article thumbnail

KRACK Kills

Akins IT

Its important to understand how this large scale wireless encryption exploit operates and how you can take preventative measures to protect your network from the KRACK exploit and future security compromises to come. WPA and WPA2, an otherwise ubiquitous wireless encryption standard was at the center of the exploit. What Can I Do?

article thumbnail

Channel partner spotlight: Sciens

Kentik

Wireless security: Rogue access point detection and blocking. VPN construction - We build your network across the internet and provide enhanced corporate security with data encryption and QoS delivery solutions. Consulting on network diagnostics, problem-finding and improvement. Converging customer needs. Network planning.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Four Questions For Life After MPLS

CATO Networks

Security – What do you need to secure the Internet access points at each of your offices? So we created a secured Internet access point for the company, backhauled Internet-bound traffic from offices across the WAN to that Internet hub, and minimized the need for branch security.

MPLS 52
article thumbnail

How Secure is Your SD-WAN?

CATO Networks

Any SD-WAN should build a virtual overlay of encrypted tunnels between locations. The SD-WAN make configuring this mesh of tunnels simple, managing the encryption keys, creating the tunnels, and automating their full mesh setup. Traditional WANs overcome the problem by centralizing security appliances at a datacenter or regional hub.

WAN 52
article thumbnail

Cato Research Decrypts the News Behind February Security Events

CATO Networks

Hacked RSA rogue access points not a serious threat News that multiple access points were hacked at last months RSA security show grabbed headlines. As mitigation, organizations were encouraged to disable the feature that caused this bug. See our post for more information.

SMB 52
article thumbnail

What is Network Visibility?

CATO Networks

Further, because they can obscure the data from network sensors, Network Address Translation (NAT) and encryption reduce the usefulness of the sensors and can stifle packet inspection efforts. This approach creates significant impact on performance, making it unattractive to most enterprises.

Network 52
article thumbnail

MPLS, VPN Internet Access, Cloud Networking or SD-WAN? Choose Wisely

CATO Networks

Cloud and SaaS traffic must be first brought from the branch to a secured Internet access point at central location. As such, traditional MPLS architecture find it difficult to offer low latency/high performance access to cloud and SaaS applications and services. SD-WAN directs WAN traffic across encrypted Internet tunnels.

MPLS 52