where they have control
over the domain infrastructure, user accounts, and wireless clients
For BYOD, contractors, or guests, the IT...
Tuesday, March 17, 2015 by
With the ever-increasing demand for mobility, and wireless
rapidly replacing Ethernet as the primary access method onto the
network, organizations are cautious of the security challenges that
This is especially
true given the demand for access from a growing number of guest and
Monday, February 23, 2015 by
In my last post, How Aerohive ID Manager and PPSK securely manage
I discussed the need for visibility over
employee-owned devices that are for both personal and business
purposes, and how Aerohive's ID Manager
helps organizations address this
In this blog, we are taking a look at four...
Wednesday, February 4, 2015 by
As mobility continues to evolve and expand, business
transformation is really just starting. Many organizations are
having trouble blending new mobile and adaptive technology with the legacy systems that have been in place
for many years. In many cases employees are now moving faster than
Wednesday, April 16, 2014 by
What if the AP in your high school gym went missing? Or someone
tampered with the AP in the back of your clothing store? Or a
hacker paid a visit to his grandmother in her long term care
facility and was able to access the building's Wi-Fi network?
is always a major concern to...
Friday, August 3, 2012 by
Last week at Defcon 20, Moxie Marlinspike released chapcrack,
a tool that implements a new attack against
. It was widely reported as an attack on
WPA2-Enterprise, but it’s not. In fact, from a Wi-Fi perspective,
there’s nothing to see here.There’s been a great deal of coverage of the...
Friday, January 20, 2012 by
In the world of cool Wi-Fi features, Aerohive's Private
is one that should get so much more airtime
(haha, pun intended) but instead often ends up as one more awesome
feature mentioned in passing.The fact that our engineering team was able to provide a
Tuesday, January 10, 2012 by
Last week, my original
on the Wi-Fi Protected Setup (WPS) brute-force attack
promised a follow-up. In the meantime, I appeared as a guest on
episode 2 of the No Strings
podcast with Dan Cybulskie
and Andrew vonNagy
.In some of the discussions I’ve had since then, it appears that...
Friday, January 6, 2012 by
One of the Wi-Fi industry’s greatest accomplishments is the way
that security went from being a major topic of interest ten years
ago to a quality that is accepted as an inherent part of Wi-Fi.
Wi-Fi Protected Access (WPA) had a great deal to do with that sea
of change in my opinion.The upshot of...
Thursday, September 1, 2011 by
In July, Aerohive announced a new addition to our line-up of
wireless access points
: the 3-spatial stream HiveAP 330
. Although there is a lot to like about them, today I want
to dig down further into the radio card design that Devin first
touched on in his post...