Search Now

Wi-Fi Security »

How PPSK keeps your network and private information safe

Though using IEEE 802.1X is the most secure approach to Wi-Fi authentication, this method is typically only implemented for devices managed by IT staff - where they have control over the domain infrastructure, user accounts, and wireless clients being used. For BYOD, contractors, or guests, the IT...

How to enable mobility while protecting your WLAN

With the ever-increasing demand for mobility, and wireless rapidly replacing Ethernet as the primary access method onto the network, organizations are cautious of the security challenges that lie ahead. This is especially true given the demand for access from a growing number of guest and BYO-...

When should you use ID Manager in your wireless LAN?

In my last post, How Aerohive ID Manager and PPSK securely manage BYOD, I discussed the need for visibility over employee-owned devices that are for both personal and business purposes, and how Aerohive's ID Manager helps organizations address this issue. In this blog, we are taking a look at four...

How Aerohive ID Manager and PPSK securely manage BYOD

As mobility continues to evolve and expand, business transformation is really just starting. Many organizations are having trouble blending new mobile and adaptive technology with the legacy systems that have been in place for many years. In many cases employees are now moving faster than IT and...

Is your Wi-Fi Access Point secure?

What if the AP in your high school gym went missing? Or someone tampered with the AP in the back of your clothing store? Or a hacker paid a visit to his grandmother in her long term care facility and was able to access the building's Wi-Fi network? Wi-Fi security is always a major concern to...

This really CHAPs my hide

Last week at Defcon 20, Moxie Marlinspike released chapcrack, a tool that implements a new attack against MS-CHAPv2. It was widely reported as an attack on WPA2-Enterprise, but it’s not. In fact, from a Wi-Fi perspective, there’s nothing to see here.There’s been a great deal of coverage of the...

Private Pre-Shared Key to the Future!

In the world of cool Wi-Fi features, Aerohive's Private Pre-Shared Key is one that should get so much more airtime (haha, pun intended) but instead often ends up as one more awesome Aerohive feature mentioned in passing.The fact that our engineering team was able to provide a highly-secure,...

Details of the Wi-Fi Protected Setup brute-force attack and mitigation steps

Last week, my original post on the Wi-Fi Protected Setup (WPS) brute-force attack promised a follow-up. In the meantime, I appeared as a guest on episode 2 of the No Strings Attached podcast with Dan Cybulskie and Andrew vonNagy.In some of the discussions I’ve had since then, it appears that...

What you need to know about the Wi-Fi Protected Setup attack

One of the Wi-Fi industry’s greatest accomplishments is the way that security went from being a major topic of interest ten years ago to a quality that is accepted as an inherent part of Wi-Fi. Wi-Fi Protected Access (WPA) had a great deal to do with that sea of change in my opinion.The upshot of...

How to meet the iPad demand for a scad of Wi-Fi signal strength

In July, Aerohive announced a new addition to our line-up of enterprise 802.11n wireless access points: the 3-spatial stream HiveAP 330 and HiveAP 350. Although there is a lot to like about them, today I want to dig down further into the radio card design that Devin first touched on in his post...