Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
Home > Ruckus Wireless > A Cloud security checklist for IT
 

A Cloud security checklist for IT

White Paper Published By: Ruckus Wireless
Ruckus Wireless
Published:  Jul 11, 2018
Type:  White Paper
Length:  7 pages

In an era of "lean IT," the centralized management capabilities of cloud-managed Wi-Fi make it an attractive option to manage and maintain wireless LANs (WLANs) across multiple locations.

The decision to move WLAN management to the cloud requires one key assurance: end-to-end security from user devices to the cloud. This means that user data must be protected over the WAN and in the data center. These security measures should not require on-staff WLAN security expertise to manage. And security measures should be largely transparent to users.

This paper provides an overview of the security architecture of Ruckus Cloud Wi-Fi, as well as best practices for specific security scenarios.



Tags :