Wireless Site Management
May 10, 2005
$15,000 per Manager, including a 100 user agent pack; additional agents are $1,500 per 100 user pack
- Ease of Use:
- Value for Money:
- Overall Rating:
This is a feature-rich, high performance product.
Spotty support and a bit pricey.
As you would expect from Computer Associates this is a high-end management suite with great visualisation tools.
Computer Associates' Wireless Site Management 4.0 is a fully featured WLAN security and management suite. The software is mainly aimed at larger organizations, but it could be implemented for any company running a wireless network.
The requirements for the software are not hefty. The software can be installed on any professional-level Microsoft operating system, including Windows XP Pro. However, the software does require Microsoft SQL Server 7.0 or 2000 to be installed.
The installation was a bit confusing, but only because our SQL server was not correctly configured. After fixing the problems with MS SQL server, the software installed without any more problems.
Use of the software after installation was easy with the included documentation, although the documentation on the installation could have been better.
Online documentation was lacking, but 24-hour phone support is available.
What the interface lacks in visual quality it makes up for in features. After access point detection, the software will provide a visual location layout. This makes it easy to locate rogue devices and access points on the network. These access zones also allow administrators to enforce location-based access to wireless users.
Not only does the software recognize rogue devices and access points, it will allow administrators to control security settings on one or all of the access points. The different security schemes available are Classic WEP, Advanced WEP, 802.1X, and two WPA modes.
WSM takes over the task of managing WEP keys – the software generates, distributes and rotates keys around the WLAN according to central policies.
Also, MAC address access control lists can be configured as well as the user name and password for the access point itself.
Overall, after the system is in place, it can be used to completely secure a WLAN as well as manage the wireless traffic with load balancing.
WSM would be a great addition to any large network running wireless, especially if it already has CA management suite components.
SC Webcasts UK
Information Security Manager
Infosec People - Hammersmith, West London
Junior Penetration Tester, Hertfordshire, to £35k + benefits
Infosec People - England, Hertfordshire
Cyber Security Architect
CYBER EXECS - London (Greater)
SOC Analyst, Aldershot, £47-56k + package
Infosec People - Hampshire, England, Aldershot
Senior Security Engineer
Loveworklife Recruitment - United Kingdom
Sign up to our newsletters
SC Magazine UK Articles
- Tesco Bank allegedly ignored warnings of hack from Visa
- Investigatory Powers and Digital Economy Bills could threaten economy
- Updated: A million German routers knocked offline by failed Mirai botnet attack
- Gooligan ad fraud malware infects 1.3M Android users, installs over 2M unwanted apps
- Microsoft update left Azure Linux virtual machines open to hacking
- SC Awards Europe 2016 winners announcements!
- ISIS radicalises 'lone wolves' through strong social media presence
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- ICYMI: CEO Sacked; MS Zero-day; Passwords dropped; Ransomware wild, charging hack
- 9.2 million medical records for sale on darkweb
- ICYMI: Tesco warned; IP Bill threatens economy; German routers offline; Azure trojan; Gooligan fraud
- Data centres are on the move - where will they end up?
- 90% of ITDMs believe IAM is crucial to digital transformation success
- Research: Hacked companies could see customer exodus if breached
- Misconfigured drive exposes locations of explosives used by oil industry