SourceSecurity.com US Edition
Security camera lens, CCTV Camera, Digital Recorder, Telemetric Transmitter and Controller, Intruder Alarm Control Panel, Access Control Reader, Dome Camera
Home  |  Settings  |  Marketing Options  |  eNewsletters  |  About Us  |  FAQs  |  Contact Us    Site tour of SourceSecurity.com
REGISTERTerms
Smart

RISCO Group Wireless security

Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Various wireless security protocols were developed to protect home wireless networks. In addition to preventing uninvited guests from connecting to a wireless network, wireless security protocols encrypt private data as it is being transmitted over the airwaves. Wireless networks broadcast data in every direction to every device that happens to be listening, within a limited range.

Following are descriptions of the WEP, WPA, and WPA2 wireless security protocols:

Wired Equivalent Privacy (WEP): The original encryption protocol developed for wireless networks. WEP was designed to provide the same level of security as wired networks.

Wi-Fi Protected Access (WPA): Introduced as an interim security enhancement over WEP while the 802.11i wireless security standard was being developed. Most current WPA implementations use a preshared key (PSK), commonly referred to as WPA Personal, and the Temporal Key Integrity Protocol (TKIP, pronounced tee-kip) for encryption. WPA Enterprise uses an authentication server to generate keys or certificates.

Wi-Fi Protected Access version 2 (WPA2): The most significant enhancement to WPA2 over WPA is the use of the Advanced Encryption Standard (AES) for encryption.

Bookmark and Share
In Profile
Arecont Vision now in its 5th generation of the SurroundVideo IP Panoramic series
Arecont Vision now in its 5th generation of the SurroundVideo IP Panoramic series

Arecont Vision® has perfected multi-megapixel, multi-sensor camera technology. Now in its 5th generation, the SurroundVideo® Panoramic Series has been upgraded with the latest features including STELLAR™ low light technology.

Cost-effective solution for time-sensitive applications

The SurroundVideo G5 is best suited for businesses and organisations that require ultra-high resolution at a low cost per pixel. The camera features four factory-installed P-iris lenses, ensuring the best possible depth of field and image clarity for precise performance from each individual sensor. Once mounted, the operator can quickly focus the camera remotely, eliminating the need to adjust the camera onsite. No more hassle individually installing multiple cameras to cover a wide area, manually focusing lenses, or risk missing critical information from a 180° scene. It is a cost-effective solution for time-sensitive applications, which require a quick, multiple camera installation.

The 5MP m...

In Focus
Arecont VisionASSA ABLOY EMEA
AxxonSoftBCDVideo
CLIQ - ASSA ABLOYDahua Technology Ltd
Delta Scientific CorporationDSC
Gallagher SecurityHikvision
LTV Europe Sicherheitstechnik GmbHMOBOTIX AG
Nedap Security ManagementNetwork Video Technologies
Panasonic System Communications Company EuropePelco by Schneider Electric
Seagate TechnologySeeTec GmbH
Sony Professional Solutions EuropeTDSi
TESAVicon Industries

See privacy and cookie policy
International Edition