Gartner Blog Network

WiFi Security Update

by John Pescatore  |  March 1, 2010  |  Submit a Comment

John Girard and I are starting the process to update the Gartner WLAN Intrusion Prevention System MarketScope. Last year we commented:

The built-in security capabilities of WLANs have improved and stabilized with Wi-Fi Protected Access 2 (WPA2) Enterprise, but compromises of WLANs are still an all too frequent occurrence. Reasons for compromise include continued use of legacy equipment, weak security protocol choices, intentionally unencrypted guest networks and public hot spots, and configuration mistakes.

In the past year we’ve seen that trend continue – the biggest risks are no longer rogue access points, it is misconfigured managed access points and risks of managed laptops using public WiFi hotspots. Another growing issue has been the risks of emerging forms of wireless – cellular data “air cards” and emerging 4G metropolitan wireless access technologies – when laptops with those technologies come back to the corporate network and essentially bridge from the internal network to the Internet.

As part of a cloud security spotlight note coming in early 2Q 2010, Kelly Kavanagh and I will be updating Gartner’s security as a service predictions, and one area we will pay close attention to will be security services built into to the wireless cloud. Definite increases there, both in filtering services and in managed WiFi security monitoring services. The later is in increasing demand because of Payment Card Industry (PCI) requirements.

See you at the RSA show!


John Pescatore
VP Distinguished Analyst
11 years at Gartner
32 years IT industry

John Pescatore is a vice president and research fellow in Gartner Research. Mr. Pescatore has 32 years of experience in computer, network and information security. Prior to joining Gartner, Mr. Pescatore was senior consultant for Entrust Technologies and Trusted Information Systems… Read Full Bio

Leave a Reply

Your email address will not be published. Required fields are marked *

Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes, with attribution to Gartner. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.