John Girard and I are starting the process to update the Gartner WLAN Intrusion Prevention System MarketScope. Last year we commented:
The built-in security capabilities of WLANs have improved and stabilized with Wi-Fi Protected Access 2 (WPA2) Enterprise, but compromises of WLANs are still an all too frequent occurrence. Reasons for compromise include continued use of legacy equipment, weak security protocol choices, intentionally unencrypted guest networks and public hot spots, and configuration mistakes.
In the past year we’ve seen that trend continue – the biggest risks are no longer rogue access points, it is misconfigured managed access points and risks of managed laptops using public WiFi hotspots. Another growing issue has been the risks of emerging forms of wireless – cellular data “air cards” and emerging 4G metropolitan wireless access technologies – when laptops with those technologies come back to the corporate network and essentially bridge from the internal network to the Internet.
As part of a cloud security spotlight note coming in early 2Q 2010, Kelly Kavanagh and I will be updating Gartner’s security as a service predictions, and one area we will pay close attention to will be security services built into to the wireless cloud. Definite increases there, both in filtering services and in managed WiFi security monitoring services. The later is in increasing demand because of Payment Card Industry (PCI) requirements.
See you at the RSA show!
Read Complimentary Relevant Research
Top Strategic Predictions for 2019 and Beyond: Practicality Exists Within Instability
Technology-based change is happening continuously, and most organizations struggle to see the change in advance. Continuous change can...
View Relevant Webinars
Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes, with attribution to Gartner. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.