Wireless provide endless possibilities for attack, know you are protected.
We can go on for days about how WiFi networks can be attacked, how they should be protected, which is the best security to use etc.. etc..
What we do is look at the requirements, understand the treats and mitigate them. We keep it simple for you, as we deal with the complexity's and keep your infrastructure safe.
Our system, not only apply's and audits the deployment from the WiFi perspective, but also monitors for threats in the traffic steams to identify rouge activty at its source.