Advanced WiFi Security
Teleostec has in-depth knowledge and experience of providing solutions which add strong security to your WiFi system. The convenience of a wireless connection inherently means more users can receive the signal. Advanced WiFi Security can ensure strong encryption of your data, and the validity of end-users and devices before they access your network.
Robust Security Model
Teleostec take an industry standards based approach to building secure wifi systems, using the Supplicant, Authenticator, and Server based model. We can deploy several high security components into your solution to support this model, including:
- 802.11i and WPA2
RADIUS AAA Server
Teleostec can build and integrate RADIUS servers to support advanced secure user authentication schemes. We can integrate into existing IT infrastructures including Microsoft Active Directory systems, and provide several implementations of RADIUS server including:
- Linux FreeRADIUS
- Microsoft IAS (Internet Authentication Service)
- Microsoft NPS (Network Policy Server)
- Cisco ACS (Access Control Server)
Click here to download the latest brochure on our Wireless Solutions.
Certificate Based Security
Teleostec can support the design and deployment a fully functional certificate based system capable of supporting secure WiFi authentication (802.1X) and digital certificate based EAP-TLS security. Digital certifictes form an authentication, encryption and integrity process as part of a Public Key Infrastructure (PKI) scheme. A PKI scheme creates an inherent reliance on a trusted external party known as the Certificate Authority (CA), where the signature on the digital certificate will be of the CA.
Teleostec can support the process for managing certificates for your organization. Creating a certificate management plan involves making decisions about the following:
- How requests for new certificates and certificate renewal are processed
- How to map certificates to user accounts
- How you manage and distribute Certificate Revocation Lists (CRLs)
- The strategies that you use to recover encrypted data