Emerging Tech: Security — The Need for Wireless Airspace Defense
Download nowEmerging Tech: Security — The Need for Wireless Airspace Defense
Download nowEmerging Tech: Security — The Need for Wireless Airspace Defense
Download nowSafeguarding Classified National Security (CNSI) from the Threats Posed by Personal or Portable Electronic Devices Within SCIFs and SAPFs
Read moreVideos
Wireless threats visually explained and demonstrated.
Webinars
Live or recorded online presentations or workshops
Whitepapers
Authoritative reports on complex threats
Datasheets
Explore key features, specifications, and benefits
Blog
Collection of articles with security insights
Support
Access our world-class assistance
Excerpt From Wi-fi-vulnerabilities part 2 Webinar
CTO Dr. Brett Walkenhorst Explains EAP-PEAP Handshake.
Protected Extensible Authentication Protocol, or EAP-PEAP, is a set of more than forty authentication techniques. In order to create a secure tunnel where other EAP protocol actions take place, PEAP acts as the outer layer. To securely exchange credentials, the procedure involves server-client exchanges, TLS tunnel setup, identity exchange, and challenge-response phases. Secure communication is made possible by the generation of session keys from a symmetric key created during the TLS tunnel construction, following successful authentication. In business network contexts, this technique guarantees safe encryption and authentication.
Learn how Bastille can help you prepare you for today’s ever-growing wireless threat landscape, and schedule a demo and we’ll be in touch shortly.