Securing WLAN connections through regular generation, rotation and synchronization of encryption keys based on policies defined by security administrators. Enforcing security by defining access zones and restricting network access to authorized users. . . .
Securing WLAN connections through regular generation, rotation and synchronization of encryption keys based on policies defined by security administrators. Enforcing security by defining access zones and restricting network access to authorized users. Managing the quality and performance of the WLANs by automatically allocating channels and balancing the number of connections at each access point and through event management.

IT managers can, through WSM, see where the physical limits of the wireless enterprise are and limit access to the network within defined boundaries. They can also limit access by each user to certain times of the day.

The link for this article located at FCW is no longer available.