Featured Story
A Nokia sale of mobile, especially to the US, would be nuts
Nokia's hiring of Intel's Justin Hotard to be its new CEO has set tongues wagging again about a mobile exit, but it would look counterintuitive and inadvisable.
Cranite releases its Layer 2 wireless security software solution to support virtual LANs
February 1, 2005
SAN JOSE, Calif. -- Cranite Systems, Inc., a leading provider of security software for wireless local area networks (WLANs), today introduced version 4.0 of its award-winning flagship software, WirelessWall. New features include support for virtual local area networks (VLANs), integration with AirMagnet intrusion detection systems, directory caching, RADIUS failover and easier installation and configuration than ever before.
WirelessWall 4.0 is the first Layer 2 software-only security solution to provide support for VLANs, which are created by grouping together physically connected ports. Customers can use existing VLAN trunks, create flexible VLAN configurations and run multiple subnets on the same infrastructure. VLANs can be treated as separate networks, making it easier for network administrators to manage and secure traffic.
Integration with the AirMagnet intrusion detection system allows customers to review AirMagnet security events in the WirelessWall graphical user interface (GUI), which provides a more complete view of network information.
With the new directory caching feature, WirelessWall 4.0 maintains security and authentication capabilities even during directory server failures, providing significantly higher uptime for the wireless network. The RADIUS failover mechanism maintains authentication services, ensuring that network access is granted only to those with the proper credentials.
"Government organizations and enterprises that are deploying wireless networks understand that security concerns extend beyond the physical walls of the building," said John Vigouroux, chairman and CEO, Cranite Systems, Inc. "With WirelessWall 4.0, network administrators can more easily manage and secure network traffic in more ways than ever before. Security officers can rest assured that security and authentication will be maintained, even if the network goes down."
Cranite Systems Inc.
You May Also Like