SlideShare una empresa de Scribd logo
1 de 3
Descargar para leer sin conexión
AIRTIGHT NETWORKS              SOLUTIONS BRIEF




                                       AirTight Secure Wi-Fi™
                                       One Solution. Many Answers.
                                       In today’s age of smartphones, tablets and mobile apps, users expect Wi-Fi wherever
                                       they go. What was once considered a special service to customers has become such a
                                       commodity that businesses risk turning customers away if they don’t offer Wi-Fi.
                                       Besides, Wi-Fi has opened new opportunities for businesses to better engage their
                                       customers and to improve service efficiency, in turn resulting in increased revenue.

                                       However, for quick-serve restaurant and retail store chains, PCI DSS compliance is also a
                                       top priority and security implications of adding Wi-Fi is naturally a concern.

                                       AirTight Secure Wi-Fi™ combines the benefits of Wi-Fi access with industry’s best wireless
                                       intrusion prevention and security technology in a single solution, enabling businesses
                                       to provide hassle-free Wi-Fi access, while securing their network from Wi-Fi threats and
                                       staying PCI compliant.
 Key Features

• IEEE 802.11a/b/g/n protocols
                                       Nurturing Customer Relations
                                       Offering Wi-Fi, especially if it’s free, is a proven way to attract customers; however, you can
• WPA/WPA2 security with PSK           go beyond simply providing the convenience of Internet access to guests. AirTight Secure
  and 802.1x authentication            Wi-Fi can be used to creatively leverage the revolution of smart devices and mobile apps
                                       for expanding your relationship with customers.
• Multi-VLAN and -SSID support
                                       Engage using Social Media, Customized Content and Geo-marketing
• Multiple modes of operation: full
  AP, AP/sensor combo and full         Your business could use social media tools to communicate with guests even when they
  sensor                               are on-site. A customized content feed to guests could offer valuable information, e.g.,
                                       newly introduced items on the menu, rewards programs, polls to get feedback on food
• Automated wireless scanning          and service, and contests.
  powered by industry’s best
  wireless IPS technology

• Consolidated wireless PCI DSS
  compliance reporting

• Customizable captive portal for
  localized experience

• Cloud-based management

• Ideal for geographically
  distributed locations with
  unlimited scalability




                                           © 2011 AirTight Networks, Inc. All rights reserved.                                           1
AIRTIGHT NETWORKS              SOLUTIONS BRIEF




                                        Wi-Fi captive portals could be customized for groups of restaurants or individual outlets
                                        for localized marketing, e.g., to push coupons, announce daily specials, inform about
 Key Benefits
                                        fundraising programs for non-profits, and advertise career opportunities.

• Plug and play deployment              Customers can be encouraged to register their information to participate in localized
  eliminates need for IT support        opt-in marketing programs. Emerging geo-marketing mobile apps could be integrated
  at remote locations                   with Wi-Fi access to explore new ways of engaging guests.

• Cloud-based management
  simplifies the management
                                        Maximizing Service Efficiency
  of thousands of geographically        AirTight Secure Wi-Fi can help you to bring efficiencies to the service floor—busting long
  distributed locations                 lines and boosting the average order size and the number of orders catered per day.

• Hierarchical location-based           Cater Orders with Mobile PoS
  management simplifies policy          Wait staff can use dedicated Wi-Fi PoS handhelds or repurpose smartphones and tablets
  definition and enforcement            with PoS apps to take orders and swipe credit cards at the tables or when customers are
                                        waiting in line or even on demand if cars line up at the drive thru. Card transactions over
• Pay-as-you-go subscription            AirTight Secure Wi-Fi can be protected using the state-of-the-art WPA2/AES encryption
  pricing eliminates capital            and 802.1x authentication.
  expenditure
                                        AirTight’s Wi-Fi access solution is vendor agnostic when it comes to supporting Wi-Fi
• A single solution for Wi-Fi access,   certified mobile PoS terminals. So you can make decisions about Wi-Fi PoS products
  security and PCI compliance that      independently and future-proof its investment.
  delivers the best ROI                 Wireless Self-service Kiosks without the Hefty Service Fees
                                        Wireless kiosks are fast becoming popular among quick-serve restaurants for allowing
                                        patrons to place orders without waiting in long lines. However, high service fees for
                                        3G/4G kiosks have been prohibitive.

                                        With AirTight Secure Wi-Fi in the outlets, you can simply deploy Wi-Fi kiosks and
                                        completely eliminate the recurring hefty 3G/4G fees.




                               BEFORE                                                             AFTER


                                            © 2011 AirTight Networks, Inc. All rights reserved.                                       2
AIRTIGHT NETWORKS                        SOLUTIONS BRIEF




                                                         In-store Online Ordering
  About
  AirTight Networks                                      In-store online ordering is another way to enable self-service for guests without the need
                                                         for dedicated kiosks.
 AirTight Networks is the global
 leader in wireless security and                         The captive portal on AirTight Secure Wi-Fi access points could be customized with your
 compliance products and services,                       company branding and designed to inform customers about special offers and allow
 providing customers best-of-                            them to place orders from their Wi-Fi devices. Customers can enjoy the Internet access
 breed technology to automatically                       while their orders get ready, instead of standing in a long line or waiting for their turn at
 detect, classify, locate and block                      the drive thru.
 all current and emerging wireless
 threats. AirTight offers industry’s
 leading wireless intrusion
                                                         Staying Secure and Compliant
 prevention system (WIPS) and the                        While you maximize the business benefits of Wi-Fi access, AirTight Secure Wi-Fi will scan
 world’s only SaaS based wireless                        for wireless vulnerabilities such as rogue access points and ensure that your enterprise
 security, compliance and Wi-Fi                          remains protected and meets the wireless security requirements of PCI DSS compliance.
 access branded as AirTight Cloud
 Services™. AirTight’s award-                            Each AirTight Wi-Fi access point can support multiple wireless networks. You can run
 winning solutions are used by                           a guest Wi-Fi hotspot alongside an encrypted Wi-Fi network for processing credit card
 customers globally in the financial,                    transactions or for transmitting other corporate data. AirTight will completely separate
 government, retail and hospitality,                     the wireless networks so that the guest network data never mixes with the secure
 manufacturing, transportation,                          corporate data. This ensures that your corporate networks and data remain isolated from
 education, health care, telecom,                        guest Wi-Fi access.
 and technology industries. AirTight
                                                         As the industry’s first and still the only cloud-based solution, AirTight Secure Wi-Fi
 owns the seminal patents for
                                                         simplifies the centralized management of Wi-Fi access and security across thousands of
 wireless intrusion prevention
                                                         geographically distributed locations as compared to traditional Wi-Fi solutions. Its plug
 technology with 20 U.S. patents
                                                         and play deployment and ease of use eliminates the need for IT staff at remote locations.
 and three international patents
 granted (Australia, Japan and
 UK), and more than 20 additional
 patents pending. AirTight Networks
 is a privately held company
 based in Mountain View, CA. For
 more information please visit:
 www.airtightnetworks.com.

 AirTight and SpectraGuard are
 registered trademarks of AirTight
 Networks, Inc. AirTight Networks,
 AirTight Networks logo, AirTight Cloud
 Services and AirTight Secure Wi-Fi are
 trademarks. All other trademarks are
 the property of their respective owners.



                                                            PCI DSS Wireless
                                                           Compliance Report         Centralized Management of Wi-Fi Access
                                                                                       and Security from a Single Console




The Global Leader in Wireless Security and Compliance Solutions
AirTight Networks, Inc. 339 N. Bernardo Avenue #200, Mountain View, CA 94043
T +1.877.424.7844 T 650.961.1111 F 650.961.1169 www.airtightnetworks.com info@airtightnetworks.com
© 2011 AirTight Networks, Inc. All rights reserved. AirTight Networks and the AirTight Networks logo are trademarks, and
AirTight and SpectraGuard are registered trademarks of AirTight Networks, Inc. All other trademarks mentioned herein are
properties of their respective owners. Specifications are subject to change without notice.

Más contenido relacionado

Más de AirTight Networks

Air tight 11ac webinar series session 2 - 11ac feature deep dive - june 2014
Air tight 11ac webinar series   session 2 - 11ac feature deep dive - june 2014Air tight 11ac webinar series   session 2 - 11ac feature deep dive - june 2014
Air tight 11ac webinar series session 2 - 11ac feature deep dive - june 2014AirTight Networks
 
Wi-Fi Offload Summit - Monetise Thyself
Wi-Fi Offload Summit - Monetise ThyselfWi-Fi Offload Summit - Monetise Thyself
Wi-Fi Offload Summit - Monetise ThyselfAirTight Networks
 
AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014
AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014
AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014AirTight Networks
 
Restaurant Wi-Fi Primer: Retail Analytics and Social Integration
Restaurant Wi-Fi Primer: Retail Analytics and Social Integration Restaurant Wi-Fi Primer: Retail Analytics and Social Integration
Restaurant Wi-Fi Primer: Retail Analytics and Social Integration AirTight Networks
 
AirTight Networks Evolution - Cloud & MSP
AirTight Networks Evolution - Cloud & MSPAirTight Networks Evolution - Cloud & MSP
AirTight Networks Evolution - Cloud & MSPAirTight Networks
 
AirTight Networks WIPS at Wireless Field Day 6 WFD6
AirTight Networks WIPS at Wireless Field Day 6 WFD6AirTight Networks WIPS at Wireless Field Day 6 WFD6
AirTight Networks WIPS at Wireless Field Day 6 WFD6AirTight Networks
 
AirTight social wifi solution brief
AirTight social wifi solution briefAirTight social wifi solution brief
AirTight social wifi solution briefAirTight Networks
 
Considerations for a secure enterprise wlan data connectors 2013
Considerations for a secure enterprise wlan   data connectors 2013Considerations for a secure enterprise wlan   data connectors 2013
Considerations for a secure enterprise wlan data connectors 2013AirTight Networks
 
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...AirTight Networks
 
Survey on the Impact of BYOD on Enterprise Security
Survey on the Impact of BYOD on Enterprise SecuritySurvey on the Impact of BYOD on Enterprise Security
Survey on the Impact of BYOD on Enterprise SecurityAirTight Networks
 
AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...
AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...
AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...AirTight Networks
 
Non WiFi interference combat guide 1
Non WiFi interference combat guide 1Non WiFi interference combat guide 1
Non WiFi interference combat guide 1AirTight Networks
 
WPA2 Hole196 Vulnerability: Exploits and Remediation Strategies
WPA2 Hole196 Vulnerability: Exploits and Remediation StrategiesWPA2 Hole196 Vulnerability: Exploits and Remediation Strategies
WPA2 Hole196 Vulnerability: Exploits and Remediation StrategiesAirTight Networks
 
Conquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the EnterpriseConquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the EnterpriseAirTight Networks
 
Windows 7 - A New Wireless Risk to the Enterprise
Windows 7 - A New Wireless Risk to the EnterpriseWindows 7 - A New Wireless Risk to the Enterprise
Windows 7 - A New Wireless Risk to the EnterpriseAirTight Networks
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsAirTight Networks
 
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And CountermeasuresSkyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And CountermeasuresAirTight Networks
 
Retail Stores and Wireless Security—Recommendations
Retail Stores and Wireless Security—RecommendationsRetail Stores and Wireless Security—Recommendations
Retail Stores and Wireless Security—RecommendationsAirTight Networks
 
Wireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your EnterpriseWireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your EnterpriseAirTight Networks
 

Más de AirTight Networks (20)

Air tight 11ac webinar series session 2 - 11ac feature deep dive - june 2014
Air tight 11ac webinar series   session 2 - 11ac feature deep dive - june 2014Air tight 11ac webinar series   session 2 - 11ac feature deep dive - june 2014
Air tight 11ac webinar series session 2 - 11ac feature deep dive - june 2014
 
Wi-Fi Offload Summit - Monetise Thyself
Wi-Fi Offload Summit - Monetise ThyselfWi-Fi Offload Summit - Monetise Thyself
Wi-Fi Offload Summit - Monetise Thyself
 
AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014
AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014
AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014
 
Restaurant Wi-Fi Primer: Retail Analytics and Social Integration
Restaurant Wi-Fi Primer: Retail Analytics and Social Integration Restaurant Wi-Fi Primer: Retail Analytics and Social Integration
Restaurant Wi-Fi Primer: Retail Analytics and Social Integration
 
AirTight Networks Evolution - Cloud & MSP
AirTight Networks Evolution - Cloud & MSPAirTight Networks Evolution - Cloud & MSP
AirTight Networks Evolution - Cloud & MSP
 
AirTight Networks WIPS at Wireless Field Day 6 WFD6
AirTight Networks WIPS at Wireless Field Day 6 WFD6AirTight Networks WIPS at Wireless Field Day 6 WFD6
AirTight Networks WIPS at Wireless Field Day 6 WFD6
 
AirTight social wifi solution brief
AirTight social wifi solution briefAirTight social wifi solution brief
AirTight social wifi solution brief
 
Considerations for a secure enterprise wlan data connectors 2013
Considerations for a secure enterprise wlan   data connectors 2013Considerations for a secure enterprise wlan   data connectors 2013
Considerations for a secure enterprise wlan data connectors 2013
 
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
 
Survey on the Impact of BYOD on Enterprise Security
Survey on the Impact of BYOD on Enterprise SecuritySurvey on the Impact of BYOD on Enterprise Security
Survey on the Impact of BYOD on Enterprise Security
 
AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...
AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...
AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...
 
Non WiFi interference combat guide 1
Non WiFi interference combat guide 1Non WiFi interference combat guide 1
Non WiFi interference combat guide 1
 
WPA2 Hole196 Vulnerability: Exploits and Remediation Strategies
WPA2 Hole196 Vulnerability: Exploits and Remediation StrategiesWPA2 Hole196 Vulnerability: Exploits and Remediation Strategies
WPA2 Hole196 Vulnerability: Exploits and Remediation Strategies
 
Conquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the EnterpriseConquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the Enterprise
 
Windows 7 - A New Wireless Risk to the Enterprise
Windows 7 - A New Wireless Risk to the EnterpriseWindows 7 - A New Wireless Risk to the Enterprise
Windows 7 - A New Wireless Risk to the Enterprise
 
802.11w Tutorial
802.11w Tutorial802.11w Tutorial
802.11w Tutorial
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and Solutions
 
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And CountermeasuresSkyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
 
Retail Stores and Wireless Security—Recommendations
Retail Stores and Wireless Security—RecommendationsRetail Stores and Wireless Security—Recommendations
Retail Stores and Wireless Security—Recommendations
 
Wireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your EnterpriseWireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your Enterprise
 

Último

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Último (20)

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

AirTight Secure Wi-Fi: One Solution. Many Answers.

  • 1. AIRTIGHT NETWORKS SOLUTIONS BRIEF AirTight Secure Wi-Fi™ One Solution. Many Answers. In today’s age of smartphones, tablets and mobile apps, users expect Wi-Fi wherever they go. What was once considered a special service to customers has become such a commodity that businesses risk turning customers away if they don’t offer Wi-Fi. Besides, Wi-Fi has opened new opportunities for businesses to better engage their customers and to improve service efficiency, in turn resulting in increased revenue. However, for quick-serve restaurant and retail store chains, PCI DSS compliance is also a top priority and security implications of adding Wi-Fi is naturally a concern. AirTight Secure Wi-Fi™ combines the benefits of Wi-Fi access with industry’s best wireless intrusion prevention and security technology in a single solution, enabling businesses to provide hassle-free Wi-Fi access, while securing their network from Wi-Fi threats and staying PCI compliant. Key Features • IEEE 802.11a/b/g/n protocols Nurturing Customer Relations Offering Wi-Fi, especially if it’s free, is a proven way to attract customers; however, you can • WPA/WPA2 security with PSK go beyond simply providing the convenience of Internet access to guests. AirTight Secure and 802.1x authentication Wi-Fi can be used to creatively leverage the revolution of smart devices and mobile apps for expanding your relationship with customers. • Multi-VLAN and -SSID support Engage using Social Media, Customized Content and Geo-marketing • Multiple modes of operation: full AP, AP/sensor combo and full Your business could use social media tools to communicate with guests even when they sensor are on-site. A customized content feed to guests could offer valuable information, e.g., newly introduced items on the menu, rewards programs, polls to get feedback on food • Automated wireless scanning and service, and contests. powered by industry’s best wireless IPS technology • Consolidated wireless PCI DSS compliance reporting • Customizable captive portal for localized experience • Cloud-based management • Ideal for geographically distributed locations with unlimited scalability © 2011 AirTight Networks, Inc. All rights reserved. 1
  • 2. AIRTIGHT NETWORKS SOLUTIONS BRIEF Wi-Fi captive portals could be customized for groups of restaurants or individual outlets for localized marketing, e.g., to push coupons, announce daily specials, inform about Key Benefits fundraising programs for non-profits, and advertise career opportunities. • Plug and play deployment Customers can be encouraged to register their information to participate in localized eliminates need for IT support opt-in marketing programs. Emerging geo-marketing mobile apps could be integrated at remote locations with Wi-Fi access to explore new ways of engaging guests. • Cloud-based management simplifies the management Maximizing Service Efficiency of thousands of geographically AirTight Secure Wi-Fi can help you to bring efficiencies to the service floor—busting long distributed locations lines and boosting the average order size and the number of orders catered per day. • Hierarchical location-based Cater Orders with Mobile PoS management simplifies policy Wait staff can use dedicated Wi-Fi PoS handhelds or repurpose smartphones and tablets definition and enforcement with PoS apps to take orders and swipe credit cards at the tables or when customers are waiting in line or even on demand if cars line up at the drive thru. Card transactions over • Pay-as-you-go subscription AirTight Secure Wi-Fi can be protected using the state-of-the-art WPA2/AES encryption pricing eliminates capital and 802.1x authentication. expenditure AirTight’s Wi-Fi access solution is vendor agnostic when it comes to supporting Wi-Fi • A single solution for Wi-Fi access, certified mobile PoS terminals. So you can make decisions about Wi-Fi PoS products security and PCI compliance that independently and future-proof its investment. delivers the best ROI Wireless Self-service Kiosks without the Hefty Service Fees Wireless kiosks are fast becoming popular among quick-serve restaurants for allowing patrons to place orders without waiting in long lines. However, high service fees for 3G/4G kiosks have been prohibitive. With AirTight Secure Wi-Fi in the outlets, you can simply deploy Wi-Fi kiosks and completely eliminate the recurring hefty 3G/4G fees. BEFORE AFTER © 2011 AirTight Networks, Inc. All rights reserved. 2
  • 3. AIRTIGHT NETWORKS SOLUTIONS BRIEF In-store Online Ordering About AirTight Networks In-store online ordering is another way to enable self-service for guests without the need for dedicated kiosks. AirTight Networks is the global leader in wireless security and The captive portal on AirTight Secure Wi-Fi access points could be customized with your compliance products and services, company branding and designed to inform customers about special offers and allow providing customers best-of- them to place orders from their Wi-Fi devices. Customers can enjoy the Internet access breed technology to automatically while their orders get ready, instead of standing in a long line or waiting for their turn at detect, classify, locate and block the drive thru. all current and emerging wireless threats. AirTight offers industry’s leading wireless intrusion Staying Secure and Compliant prevention system (WIPS) and the While you maximize the business benefits of Wi-Fi access, AirTight Secure Wi-Fi will scan world’s only SaaS based wireless for wireless vulnerabilities such as rogue access points and ensure that your enterprise security, compliance and Wi-Fi remains protected and meets the wireless security requirements of PCI DSS compliance. access branded as AirTight Cloud Services™. AirTight’s award- Each AirTight Wi-Fi access point can support multiple wireless networks. You can run winning solutions are used by a guest Wi-Fi hotspot alongside an encrypted Wi-Fi network for processing credit card customers globally in the financial, transactions or for transmitting other corporate data. AirTight will completely separate government, retail and hospitality, the wireless networks so that the guest network data never mixes with the secure manufacturing, transportation, corporate data. This ensures that your corporate networks and data remain isolated from education, health care, telecom, guest Wi-Fi access. and technology industries. AirTight As the industry’s first and still the only cloud-based solution, AirTight Secure Wi-Fi owns the seminal patents for simplifies the centralized management of Wi-Fi access and security across thousands of wireless intrusion prevention geographically distributed locations as compared to traditional Wi-Fi solutions. Its plug technology with 20 U.S. patents and play deployment and ease of use eliminates the need for IT staff at remote locations. and three international patents granted (Australia, Japan and UK), and more than 20 additional patents pending. AirTight Networks is a privately held company based in Mountain View, CA. For more information please visit: www.airtightnetworks.com. AirTight and SpectraGuard are registered trademarks of AirTight Networks, Inc. AirTight Networks, AirTight Networks logo, AirTight Cloud Services and AirTight Secure Wi-Fi are trademarks. All other trademarks are the property of their respective owners. PCI DSS Wireless Compliance Report Centralized Management of Wi-Fi Access and Security from a Single Console The Global Leader in Wireless Security and Compliance Solutions AirTight Networks, Inc. 339 N. Bernardo Avenue #200, Mountain View, CA 94043 T +1.877.424.7844 T 650.961.1111 F 650.961.1169 www.airtightnetworks.com info@airtightnetworks.com © 2011 AirTight Networks, Inc. All rights reserved. AirTight Networks and the AirTight Networks logo are trademarks, and AirTight and SpectraGuard are registered trademarks of AirTight Networks, Inc. All other trademarks mentioned herein are properties of their respective owners. Specifications are subject to change without notice.