The SecurEdge Blog

Helping businesses provide secure WiFi by sharing insights into WiFi design, network security, installation, and troubleshooting. You've got questions, we have answers.

Topic: Network Security

The Lack of BYOD Security Policies: What's Happening and What Businesses Can Do
Security

The Lack of BYOD Security Policies: What's Happening and What Businesses Can Do

BYOD isn't a new concept, so why do so many enterprise wireless networks lack the necessary security policies to safely support it? A recent survey conducted by Champion Solutions Group, found that out of 447 businesses that both varied in size and vertical market, over one-half of them didn't have a formal BYOD policy and over a quarter admitted they do not have a proper security approach to supporting BYOD. This is rather concerning considering it's expected that one out of every two businesses will not be able to provide devices to their employees by 2017.

Read More
5 Major Cybersecurity Trends You Should be Prepared for in 2016
Security

5 Major Cybersecurity Trends You Should be Prepared for in 2016

With every new year comes new technologies, but that new tech also means new security threats. How prepared is your business's network for new cybersecurity threats in 2016? In 2015, IBM and the Ponemon Institute determined the average cost of a data breach to be $3.79 million. We saw plenty of major companies find themselves vulnerable to hackers and data breaches throughout last year, and as data grows, so will the threats.

Read More
4 Smart Ways To Secure Guest Wireless Access To Your Business Network
Security

4 Smart Ways To Secure Guest Wireless Access To Your Business Network

Many businesses today are scrambling to support the increasing demand for safer and faster guest wireless access to their networks. Wifi users today expect a certain level of access, you can't just throw up some access points anymore and call it a day, you need to deliver an experience to your users that enables mobility and security for both them and your organization.

Read More
4 Things Your Next-Generation Firewall Should Do For You
Security

4 Things Your Next-Generation Firewall Should Do For You

In the olden days, the line between network security and business contingency fell on two basic choices — either block everything in the interest of network security, or enable everything in the interest of your business; and these choices left little room for compromise. Nowadays, the options have grown considerably, however, these new choices have also brought with them an array of more sophisticated, advanced threats that evade even traditional security mechanisms.

Read More
How to Plan for Mobility Without Sacrificing Your WLAN's Security
Mobility

How to Plan for Mobility Without Sacrificing Your WLAN's Security

Let’s face it; whether we’re at home, at work, in school or just out shopping, we’re always connected. Everywhere we go we demand it, in many cases expect it. Over the last 7 -10 years the explosion of mobile devices and applications has changed how we’re accessing our networks. What used to be primarily Ethernet is being replaced by wireless or (mobility).

Read More
3 Ways to Use NAC to Support Your School Wireless Network Strategy
Security

3 Ways to Use NAC to Support Your School Wireless Network Strategy

Many teachers worry about the same thing, how do they securely use new mobile technology in the classroom? I come from a long line of teachers. My mother was a teacher, my sister is a teacher, and even both of my sister-in-laws are teachers. As they sit around and gab about how times have changed, a reoccurring theme arises; technology. “Technology” is the new buzz word in schools. It is seemingly as common of a word as “vanilla lattes” ordered at Starbucks; ever present and ever growing. Whether they fear the rise of technology in the classroom or not, they know it is going to be implemented sooner rather than later. Yet, they all worry about the same things, how will they securely allow students to roam the web in class? How will they and their schools adhere to the CIPA regulations put in place?

Read More
8 Ways to Protect your Network with a Next Generation Firewall
Security

8 Ways to Protect your Network with a Next Generation Firewall

So, you are planning your next adventure to a far away land. You’re scanning through your tablet’s browser looking for cheap flights to your desired destination. While downloading the best mobile travel applications, you are also texting your travel companion with thumbs spinning so fast, you start kicking up more dust than the jeep you will be driving in on that safari.

Read More
11 Features to Look for in Your Next Generation Firewall
Security

11 Features to Look for in Your Next Generation Firewall

In our dealings with technology leaders at schools, universities and hospitals there are many different opinions as to how they would each go about solving an IT problem or challenge. Those who are successful at solving issues like BYOD, 1:1, web filtering or the simple lack of available bandwidth do have one thing in common: A need for updated infrastructure.

Read More
3 Key Features of a Palo Alto Firewall
Security

3 Key Features of a Palo Alto Firewall

Palo Alto is a city in the State of California. And, with the average number of wireless devices per person on the rise, wireless networks are starting to look like the streets of California during rush hour. That’s where the “other” Palo Alto comes into play.

Read More
Why Every School Wireless Network Needs A Palo Alto Firewall

Why Every School Wireless Network Needs A Palo Alto Firewall

Education must adjust to better accommodate the way students learn today, and for today’s students that includes the use of technology. Wireless technology in the classroom is becoming an increasingly significant part of learning these days. As great as it is for students and teachers, it can cause nightmares for the school IT staff, because it does create an inherent wireless network security risk.

Read More
Top 10 Keys of Next Generation Firewall for a Secure Wireless Network
Security

Top 10 Keys of Next Generation Firewall for a Secure Wireless Network

Chances are you’ve probably heard or read about next generation firewalls; it seems like everyone is talking about what a great innovation it is in the network security market.  Traditional firewalls are becoming less capable of adequately protecting enterprise wireless networks with the rapid evolution of applications and threats. Instead of a completely new approach to wireless network security, traditional firewall has been transformed into “next generation firewall” to restore application visibility and control and regain the advantage in protecting the enterprise wireless networks. This list gives you the top 10 key requirements you should demand in your next firewall.

Read More
3 Reasons a Next Generation Firewall is a MUST!
Security

3 Reasons a Next Generation Firewall is a MUST!

Today, a new generation of users, applications, and security threats are posing risk to the enterprise wireless network. Traditional firewalls are not strong enough to provide complete application visibility and control. Having a "Next Generation Firewall" in place makes sure you are ready to integrate mobile users and cloud computing.

Read More
The Problem with School Wireless Network Passcodes
Mobility

The Problem with School Wireless Network Passcodes

School Wireless Networks need to be controlled because there are way to many opportunities for improper use of the network from guests, staff or students. In this article, we explain the OLD WAY schools would use passcodes for accessing the school wireless network, how that system lacked and how we can help you gain back control of the users on your school wireless network.

Read More
What is a Next Generation Firewall?
Security

What is a Next Generation Firewall?

Technology companies have always been good at pushing the latest and greatest thing. Sometimes products or industry trends come with a lot of hype so it’s hard to know if it’s a trend to ignore or if it’s something that you should really take advantage of and implement.

Read More