June 17, 2002, 9:17 AM — Hoping to help users take another step toward autonomic computers, which are meant to manage, configure and maintain themselves, IBM Corp.'s research division Monday announced a new wireless security tool, Distributed Wireless Security Auditor.
The tool, which can run on wireless-equipped laptops and handhelds, constantly monitors wireless networks for the addition of new devices and configuration changes on existing devices, said Dave Safford, manager of Global Security Analysis Lab at IBM Research in Hawthorne, New York. The data gathered from that monitoring is then transmitted back to a central server where the data is compiled for use by administrators, he said.
Traditional approaches to wireless network discovery and security have involved administrators equipped with wireless network gear roaming the halls and aisles of buildings, a process that is both expensive and time-consuming, Safford said. This approach allows companies to compile information about their networks at one point, but not continuously and doesn't identify new access points as they are added, he said.
"Security issues with 802.11b networks are largely ones of getting them configured correctly," he said. "The problem is finding access points ... and making sure they have the appropriate security features turned on."
Distributed Wireless Security Auditor addresses this problem by running in conjunction with the wireless client software on laptops and handhelds, he said. Because the software is distributed and continuously monitors the network, it eliminates the need for multiple hardware-based sensors or frequent walk-throughs to discover new access points, he said.
Wireless network administrators shouldn't get too excited yet, though, as Monday's announcement is a technology statement, more than a product announcement, Safford said. The product is not yet available for purchase and Safford was unable to provide an exact timeline.
"It's not going to be a long time ... a small number of months," he said.
Determinations about when the product will be released, and what it will cost, will be left to other parts of IBM, including the company's Tivoli Systems Inc. subsidiary, he said. When it is released, the software will work with Tivoli's Enterprise Risk Manager security console, he said. For now the back- end software reports to Unix applications, with the client running on Linux, he said. Windows client support is also forthcoming, he added.
"We want more and more the systems to take care of themselves," Safford said. "This is a step towards that."