SlideShare a Scribd company logo
1 of 6
Download to read offline
AIRTIGHT NETWORKS           WHITE PAPER




Wireless Security Online, On-Demand
Cost-effective, Customizable, Effortless, and Proactive Management
of Your Wireless Threat Exposure

A White Paper by AirTight Networks, Inc.


339 N. Bernardo Avenue, Suite 200, Mountain View, CA 94043
www.airtightnetworks.com




                                                                     © 2008 AirTight Networks, Inc. All rights reserved.
AIRTIGHT NETWORKS         WHITE   PAPER




Wireless Security Online, On-Demand




                                      Executive summary

                                      Traditionally, wireless security has been viewed as an “onsite” activity
                                      that requires strategic long-term investment and consumes significant IT
                                      administrative resources. Due to high upfront costs, small- and medium-
                                      size enterprises and those with limited wireless LAN deployment shy
                                      away from wireless security leaving them exposed and liable.

                                      This whitepaper introduces a novel way for enabling on-demand wireless security that
                                      is affordable, effortless, and customizable. In this new architecture, wireless security is
                                      delivered over the Internet bringing a revolutionary change in how businesses manage
                                      their wireless threat exposure. Depending on their needs, businesses choose and pay
                                      only for the value they derive from this online wireless security service. Large wireless
                                      deployments at multiple sites worldwide and small, single WLAN deployments are
                                      served equally well. Even businesses with a “no WiFi” policy can avail this service to
                                      simply enforce their policy.

                                      AirTight Networks’ SpectraGuard Online (SGO) enables all these benefits, allowing you to
                                      manage your wireless threat exposure without leaving your desk. If you can browse the
                                      Web, you can be wireless-secure with SGO.




                                      © 2008 AirTight Networks, Inc. All rights reserved.                                           2
AIRTIGHT NETWORKS         WHITE PAPER




Wireless Security Online, On-Demand




                                        Wireless Security: The State of Affairs
                                        Adoption of appropriate wireless security measures is lagging far behind the escalating
                                        presence of wireless. Two main reasons for this lethargy are: lack of awareness and
                                        rigid solutions.

                                        Lack of awareness
                                        Businesses are unable to assess their susceptibility to wireless vulnerabilities and in turn
                                        fail to acknowledge the escalating risks. As a result, many do not have a formal wireless
                                        security policy in place, while some get a false sense of security by only encrypting
                                        over-the-air data or installing a wireless LAN behind a firewall. And malicious hackers
                                        are exploiting these security holes galore.

                                        Rigid solutions
                                        The threat perception and security requirements vary considerably across businesses
                                        depending on their volume of wireless usage (or dependency on wireless), their liability,
                                        and the cost. But, most contemporary solutions adopt an “all-or-nothing” approach,
                                        unable to meet these diverse needs. Small- and medium-size enterprises (SMEs) find the
                                        upfront cost of a full-fledged wireless intrusion prevention system (WIPS) too high and
                                        cannot take on the administrative responsibilities for onsite maintenance of equipment.

                                        Need of the hour
                                        To solve this two-headed problem, we need a solution that:

                                           Helps enterprises of all kinds and sizes to quickly assess their threat exposure;

                                           Guides them about and lets them choose from different types of remedial actions;

                                           Eases the burden of prohibitive costs making wireless security accessible to SMEs; and

                                           Eliminates the administration of third-party hardware and software onsite.

                                        Web-based Wireless Security
                                        Web-based wireless security architecture—a radical departure from the conventional
                                        “onsite” approach—leverages the Software as a Service (SaaS) model to offer wireless
                                        security online, on-demand. Customers do not buy equipment. Instead, plug-and-play
                                        wireless scanners monitor the airspace. The scanners automatically connect to a centralized
                                        server over a secure connection. The server is powered with an up-to-date vulnerability
                                        database and housed in a secure datacenter. Users access the wireless security portal via
                                        a Web browser; no special software is needed.




                                        © 2008 AirTight Networks, Inc. All rights reserved.                                            3
AIRTIGHT NETWORKS         WHITE PAPER




Wireless Security Online, On-Demand




                                        This innovative approach provides the following key benefits.

                                        1. Zero-day attack protection
                                           The Web-based model eliminates the risk of obsolescence, providing zero-day
                                           attack protection. The central vulnerability database is continually updated making
                                           these changes instantly available to customers.

                                        2. No more software upgrades
                                           The central server and vulnerability database offer the latest functionality every time
                                           users access the service, which means that customers no longer need to fix bugs and
                                           download patches or wait for the next product release.

                                        3. No more hardware maintenance
                                           Businesses are relieved from buying and lugging expensive equipment onsite. Free
                                           from the headache of managing auxiliary infrastructure, businesses can focus on their
                                           core competence, and IT personnel can focus on their company’s daily operations
                                           rather than troubleshooting third-party software and equipment.

                                        4. Pay-as-you-go
                                           By eliminating high upfront costs and facilitating IT cost-savings, wireless security is
                                           accessible to small- and medium-size enterprises that can afford paying for the service
                                           in easy, periodic installments.

                                        5. Value-based, customizable service
                                           From the various features that comprise wireless vulnerability assessment and
                                           remediation, customers can subscribe to only those value propositions that benefit
                                           them. Further, customers can configure the application to customize the way it looks
                                           and behaves offering a unique user experience.

                                        6. Anywhere, anytime access
                                           With the service available via any Web browser, users can monitor the wireless security
                                           posture of any of their facilities without leaving their desk or from anywhere else on the
                                           Internet; direct or VPN access to their corporate network is not needed. User access can
                                           of course be controlled by system administrators by defining different privileges.

                                        7. Scalability
                                           The service provisioning is fully distributed and scalable. Multiple subscribers can
                                           simultaneously access their wireless security portal via identical instances hosted
                                           on multiple servers.




                                        © 2008 AirTight Networks, Inc. All rights reserved.                                             4
AIRTIGHT NETWORKS         WHITE PAPER




Wireless Security Online, On-Demand




                                        SpectraGuard Online™
                                        AirTight Networks’ SpectraGuard Online (SGO) is the first and only product that delivers
                                        all the above benefits. SGO offers a monthly subscription-based wireless security auditing
                                        and vulnerability management service. It includes AirTight’s plug-and-play wireless scanners
                                        that are preconfigured and maintenance-free. Enterprises can scan their facilities world-
                                        wide unlimited number of times without leaving their desk. AirTight Networks’ patented
                                        location-based policy management makes this real easy.




                                                Figure 1. SpectraGuard Online Architecture



                                        SGO audits wireless vulnerabilities inside your network as well as those outside your
                                        premises that pose a threat. Customers can choose to subscribe to different levels of
                                        vulnerability assessment, regulatory compliance and remediation. The service enables:

                                           Airspace assessment—essentially the threat level of your environment;

                                           Vulnerability assessment by classifying your critical assets and gaining a “hacker’s eye
                                           view” of your network’s security posture;

                                           Compliance with legislative regulations (e.g., PCI, HIPAA, DoD, SOX, GLBA) from a wireless
                                           perspective for the various segments such as retail, finance, healthcare, and education;

                                           Location tracking of vulnerabilities or anomalous activities once they are detected;

                                           Guidance about manual remedial actions whenever possible; or

                                           Automated 24x7 wireless monitoring and protection.




                                        © 2008 AirTight Networks, Inc. All rights reserved.                                           5
AIRTIGHT NETWORKS                        WHITE PAPER




Wireless Security Online, On-Demand




                                                               The subscription can grow organically in both features and scope of scanning
                                                               depending on customers’ needs and wireless threat perception.

                                                               About AirTight Networks
                                                               AirTight Networks is the industry standard for wireless vulnerability management
                                                               and the only company that offers a flexible, end-to-end solution that gives customers
                                                               visibility into their wireless security posture and a choice in how they manage it. AirTight’s
                                                               SpectraGuard Enterprise provides a robust wireless intrusion prevention system (WIPS).
                                                               Its SpectraGuard Online service is the world’s first on demand wireless vulnerability
                                                               management service which provides a flexible approach to addressing wireless vulner-
                                                               abilities with no capital investment. AirTight’s patented technology delivers the key
                                                               elements of an effective WIPS to eliminate false alarms, block wireless threats immediately
                                                               and automatically and locate wireless devices and events with pinpoint precision. AirTight’s
                                                               customers include global retail, financial services, corporate, education and government
                                                               organizations. AirTight Networks is a privately held company based in Mountain View, CA.
                                                               For more information please visit www.airtightnetworks.com




Wireless Vulnerability Management
AirTight Networks, Inc. 339 N. Bernardo Avenue #200, Mountain View, CA 94043
T +1.877.424.7844 T 650.961.1111 F 650.961.1169 www.airtightnetworks.com info@airtightnetworks.com
© 2008 AirTight Networks, Inc. All rights reserved. AirTight Networks and the AirTight Networks logo are trademarks, and
AirTight and SpectraGuard are registered trademarks of AirTight Networks, Inc. All other trademarks mentioned herein are
properties of their respective owners. Specifications are subject to change without notice.

More Related Content

Viewers also liked

Wireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your EnterpriseWireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your EnterpriseAirTight Networks
 
Is 11ac Right for Your Network?
Is 11ac Right for Your Network?Is 11ac Right for Your Network?
Is 11ac Right for Your Network?AirTight Networks
 
AirTight Networks WIPS at Wireless Field Day 6 WFD6
AirTight Networks WIPS at Wireless Field Day 6 WFD6AirTight Networks WIPS at Wireless Field Day 6 WFD6
AirTight Networks WIPS at Wireless Field Day 6 WFD6AirTight Networks
 
Financial Districs Wi Fi Scan
Financial Districs Wi Fi ScanFinancial Districs Wi Fi Scan
Financial Districs Wi Fi ScanAirTight Networks
 
WPA2 Hole196 Vulnerability: Exploits and Remediation Strategies
WPA2 Hole196 Vulnerability: Exploits and Remediation StrategiesWPA2 Hole196 Vulnerability: Exploits and Remediation Strategies
WPA2 Hole196 Vulnerability: Exploits and Remediation StrategiesAirTight Networks
 
AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014
AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014
AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014AirTight Networks
 
Air tight 11ac webinar series session 2 - 11ac feature deep dive - june 2014
Air tight 11ac webinar series   session 2 - 11ac feature deep dive - june 2014Air tight 11ac webinar series   session 2 - 11ac feature deep dive - june 2014
Air tight 11ac webinar series session 2 - 11ac feature deep dive - june 2014AirTight Networks
 
Restaurant Wi-Fi Primer: Retail Analytics and Social Integration
Restaurant Wi-Fi Primer: Retail Analytics and Social Integration Restaurant Wi-Fi Primer: Retail Analytics and Social Integration
Restaurant Wi-Fi Primer: Retail Analytics and Social Integration AirTight Networks
 

Viewers also liked (9)

Wireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your EnterpriseWireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your Enterprise
 
Is 11ac Right for Your Network?
Is 11ac Right for Your Network?Is 11ac Right for Your Network?
Is 11ac Right for Your Network?
 
AirTight Networks WIPS at Wireless Field Day 6 WFD6
AirTight Networks WIPS at Wireless Field Day 6 WFD6AirTight Networks WIPS at Wireless Field Day 6 WFD6
AirTight Networks WIPS at Wireless Field Day 6 WFD6
 
Financial Districs Wi Fi Scan
Financial Districs Wi Fi ScanFinancial Districs Wi Fi Scan
Financial Districs Wi Fi Scan
 
WPA2 Hole196 Vulnerability: Exploits and Remediation Strategies
WPA2 Hole196 Vulnerability: Exploits and Remediation StrategiesWPA2 Hole196 Vulnerability: Exploits and Remediation Strategies
WPA2 Hole196 Vulnerability: Exploits and Remediation Strategies
 
802.11w Tutorial
802.11w Tutorial802.11w Tutorial
802.11w Tutorial
 
AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014
AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014
AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014
 
Air tight 11ac webinar series session 2 - 11ac feature deep dive - june 2014
Air tight 11ac webinar series   session 2 - 11ac feature deep dive - june 2014Air tight 11ac webinar series   session 2 - 11ac feature deep dive - june 2014
Air tight 11ac webinar series session 2 - 11ac feature deep dive - june 2014
 
Restaurant Wi-Fi Primer: Retail Analytics and Social Integration
Restaurant Wi-Fi Primer: Retail Analytics and Social Integration Restaurant Wi-Fi Primer: Retail Analytics and Social Integration
Restaurant Wi-Fi Primer: Retail Analytics and Social Integration
 

More from AirTight Networks

AirTight Networks Evolution - Cloud & MSP
AirTight Networks Evolution - Cloud & MSPAirTight Networks Evolution - Cloud & MSP
AirTight Networks Evolution - Cloud & MSPAirTight Networks
 
AirTight social wifi solution brief
AirTight social wifi solution briefAirTight social wifi solution brief
AirTight social wifi solution briefAirTight Networks
 
Non WiFi interference combat guide 1
Non WiFi interference combat guide 1Non WiFi interference combat guide 1
Non WiFi interference combat guide 1AirTight Networks
 
WPA2 Hole196 Vulnerability FAQs
WPA2 Hole196 Vulnerability FAQsWPA2 Hole196 Vulnerability FAQs
WPA2 Hole196 Vulnerability FAQsAirTight Networks
 
Windows 7 - A New Wireless Risk to the Enterprise
Windows 7 - A New Wireless Risk to the EnterpriseWindows 7 - A New Wireless Risk to the Enterprise
Windows 7 - A New Wireless Risk to the EnterpriseAirTight Networks
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsAirTight Networks
 
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And CountermeasuresSkyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And CountermeasuresAirTight Networks
 
802.11n The Good, The Bad, and The Ugly: Will You Be Ready?
802.11n The Good, The Bad, and The Ugly: Will You Be Ready?802.11n The Good, The Bad, and The Ugly: Will You Be Ready?
802.11n The Good, The Bad, and The Ugly: Will You Be Ready?AirTight Networks
 
When WLANs Launch Self DoS Attacks
When WLANs Launch Self DoS AttacksWhen WLANs Launch Self DoS Attacks
When WLANs Launch Self DoS AttacksAirTight Networks
 
Air Tight Airport Wi Fi Scan Analysis
Air Tight Airport Wi Fi Scan AnalysisAir Tight Airport Wi Fi Scan Analysis
Air Tight Airport Wi Fi Scan AnalysisAirTight Networks
 

More from AirTight Networks (11)

AirTight Networks Evolution - Cloud & MSP
AirTight Networks Evolution - Cloud & MSPAirTight Networks Evolution - Cloud & MSP
AirTight Networks Evolution - Cloud & MSP
 
AirTight social wifi solution brief
AirTight social wifi solution briefAirTight social wifi solution brief
AirTight social wifi solution brief
 
Non WiFi interference combat guide 1
Non WiFi interference combat guide 1Non WiFi interference combat guide 1
Non WiFi interference combat guide 1
 
WPA2 Hole196 Vulnerability FAQs
WPA2 Hole196 Vulnerability FAQsWPA2 Hole196 Vulnerability FAQs
WPA2 Hole196 Vulnerability FAQs
 
Windows 7 - A New Wireless Risk to the Enterprise
Windows 7 - A New Wireless Risk to the EnterpriseWindows 7 - A New Wireless Risk to the Enterprise
Windows 7 - A New Wireless Risk to the Enterprise
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and Solutions
 
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And CountermeasuresSkyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
 
802.11n The Good, The Bad, and The Ugly: Will You Be Ready?
802.11n The Good, The Bad, and The Ugly: Will You Be Ready?802.11n The Good, The Bad, and The Ugly: Will You Be Ready?
802.11n The Good, The Bad, and The Ugly: Will You Be Ready?
 
When WLANs Launch Self DoS Attacks
When WLANs Launch Self DoS AttacksWhen WLANs Launch Self DoS Attacks
When WLANs Launch Self DoS Attacks
 
Caffe Latte Attack
Caffe Latte AttackCaffe Latte Attack
Caffe Latte Attack
 
Air Tight Airport Wi Fi Scan Analysis
Air Tight Airport Wi Fi Scan AnalysisAir Tight Airport Wi Fi Scan Analysis
Air Tight Airport Wi Fi Scan Analysis
 

Recently uploaded

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

Wireless Security Online, On-Demand

  • 1. AIRTIGHT NETWORKS WHITE PAPER Wireless Security Online, On-Demand Cost-effective, Customizable, Effortless, and Proactive Management of Your Wireless Threat Exposure A White Paper by AirTight Networks, Inc. 339 N. Bernardo Avenue, Suite 200, Mountain View, CA 94043 www.airtightnetworks.com © 2008 AirTight Networks, Inc. All rights reserved.
  • 2. AIRTIGHT NETWORKS WHITE PAPER Wireless Security Online, On-Demand Executive summary Traditionally, wireless security has been viewed as an “onsite” activity that requires strategic long-term investment and consumes significant IT administrative resources. Due to high upfront costs, small- and medium- size enterprises and those with limited wireless LAN deployment shy away from wireless security leaving them exposed and liable. This whitepaper introduces a novel way for enabling on-demand wireless security that is affordable, effortless, and customizable. In this new architecture, wireless security is delivered over the Internet bringing a revolutionary change in how businesses manage their wireless threat exposure. Depending on their needs, businesses choose and pay only for the value they derive from this online wireless security service. Large wireless deployments at multiple sites worldwide and small, single WLAN deployments are served equally well. Even businesses with a “no WiFi” policy can avail this service to simply enforce their policy. AirTight Networks’ SpectraGuard Online (SGO) enables all these benefits, allowing you to manage your wireless threat exposure without leaving your desk. If you can browse the Web, you can be wireless-secure with SGO. © 2008 AirTight Networks, Inc. All rights reserved. 2
  • 3. AIRTIGHT NETWORKS WHITE PAPER Wireless Security Online, On-Demand Wireless Security: The State of Affairs Adoption of appropriate wireless security measures is lagging far behind the escalating presence of wireless. Two main reasons for this lethargy are: lack of awareness and rigid solutions. Lack of awareness Businesses are unable to assess their susceptibility to wireless vulnerabilities and in turn fail to acknowledge the escalating risks. As a result, many do not have a formal wireless security policy in place, while some get a false sense of security by only encrypting over-the-air data or installing a wireless LAN behind a firewall. And malicious hackers are exploiting these security holes galore. Rigid solutions The threat perception and security requirements vary considerably across businesses depending on their volume of wireless usage (or dependency on wireless), their liability, and the cost. But, most contemporary solutions adopt an “all-or-nothing” approach, unable to meet these diverse needs. Small- and medium-size enterprises (SMEs) find the upfront cost of a full-fledged wireless intrusion prevention system (WIPS) too high and cannot take on the administrative responsibilities for onsite maintenance of equipment. Need of the hour To solve this two-headed problem, we need a solution that: Helps enterprises of all kinds and sizes to quickly assess their threat exposure; Guides them about and lets them choose from different types of remedial actions; Eases the burden of prohibitive costs making wireless security accessible to SMEs; and Eliminates the administration of third-party hardware and software onsite. Web-based Wireless Security Web-based wireless security architecture—a radical departure from the conventional “onsite” approach—leverages the Software as a Service (SaaS) model to offer wireless security online, on-demand. Customers do not buy equipment. Instead, plug-and-play wireless scanners monitor the airspace. The scanners automatically connect to a centralized server over a secure connection. The server is powered with an up-to-date vulnerability database and housed in a secure datacenter. Users access the wireless security portal via a Web browser; no special software is needed. © 2008 AirTight Networks, Inc. All rights reserved. 3
  • 4. AIRTIGHT NETWORKS WHITE PAPER Wireless Security Online, On-Demand This innovative approach provides the following key benefits. 1. Zero-day attack protection The Web-based model eliminates the risk of obsolescence, providing zero-day attack protection. The central vulnerability database is continually updated making these changes instantly available to customers. 2. No more software upgrades The central server and vulnerability database offer the latest functionality every time users access the service, which means that customers no longer need to fix bugs and download patches or wait for the next product release. 3. No more hardware maintenance Businesses are relieved from buying and lugging expensive equipment onsite. Free from the headache of managing auxiliary infrastructure, businesses can focus on their core competence, and IT personnel can focus on their company’s daily operations rather than troubleshooting third-party software and equipment. 4. Pay-as-you-go By eliminating high upfront costs and facilitating IT cost-savings, wireless security is accessible to small- and medium-size enterprises that can afford paying for the service in easy, periodic installments. 5. Value-based, customizable service From the various features that comprise wireless vulnerability assessment and remediation, customers can subscribe to only those value propositions that benefit them. Further, customers can configure the application to customize the way it looks and behaves offering a unique user experience. 6. Anywhere, anytime access With the service available via any Web browser, users can monitor the wireless security posture of any of their facilities without leaving their desk or from anywhere else on the Internet; direct or VPN access to their corporate network is not needed. User access can of course be controlled by system administrators by defining different privileges. 7. Scalability The service provisioning is fully distributed and scalable. Multiple subscribers can simultaneously access their wireless security portal via identical instances hosted on multiple servers. © 2008 AirTight Networks, Inc. All rights reserved. 4
  • 5. AIRTIGHT NETWORKS WHITE PAPER Wireless Security Online, On-Demand SpectraGuard Online™ AirTight Networks’ SpectraGuard Online (SGO) is the first and only product that delivers all the above benefits. SGO offers a monthly subscription-based wireless security auditing and vulnerability management service. It includes AirTight’s plug-and-play wireless scanners that are preconfigured and maintenance-free. Enterprises can scan their facilities world- wide unlimited number of times without leaving their desk. AirTight Networks’ patented location-based policy management makes this real easy. Figure 1. SpectraGuard Online Architecture SGO audits wireless vulnerabilities inside your network as well as those outside your premises that pose a threat. Customers can choose to subscribe to different levels of vulnerability assessment, regulatory compliance and remediation. The service enables: Airspace assessment—essentially the threat level of your environment; Vulnerability assessment by classifying your critical assets and gaining a “hacker’s eye view” of your network’s security posture; Compliance with legislative regulations (e.g., PCI, HIPAA, DoD, SOX, GLBA) from a wireless perspective for the various segments such as retail, finance, healthcare, and education; Location tracking of vulnerabilities or anomalous activities once they are detected; Guidance about manual remedial actions whenever possible; or Automated 24x7 wireless monitoring and protection. © 2008 AirTight Networks, Inc. All rights reserved. 5
  • 6. AIRTIGHT NETWORKS WHITE PAPER Wireless Security Online, On-Demand The subscription can grow organically in both features and scope of scanning depending on customers’ needs and wireless threat perception. About AirTight Networks AirTight Networks is the industry standard for wireless vulnerability management and the only company that offers a flexible, end-to-end solution that gives customers visibility into their wireless security posture and a choice in how they manage it. AirTight’s SpectraGuard Enterprise provides a robust wireless intrusion prevention system (WIPS). Its SpectraGuard Online service is the world’s first on demand wireless vulnerability management service which provides a flexible approach to addressing wireless vulner- abilities with no capital investment. AirTight’s patented technology delivers the key elements of an effective WIPS to eliminate false alarms, block wireless threats immediately and automatically and locate wireless devices and events with pinpoint precision. AirTight’s customers include global retail, financial services, corporate, education and government organizations. AirTight Networks is a privately held company based in Mountain View, CA. For more information please visit www.airtightnetworks.com Wireless Vulnerability Management AirTight Networks, Inc. 339 N. Bernardo Avenue #200, Mountain View, CA 94043 T +1.877.424.7844 T 650.961.1111 F 650.961.1169 www.airtightnetworks.com info@airtightnetworks.com © 2008 AirTight Networks, Inc. All rights reserved. AirTight Networks and the AirTight Networks logo are trademarks, and AirTight and SpectraGuard are registered trademarks of AirTight Networks, Inc. All other trademarks mentioned herein are properties of their respective owners. Specifications are subject to change without notice.