New Automated 802.11 Wireless Security Software From Code Red Systems
A limited free download of the AirBlock 802.11 wireless security software for residential and small business networks has been made available by Code Red Systems, a provider of wireless security solutions.
The AirBlock software-only solution enhances wireless security by implementing key rollover on new and legacy 802.11 equipment. This Beta version automatically configures both wireless cards and access points to operate securely, accepting encrypted data only.
The software overcomes known security weaknesses by automatically changing encryption keys every 10 minutes. Not only does this ensure user privacy, but also prevents unauthorized access to wireless broadband Internet connections.
While most 802.11 security solutions require dedicated servers or hardware upgrades, AirBlock is a user-friendly software-only solution, which can be easily installed by even the most novice user. The Beta version currently available is compatible with approximately 50 leading wireless cards and the most popular access points of leading vendors such as Cisco, Linksys, Netgear and Proxim.
AirBlock is currently being tested by equipment vendors, chip makers, broadband Internet providers and security software companies in the US, Europe and Israel. It is anticipated that it will be available commercially during the first quarter of 2004.
The download will be free for a limited time only, until a more robust commercial version is ready for release. The AirBlock software can be found here as well as selected download sites.
Wireless related book reviews at Help Net Security include:
+ Installing, Troubleshooting, and Repairing Wireless Networks
+ Building Secure Wireless Networks with 802.11
+ How Secure is Your Wireless Network? Safeguarding Your Wi-Fi LAN
+ Wireless Security End to End
+ The Complete Wireless Internet and Mobile Business Programming Training Course
+ Deploying License-Free Wireless Wide-Area Networks
+ Maximum Wireless Security
+ Wireless Security and Privacy: Best Practices and Design Techniques