SlideShare a Scribd company logo
1 of 19
Download to read offline
IMPLEMENTING ENTERPRISE WIRELESS SECURITY
POLICY IN THE “BRING YOUR OWN DEVICE” ERA
David King
Chairman & CEO
©2012AirTightNetworks.Allrightsreserved.
Typical enterprise wireless security template
1. Secure enterprise WLAN
• Authenticate users
• Encrypt over-the-air data
2. Isolate Guest Wi-Fi
3. Wi-Fi endpoints
• Secure remote enterprise access
4. Secure the enterprise airspace
from unmanaged Wi-Fi
5. Manage risks from Bring Your
Own Device (BYOD)
Featured case study
BYOD
Adapted from: Presentation by Billy Crowley and Kaustubh Phanse, RSA Europe 2010
Lesson #1: What does not work?
“Unapproved Wi-Fi devices
not allowed” policy without
enforcement
67 M
95 M
140 M
2010
Smartphones
2011
Smartphones
2011
Smartphones
+ Tablets
Source: Gartner
25%
61%
14%
38%
49%
10%
3%
AirTight Networks’ BYOD Survey Results
Source: 316 respondents, April 2012
How pervasive do you think is the use of
personal smart devices in your enterprise?
How do you view the BYOD trend
for your enterprise?
Lesson #2: WPA2/802.1x cannot stop BYOD
Lesson #3: Wireless security is more about managing
the “unmanaged”
AirTight Networks’ BYOD Survey Results
11%
20%
69%
16%
34%
50%
Do you see an increasing trend
of employees bringing Rogue Wi-Fi APs?
Are you concerned about employees using
mobile hotspots to bypass corporate policies?
Source: 316 respondents, April 2012
Lesson #4: Need an automated way to pinpoint the
needle in the haystack
What are your choices?
• Mobile device management (MDM)
• Network access control (NAC)
• Wireless intrusion prevention system (WIPS)
MDM ≠ Network Security
What is the incentive to install MDM
agents on personal devices?
Scope limited to “managed” devices
that run MDM agent
No visibility into Rogue APs, Soft Rogues,
Mobile Wi-Fi Hotspots
NAC ≠ Wireless Security
Cannot block Rogue APs, Soft Rogues,
Mobile Wi-Fi Hotspots
Scope limited to BYOD on “managed” WLAN
Suffers from “blind spots” – unauthorized Wi-Fi
devices connecting via authorized devices
Wireless intrusion prevention system (WIPS) provides
24/7 visibility and protection
AirTight’s patented automatic device classification
and WIPS policy enforcement
With this in place, your network is protected from all types of
wireless threats, vulnerabilities and attack tools!
External APs
Rogue APs
(On Network)
Authorized
APs
AP Classification
STOP
Client ClassificationPolicyMis-config
GO
STOP
IGNORE
DoS
External Clients
Authorized
Clients
Rogue
Clients
AUTOMATICALLY DETECT AND BLOCK RED PATHS!
AirTight’s patented WIPS engine provides most
comprehensive protection from BYOD
Authorized
APs
STOP
Authorized
ClientsUsers
Block
unapproved
devices!
GO
External
APs
Mobile Hotspots
STOP
Implementing Enterprise Wireless Security Policy in the BYOD Era
Lesson #5: Not all WIPS are created equal
Consult third-party experts and see for yourself
“…AirTight's methodology for classifying
events avoids false alarms when
identifying rogues.”
“AirTight is appropriate for buyers that
are looking for an easy-to-deploy
solution with minimal training/skill…”
“AirTight's drop-in SaaS package is
affordable and was well-timed to PCI
law fortifications that became important
in 2009.”
First and
only!
Visit Us !
www.airtightnetworks.com
The only WIPS solution rated
Strong Positive by Gartner
BYOD-proof Secure Wi-Fi
Managed from the Cloud
© 2012 AirTight Networks. All rights reserved.
IMPLEMENTING ENTERPRISE WIRELESS SECURITY
POLICY IN THE “BRING YOUR OWN DEVICE” ERA
David King
Chairman & CEO
©2012AirTightNetworks.Allrightsreserved.

More Related Content

What's hot

Trusted Wireless Environment (TWE)
Trusted Wireless Environment (TWE)Trusted Wireless Environment (TWE)
Trusted Wireless Environment (TWE)Ryan Orsi
 
Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud Block Armour
 
Conquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the EnterpriseConquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the EnterpriseAirTight Networks
 
5 phases of IoT
5 phases of IoT5 phases of IoT
5 phases of IoTExosite
 
Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoTVasco Veloso
 
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014Andris Soroka
 
Controlling Laptop and Smartphone Access to Corporate Networks
Controlling Laptop and Smartphone Access to Corporate NetworksControlling Laptop and Smartphone Access to Corporate Networks
Controlling Laptop and Smartphone Access to Corporate NetworksIcomm Technologies
 
Sophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityJohn Rhoton
 
2013 Security Threat Report Presentation
2013 Security Threat Report Presentation2013 Security Threat Report Presentation
2013 Security Threat Report PresentationSophos
 
IoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you SpamIoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you SpamAmit Rohatgi
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT SecurityRyan Wilson
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsKenny Huang Ph.D.
 
Security challenges for IoT
Security challenges for IoTSecurity challenges for IoT
Security challenges for IoTWSO2
 
Securing the Enterprise Mobile Perimeter
Securing the Enterprise Mobile PerimeterSecuring the Enterprise Mobile Perimeter
Securing the Enterprise Mobile PerimeterBrian Gleeson
 

What's hot (20)

Trusted Wireless Environment (TWE)
Trusted Wireless Environment (TWE)Trusted Wireless Environment (TWE)
Trusted Wireless Environment (TWE)
 
Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
Conquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the EnterpriseConquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the Enterprise
 
ForeScout IoT Enterprise Risk Report
ForeScout IoT Enterprise Risk ReportForeScout IoT Enterprise Risk Report
ForeScout IoT Enterprise Risk Report
 
5 phases of IoT
5 phases of IoT5 phases of IoT
5 phases of IoT
 
IOT Security
IOT SecurityIOT Security
IOT Security
 
Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoT
 
IoT Security, Mirai Revisited
IoT Security, Mirai RevisitedIoT Security, Mirai Revisited
IoT Security, Mirai Revisited
 
BYOD / Mobile-Device Security Guidelines for CxO's
BYOD / Mobile-Device Security Guidelines for CxO'sBYOD / Mobile-Device Security Guidelines for CxO's
BYOD / Mobile-Device Security Guidelines for CxO's
 
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
 
Controlling Laptop and Smartphone Access to Corporate Networks
Controlling Laptop and Smartphone Access to Corporate NetworksControlling Laptop and Smartphone Access to Corporate Networks
Controlling Laptop and Smartphone Access to Corporate Networks
 
Sophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos Wireless Protection Overview
Sophos Wireless Protection Overview
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
2013 Security Threat Report Presentation
2013 Security Threat Report Presentation2013 Security Threat Report Presentation
2013 Security Threat Report Presentation
 
IoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you SpamIoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you Spam
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT Security
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy Considerations
 
Security challenges for IoT
Security challenges for IoTSecurity challenges for IoT
Security challenges for IoT
 
Securing the Enterprise Mobile Perimeter
Securing the Enterprise Mobile PerimeterSecuring the Enterprise Mobile Perimeter
Securing the Enterprise Mobile Perimeter
 

Similar to Implementing Enterprise Wireless Security Policy in the BYOD Era

How BYOD Will Shape Wireless Network Security in 2012
How BYOD Will Shape Wireless Network Security in 2012How BYOD Will Shape Wireless Network Security in 2012
How BYOD Will Shape Wireless Network Security in 2012hemantchaskar
 
Financial Districs Wi Fi Scan
Financial Districs Wi Fi ScanFinancial Districs Wi Fi Scan
Financial Districs Wi Fi ScanAirTight Networks
 
Byod+ +bring+your+own+device
Byod+ +bring+your+own+device Byod+ +bring+your+own+device
Byod+ +bring+your+own+device J
 
LIFT OFF 2017: IoT and MSS Deep Dive
LIFT OFF 2017: IoT and MSS Deep DiveLIFT OFF 2017: IoT and MSS Deep Dive
LIFT OFF 2017: IoT and MSS Deep DiveRobert Herjavec
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2SHOLOVE INTERNATIONAL LLC
 
WEEK5 Mobile Device Security 31032022.pdf
WEEK5 Mobile Device Security 31032022.pdfWEEK5 Mobile Device Security 31032022.pdf
WEEK5 Mobile Device Security 31032022.pdfSetiya Nugroho
 
Is Your Network Ready for BYOD?
Is Your Network Ready for BYOD?Is Your Network Ready for BYOD?
Is Your Network Ready for BYOD?Sophos
 
Corporate America is Being ATTACKED and the Entry Vector May be Surprising
Corporate America is Being ATTACKED and the Entry Vector May be SurprisingCorporate America is Being ATTACKED and the Entry Vector May be Surprising
Corporate America is Being ATTACKED and the Entry Vector May be SurprisingSignals Defense, LLC
 
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Moon Technolabs Pvt. Ltd.
 
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...ProductNation/iSPIRT
 
Wp byod
Wp byodWp byod
Wp byodJ
 
Webinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDMWebinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDMBitglass
 
CS155 Computer And Network Security.docx
CS155 Computer And Network Security.docxCS155 Computer And Network Security.docx
CS155 Computer And Network Security.docxwrite31
 
IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and ThreatsIRJET Journal
 
7.5 steps to overlaying byod & iot
7.5 steps to overlaying byod & iot7.5 steps to overlaying byod & iot
7.5 steps to overlaying byod & iotCaston Thomas
 
BETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoSBETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoSPurna Bhat
 

Similar to Implementing Enterprise Wireless Security Policy in the BYOD Era (20)

How BYOD Will Shape Wireless Network Security in 2012
How BYOD Will Shape Wireless Network Security in 2012How BYOD Will Shape Wireless Network Security in 2012
How BYOD Will Shape Wireless Network Security in 2012
 
AirTight Networks - Wireless Security 2011
AirTight Networks - Wireless Security 2011AirTight Networks - Wireless Security 2011
AirTight Networks - Wireless Security 2011
 
Financial Districs Wi Fi Scan
Financial Districs Wi Fi ScanFinancial Districs Wi Fi Scan
Financial Districs Wi Fi Scan
 
Byod+ +bring+your+own+device
Byod+ +bring+your+own+device Byod+ +bring+your+own+device
Byod+ +bring+your+own+device
 
LIFT OFF 2017: IoT and MSS Deep Dive
LIFT OFF 2017: IoT and MSS Deep DiveLIFT OFF 2017: IoT and MSS Deep Dive
LIFT OFF 2017: IoT and MSS Deep Dive
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
 
WEEK5 Mobile Device Security 31032022.pdf
WEEK5 Mobile Device Security 31032022.pdfWEEK5 Mobile Device Security 31032022.pdf
WEEK5 Mobile Device Security 31032022.pdf
 
Is Your Network Ready for BYOD?
Is Your Network Ready for BYOD?Is Your Network Ready for BYOD?
Is Your Network Ready for BYOD?
 
Byod security
Byod security Byod security
Byod security
 
Corporate America is Being ATTACKED and the Entry Vector May be Surprising
Corporate America is Being ATTACKED and the Entry Vector May be SurprisingCorporate America is Being ATTACKED and the Entry Vector May be Surprising
Corporate America is Being ATTACKED and the Entry Vector May be Surprising
 
3 steps security
3 steps security3 steps security
3 steps security
 
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it
 
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
 
Sprite guard on line brochure
Sprite guard on line brochureSprite guard on line brochure
Sprite guard on line brochure
 
Wp byod
Wp byodWp byod
Wp byod
 
Webinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDMWebinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDM
 
CS155 Computer And Network Security.docx
CS155 Computer And Network Security.docxCS155 Computer And Network Security.docx
CS155 Computer And Network Security.docx
 
IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and Threats
 
7.5 steps to overlaying byod & iot
7.5 steps to overlaying byod & iot7.5 steps to overlaying byod & iot
7.5 steps to overlaying byod & iot
 
BETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoSBETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoS
 

More from Kappa Data

Focus op netwerken en netwerksecurity betaalt zich uit.
Focus op netwerken en netwerksecurity betaalt zich uit.Focus op netwerken en netwerksecurity betaalt zich uit.
Focus op netwerken en netwerksecurity betaalt zich uit.Kappa Data
 
Kappa Data Kappaloog, editie Nederland - November 2016
Kappa Data Kappaloog, editie Nederland - November 2016 Kappa Data Kappaloog, editie Nederland - November 2016
Kappa Data Kappaloog, editie Nederland - November 2016 Kappa Data
 
Kappa Data Kappaloog België (in het Nederlands) - November 2016
Kappa Data Kappaloog België (in het Nederlands) - November 2016 Kappa Data Kappaloog België (in het Nederlands) - November 2016
Kappa Data Kappaloog België (in het Nederlands) - November 2016 Kappa Data
 
Whitepaper: Digipass Authentication for Pulse Connect Secure
Whitepaper: Digipass Authentication for Pulse Connect Secure Whitepaper: Digipass Authentication for Pulse Connect Secure
Whitepaper: Digipass Authentication for Pulse Connect Secure Kappa Data
 
Press release kappa data signs distribution agreement with vasco pl
Press release   kappa data signs distribution agreement with vasco plPress release   kappa data signs distribution agreement with vasco pl
Press release kappa data signs distribution agreement with vasco plKappa Data
 
Kemp Technologies rises on Gartner's Magical Quadrant for ADC
Kemp Technologies rises on Gartner's Magical Quadrant for ADCKemp Technologies rises on Gartner's Magical Quadrant for ADC
Kemp Technologies rises on Gartner's Magical Quadrant for ADCKappa Data
 
Barracuda NG Firewalls - high availability
Barracuda NG Firewalls - high availabilityBarracuda NG Firewalls - high availability
Barracuda NG Firewalls - high availabilityKappa Data
 
New Barracuda firewall platform
New Barracuda firewall platformNew Barracuda firewall platform
New Barracuda firewall platformKappa Data
 
Case study vandeputte group def
Case study   vandeputte group defCase study   vandeputte group def
Case study vandeputte group defKappa Data
 
Case study vandeputte group def
Case study   vandeputte group defCase study   vandeputte group def
Case study vandeputte group defKappa Data
 
Barracuda integration with aerohive
Barracuda integration with aerohiveBarracuda integration with aerohive
Barracuda integration with aerohiveKappa Data
 
Aerohive and Barracuda Whitepaper
Aerohive and Barracuda WhitepaperAerohive and Barracuda Whitepaper
Aerohive and Barracuda WhitepaperKappa Data
 
Juniper round table switching and product overview
Juniper round table   switching and product overviewJuniper round table   switching and product overview
Juniper round table switching and product overviewKappa Data
 
Kappa Data Trainings Q2
Kappa Data Trainings Q2Kappa Data Trainings Q2
Kappa Data Trainings Q2Kappa Data
 
Kappa Data Roadshow 2015 - April 8th at Rijswijk, NL
Kappa Data Roadshow 2015 - April 8th at Rijswijk, NLKappa Data Roadshow 2015 - April 8th at Rijswijk, NL
Kappa Data Roadshow 2015 - April 8th at Rijswijk, NLKappa Data
 
Roadshow 2015 - Agenda
Roadshow 2015 - AgendaRoadshow 2015 - Agenda
Roadshow 2015 - AgendaKappa Data
 
Kappa data wins channel award 2015 best belgian distri
Kappa data wins channel award 2015   best belgian distriKappa data wins channel award 2015   best belgian distri
Kappa data wins channel award 2015 best belgian distriKappa Data
 
Aerohive promotions
Aerohive promotionsAerohive promotions
Aerohive promotionsKappa Data
 
Pictures new building
Pictures new buildingPictures new building
Pictures new buildingKappa Data
 
Case study sofico/juniper
Case study   sofico/juniperCase study   sofico/juniper
Case study sofico/juniperKappa Data
 

More from Kappa Data (20)

Focus op netwerken en netwerksecurity betaalt zich uit.
Focus op netwerken en netwerksecurity betaalt zich uit.Focus op netwerken en netwerksecurity betaalt zich uit.
Focus op netwerken en netwerksecurity betaalt zich uit.
 
Kappa Data Kappaloog, editie Nederland - November 2016
Kappa Data Kappaloog, editie Nederland - November 2016 Kappa Data Kappaloog, editie Nederland - November 2016
Kappa Data Kappaloog, editie Nederland - November 2016
 
Kappa Data Kappaloog België (in het Nederlands) - November 2016
Kappa Data Kappaloog België (in het Nederlands) - November 2016 Kappa Data Kappaloog België (in het Nederlands) - November 2016
Kappa Data Kappaloog België (in het Nederlands) - November 2016
 
Whitepaper: Digipass Authentication for Pulse Connect Secure
Whitepaper: Digipass Authentication for Pulse Connect Secure Whitepaper: Digipass Authentication for Pulse Connect Secure
Whitepaper: Digipass Authentication for Pulse Connect Secure
 
Press release kappa data signs distribution agreement with vasco pl
Press release   kappa data signs distribution agreement with vasco plPress release   kappa data signs distribution agreement with vasco pl
Press release kappa data signs distribution agreement with vasco pl
 
Kemp Technologies rises on Gartner's Magical Quadrant for ADC
Kemp Technologies rises on Gartner's Magical Quadrant for ADCKemp Technologies rises on Gartner's Magical Quadrant for ADC
Kemp Technologies rises on Gartner's Magical Quadrant for ADC
 
Barracuda NG Firewalls - high availability
Barracuda NG Firewalls - high availabilityBarracuda NG Firewalls - high availability
Barracuda NG Firewalls - high availability
 
New Barracuda firewall platform
New Barracuda firewall platformNew Barracuda firewall platform
New Barracuda firewall platform
 
Case study vandeputte group def
Case study   vandeputte group defCase study   vandeputte group def
Case study vandeputte group def
 
Case study vandeputte group def
Case study   vandeputte group defCase study   vandeputte group def
Case study vandeputte group def
 
Barracuda integration with aerohive
Barracuda integration with aerohiveBarracuda integration with aerohive
Barracuda integration with aerohive
 
Aerohive and Barracuda Whitepaper
Aerohive and Barracuda WhitepaperAerohive and Barracuda Whitepaper
Aerohive and Barracuda Whitepaper
 
Juniper round table switching and product overview
Juniper round table   switching and product overviewJuniper round table   switching and product overview
Juniper round table switching and product overview
 
Kappa Data Trainings Q2
Kappa Data Trainings Q2Kappa Data Trainings Q2
Kappa Data Trainings Q2
 
Kappa Data Roadshow 2015 - April 8th at Rijswijk, NL
Kappa Data Roadshow 2015 - April 8th at Rijswijk, NLKappa Data Roadshow 2015 - April 8th at Rijswijk, NL
Kappa Data Roadshow 2015 - April 8th at Rijswijk, NL
 
Roadshow 2015 - Agenda
Roadshow 2015 - AgendaRoadshow 2015 - Agenda
Roadshow 2015 - Agenda
 
Kappa data wins channel award 2015 best belgian distri
Kappa data wins channel award 2015   best belgian distriKappa data wins channel award 2015   best belgian distri
Kappa data wins channel award 2015 best belgian distri
 
Aerohive promotions
Aerohive promotionsAerohive promotions
Aerohive promotions
 
Pictures new building
Pictures new buildingPictures new building
Pictures new building
 
Case study sofico/juniper
Case study   sofico/juniperCase study   sofico/juniper
Case study sofico/juniper
 

Recently uploaded

COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 

Recently uploaded (20)

COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
20150722 - AGV
20150722 - AGV20150722 - AGV
20150722 - AGV
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 

Implementing Enterprise Wireless Security Policy in the BYOD Era

  • 1. IMPLEMENTING ENTERPRISE WIRELESS SECURITY POLICY IN THE “BRING YOUR OWN DEVICE” ERA David King Chairman & CEO ©2012AirTightNetworks.Allrightsreserved.
  • 2. Typical enterprise wireless security template 1. Secure enterprise WLAN • Authenticate users • Encrypt over-the-air data 2. Isolate Guest Wi-Fi 3. Wi-Fi endpoints • Secure remote enterprise access 4. Secure the enterprise airspace from unmanaged Wi-Fi 5. Manage risks from Bring Your Own Device (BYOD)
  • 3. Featured case study BYOD Adapted from: Presentation by Billy Crowley and Kaustubh Phanse, RSA Europe 2010
  • 4. Lesson #1: What does not work? “Unapproved Wi-Fi devices not allowed” policy without enforcement
  • 5. 67 M 95 M 140 M 2010 Smartphones 2011 Smartphones 2011 Smartphones + Tablets Source: Gartner
  • 6. 25% 61% 14% 38% 49% 10% 3% AirTight Networks’ BYOD Survey Results Source: 316 respondents, April 2012 How pervasive do you think is the use of personal smart devices in your enterprise? How do you view the BYOD trend for your enterprise?
  • 7. Lesson #2: WPA2/802.1x cannot stop BYOD
  • 8. Lesson #3: Wireless security is more about managing the “unmanaged”
  • 9. AirTight Networks’ BYOD Survey Results 11% 20% 69% 16% 34% 50% Do you see an increasing trend of employees bringing Rogue Wi-Fi APs? Are you concerned about employees using mobile hotspots to bypass corporate policies? Source: 316 respondents, April 2012
  • 10. Lesson #4: Need an automated way to pinpoint the needle in the haystack What are your choices? • Mobile device management (MDM) • Network access control (NAC) • Wireless intrusion prevention system (WIPS)
  • 11. MDM ≠ Network Security What is the incentive to install MDM agents on personal devices? Scope limited to “managed” devices that run MDM agent No visibility into Rogue APs, Soft Rogues, Mobile Wi-Fi Hotspots
  • 12. NAC ≠ Wireless Security Cannot block Rogue APs, Soft Rogues, Mobile Wi-Fi Hotspots Scope limited to BYOD on “managed” WLAN Suffers from “blind spots” – unauthorized Wi-Fi devices connecting via authorized devices
  • 13. Wireless intrusion prevention system (WIPS) provides 24/7 visibility and protection
  • 14. AirTight’s patented automatic device classification and WIPS policy enforcement With this in place, your network is protected from all types of wireless threats, vulnerabilities and attack tools! External APs Rogue APs (On Network) Authorized APs AP Classification STOP Client ClassificationPolicyMis-config GO STOP IGNORE DoS External Clients Authorized Clients Rogue Clients AUTOMATICALLY DETECT AND BLOCK RED PATHS!
  • 15. AirTight’s patented WIPS engine provides most comprehensive protection from BYOD Authorized APs STOP Authorized ClientsUsers Block unapproved devices! GO External APs Mobile Hotspots STOP
  • 17. Lesson #5: Not all WIPS are created equal Consult third-party experts and see for yourself “…AirTight's methodology for classifying events avoids false alarms when identifying rogues.” “AirTight is appropriate for buyers that are looking for an easy-to-deploy solution with minimal training/skill…” “AirTight's drop-in SaaS package is affordable and was well-timed to PCI law fortifications that became important in 2009.” First and only!
  • 18. Visit Us ! www.airtightnetworks.com The only WIPS solution rated Strong Positive by Gartner BYOD-proof Secure Wi-Fi Managed from the Cloud © 2012 AirTight Networks. All rights reserved.
  • 19. IMPLEMENTING ENTERPRISE WIRELESS SECURITY POLICY IN THE “BRING YOUR OWN DEVICE” ERA David King Chairman & CEO ©2012AirTightNetworks.Allrightsreserved.