A primer to Wi-Fi provisioning for IoT applications

Wi-Fi provisioning is the process of connecting a new Wi-Fi device (station) to a Wi-Fi network. The provisioning process involves loading the station with the network name (often referred to as SSID) and its security credentials. The Wi-Fi security standard distinguishes between personal security, mostly used in homes and businesses, and enterprise security, used in large offices and campuses. Provisioning a station for enterprise security usually involves installing certificates, which are used to verify the integrity of the station and the network by interaction with a security server managed by the IT department. Personal Wi-Fi security, on the other hand, needs to be handled by users at home, and it simply involves typing a pre-defined password. To provide robust security, the password can be as long as 64 characters.

Spotlight

WiFi Integrators for Innovations, Inc.

WiFi Integrators for Innovation, Inc. (WIfI) staff has over 50 years of combined experience in the design, engineering, deployment, and testing of various WiFi networks and technologies. WiFi Integrators for Innovation is a technology independent integrator that works with all major brands of 802.11a/b/g/n equipment.

OTHER WHITEPAPERS
news image

IT at Intel: Scaling Intel’s Data Centers with Software-Defined Networking and Automation

whitePaper | July 20, 2022

As Intel’s business grows, demand for data center network capacity has increased by more than 25% annually. Additionally, business pressures require new capacity to be brought into production within 24 hours. As far back as 2014, we recognized the potential of software-defined networking (SDN) to help meet these challenges.

Read More
news image

5G & Non-Terrestrial Networks

whitePaper | February 1, 2022

The evolution and large-scale deployment of fifth generation “5G” wireless networks over the next few years will require complementary 5G services by offering ubiquitous and reliable coverage across numerous geographies. Terrestrial networks are currently focusing on delivery of 5G services to areas already being served by existing cellular technologies, but the unique capabilities of non-terrestrial networks can help expand the reach of 5G technology in the realization of new use cases

Read More
news image

The Journey to Virtualized RAN: Insights 2021

whitePaper | July 9, 2021

At the end of 2019, Heavy Reading surveyed 77 communications service providers (CSPs) on their plans for virtualization overall, and virtualized radio access networks (vRANs) specifically. A lot has happened since then that could throw the carriers off course – like data centers and central offices going zero-touch and lights-out virtually overnight. Heavy Reading checked in with the carriers in Q2 2021 to see how their plans have changed. This report highlights the results of our 2021 survey, comparing and contrasting them with the results from our 2019 survey.

Read More
news image

The Right Approach to Zero Trust for IoT Devices

whitePaper | May 2, 2022

Networking and security teams have historically relied on protections at the network perimeter to secure the entire enterprise. The internal network was deemed trusted and secure. While everything outside was considered “dirty,” everything on the internal network was considered “clean,” and application traffic would flow unrestricted. However, recent and developing shifts in enterprise working models are having a far-reaching effect on the traditionally managed network perimeter for security. The following trends are making organizations reassess their approach to security:

Read More
news image

Virtualized Networks and Real Risks: Best Practices for Securing Network Function Virtualization Environment

whitePaper | September 19, 2022

Network Functions Virtualization (NFV) is unleashing fundamental innovation in the way organizations buy, deploy, and operate network infrastructures. By leveraging open standards and commodity hardware, NFV delivers cost savings, enhanced flexibility, improved performance, and more. However, without the right safeguards, organizations can also see their vulnerabilities increase when they move to a Virtualized Network Functions (VNF) architecture. This white paper offers a detailed look at the unique security implications of adopting NFV approaches, and it provides a number of best practices to employ to ensure sensitive data and transmissions remain secure in these environments.

Read More
news image

Securing the Future of Connected Work

whitePaper | July 12, 2021

Today’s hybrid workforce of both remote and in-office employees is the new normal as the world adapts to the COVID-19 pandemic. IT security teams are struggling to support this new global digital workforce that needs reliable, secure, and fast access to the Internet. Cyber attackers are also taking advantage of this new normal, so how do organizations prevent growing threats from web and email vectors? Traditional security strategies of routing Internet traffic through a VPN increase latency, slow performance, and disrupt the user experience. The solution that avoids these problems is to bypass the VPN by using cloud-delivered isolation, enabling organizations to provide their global workforce with completely secure access to the Internet. Menlo’s new ebook, Securing the Future of Work, discusses how organizations can deliver consistent security services to this new digital workforce through isolation in the cloud.

Read More

Spotlight

WiFi Integrators for Innovations, Inc.

WiFi Integrators for Innovation, Inc. (WIfI) staff has over 50 years of combined experience in the design, engineering, deployment, and testing of various WiFi networks and technologies. WiFi Integrators for Innovation is a technology independent integrator that works with all major brands of 802.11a/b/g/n equipment.

Events