CA Takes WLAN Management Plunge

By Paula Musich  |  Posted 2004-05-24 Email Print this article Print
 
 
 
 
 
 
 

WEBINAR: Event Date: Tues, December 5, 2017 at 1:00 p.m. ET/10:00 a.m. PT

How Real-World Numbers Make the Case for SSDs in the Data Center REGISTER >

With its new Unicenter Wireless Site Management system, the company aims to simplify deployment and offer greater automation.

Computer Associates International is planning its strongest play yet to manage wireless LANs comprehensively with a new system that offers greater automation and streamlines deployment.

The new Unicenter Wireless Site Management (WSM) system, due in beta this week from the Islandia, N.Y., company, is designed to help customers overcome some of the hurdles that have slowed deployment of IEEE 802.11 wireless LANs (WLANs).

At the heart of the software, which is due to be announced at the company's CAWorld user conference in Las Vegas this week, is the automation of myriad and complicated functions such as managing encryption keys, detecting and disabling rogue access points, and provisioning user access.

Also automated are processes such as discovering and mapping WLAN infrastructures, optimizing the wireless network and automating Wireless Application Protocol (WAP) configuration and administration.

With such a comprehensive approach to WLAN security, administration and management, Computer Associates International Inc. is planting a big stake in the ground compared with rivals such as IBM's Tivoli unit, BMC Software Inc. and Hewlett-Packard Co.'s OpenView unit, observers say.

"CA is the biggest vendor to venture this far into WLAN management," said Warren Wilson, an analyst at Boston-based Summit Strategies Inc. "It recognizes that WLANs present management challenges that a lot of enterprises haven't fully dealt with."

Click here to read about how smaller vendors are pushing to deliver on WLAN management.

One major hurdle cleared by the new Unicenter WSM system is the automation of administration of the Wired Equivalent Privacy (WEP) encryption scheme.

For the complete story, click here.

 
 
 
 
 
 
 
 
 
























 
 
 
 
 
 

Submit a Comment

Loading Comments...
























 
 
 
 
 
 
 
 
 
Thanks for your registration, follow us on our social networks to keep up-to-date