Gartner Research

Wireless LAN Intrusion Detection Systems: Something's in the "Air"

Published: 10 November 2005

ID: G00203149

Analyst(s): Diana Kelley

Summary

Enterprise wireless local area networks (WLANs) are a reality. Much has been written about the security threats associated with deployment of WLANs. Many organizations mitigate some of these risks using access authentication and encryption technologies such as virtual private networks (VPNs), Wi-Fi Protected Access (WPA), and WPA2 with 802.1x. In addition to these measures, a class of tools is available to help companies manage and monitor security traffic on the WLAN to increase their overall network security stance.

Table Of Contents

Synopsis

Analysis

  • Protecting the WLAN
  • The Business Case
  • Do Enterprises Need WIDS?
  • Market Impact
    • Market Dynamics
    • Vendor Taxonomy
  • Customer Perspectives
    • Overlay or Integrate?
    • Prevention vs. Detection and Containment Considerations
    • Sensor Placement/Sensor Management
  • Recommendations
    • Assessing WIDS Readiness

The Details

  • How WLANs Work
  • How WIDS Works
    • Correlation and Analysis
    • Example Architectures
  • What WIDS Can't Do
  • Leveraging WIDS
    • Tuning
    • Consoles and Dashboards
    • Location/Triangulation
    • Scalability
    • Containment—Illegal or Advised?
  • Example Vendor Checklist
  • The Vendors
    • AirDefense
    • AirMagnet
    • AirTight
    • Bluesocket
    • Highwall Technologies
    • Network Chemistry
    • Newbury Networks
    • Red-M
    • VigilantMinds

Conclusion

Related Research and Recommended

©2020 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. and its affiliates. This publication may not be reproduced or distributed in any form without Gartner’s prior written permission. It consists of the opinions of Gartner’s research organization, which should not be construed as statements of fact. While the information contained in this publication has been obtained from sources believed to be reliable, Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartner research may address legal and financial issues, Gartner does not provide legal or investment advice and its research should not be construed or used as such. Your access and use of this publication are governed by Gartner’s Usage Policy. Gartner prides itself on its reputation for independence and objectivity. Its research is produced independently by its research organization without input or influence from any third party. For further information, see Guiding Principles on Independence and Objectivity.

Already have a Gartner Account?

Become a client

Learn how to access this content as a Gartner client.