O'Reilly logo

Enterprise Security: A Data-Centric Approach to Securing the Enterprise by Aaron Woody

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Wireless segmentation

Implementing a wireless network within the enterprise can provide a high degree of mobility for enterprise users allowing access to enterprise assets no matter where they are located on the campus. The access to critical infrastructure should be properly segmented to ensure the security of the assets from unauthorized access that may be successful via a weak wireless security implementation. In environments with a securely implemented wireless infrastructure, it is recommended to also segment the networks with an intelligent firewall to detect and mitigate attacks over the wireless network. Some compliance standards such as the Payment Card Industry Data Security Standard (PCI DSS) mandate a segmentation of the wireless network ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required