Interlink and Trapeze set up wireless double act

Interlink Networks and Trapeze Networks have struck up a partnership to help large enterprises get over the hurdle of 802.11...

Interlink Networks and Trapeze Networks have struck up a partnership to help large enterprises get over the hurdle of 802.11 wireless Lan deployment.

Through the partnership, Interlink - a network security and access control software developer - will provide user management, while Wlan systems provider Trapeze will take care of the physical network.

Trapeze takes care of the Wlan, including access points and their deployment and manageability, while Interlink supplies the management of the users.

The partnership allows organisations to control the physical network through Trapeze's solution, and who has access. This is done through Interlink's remote authentication dial-in user service (Radius)- and standards-based solution. Radius is an access control protocol which uses a challenge/response method for authentication.

Trapeze aims to use its Wireless Lan Mobility System, which it introduced earlier this year, to hold up its end of the partnership. The system works by integrating wired with wireless, thus allowing businesses to treat the Wlan as an independent, parallel, add-on infrastructure with its own unique set of problems and costs.

With its mobility system, Trapeze will fortify Interlink's Radius-based software with an additional layer of Wlan security and management by using 802.1x authentication to verify user identities and block intruder access to corporate data resources, according to Interlink.

Warren Wilson, a practice director at Summit Strategies, said that the security of mobile devices is still a major enterprise concern, adding that companies' concerns stem from a couple of different standpoints, including the fact that wireless devices are easily lost or stolen, making the information on them highly vulnerable.

The various types of intrusions that mobile devices are susceptible to are also a concern for organisations, Wilson said. Although intrusion attempts can be effectively detected and blocked, the technologies to do this are still very new and confusing to many companies.

"Solutions and best practices are still evolving, so customers face a lot of confusion and it is, indeed, inhibiting adoption," he added.

Lindsay Bruce writes for

Read more on IT strategy