AirTight SpectraGuard Products Achieve FIPS 140-2 and DISA UC APL Certification

AirTight’s flagship product, SpectraGuard® Enterprise, achieved FIPS 140-2 validation from the National Institute of Standards and Technology (NIST) of the United States and the Communications Security Establishment of Canada (CSEC). Simultaneously, AirTight’s SpectraGuard Server TIC tests for inclusion on the DISA UC APL. The DISA UC APL is the single consolidate list of products that have completed interoperability (IO) and information assurance (IA) certification.   Read more

Skyjacking attack – then Cisco, now Aruba?

skykacking

Recall “Skyjacking” vulnerability discovered with Cisco LAPs couple of years ago? It allowed hacker to transfer control of enterprise Cisco LAPs from enterprise WLC to hacker controlled WLC in the Internet with over-the-air attack. Once control is transferred, the hacker could change configuration on those LAPs in any way by adding, deleting and modifying SSIDs. The hacker could… Read More

AirTight Rated “Strong Positive” by Leading Analyst Firm

2011 Gartner Marketscope On Wireless LAN IPS matrix

  We are really excited here at AirTight.  AirTight achieved a rating of “Strong Positive” in Gartner’s 2011 Marketscope Report for Wireless LAN Intrusion Prevention Systems. published this week.  “Strong Positive” is the highest possible rating in a Gartner Marketscope. The July 2011 report was authored by John Girard, VP, Distinguished Analyst, John Pescatore, VP,… Read More

IMF, Citigroup, Sony Hacks – Security Lessons to be learned

This article in Information Week  by Mathew J. Schwartz is well worth reading. It is time that security came first and compliance second IMHO. Click on the link below and I would love your feedback on the article and my comments. ———————————————————————————————————————————————– What Do IMF, Citigroup, And Sony Hacks Share? Mathew J. Schwartz, “Many organizations have… Read More

WIPS complements MDM security by blocking personal smart devices

With the explosive growth of smart devices in the enterprise, Mobile Device Management (MDM) is a hot topic among IT departments these days.  In order to secure the network and protect sensitive data on mobile endpoints, many organizations are deploying tools to secure, monitor, and manage smart devices accessing their networks.  Installing an MDM agent on… Read More

Android found vulnerable to sidejacking!

sad_android-200x200

Last Friday, a vulnerability in Google’s ClientLogin Protocol was disclosed that makes most Android users vulnerable to “sidejacking.” All services (Calender, Contacts, Picasa, Stock Quotes, etc.) that use the Google’s ClientLogin API for “Auto Sync” are vulnerable.  Sidejacking (aka session hijacking) is not new to Wi-Fi. Firesheep that caused a stir last October is a recent example of… Read More

AirTight demos PCI and WiFi cloud solutions at NACStech conference

AirTight Networks will be demonstrating cloud-based PCI compliance and Wi-Fi access solutions at the NACStech conference in Las Vegas, May 16-18. AirTight Cloud Services provides scanning for, detection of, and prevention against rogue access points (APs) and other wireless vulnerabilities to satisfy PCI compliance requirements, while laying the foundation for strategic wireless initiatives in the… Read More

SMBs, WEP still a target for War Drivers

After the TJX breach, the PCI security council strengthened their wireless security standard in an attempt to prevent such catastrophic incidents from reoccurring.  While some of the largest retailers strengthened their wireless security, small and medium businesses need to take a look at their own security practices because they are just as susceptible, maybe more. … Read More

Webinar 4/26 – Smartphones Outsmarting Your Network Security Perimieter?

Are iPhone, iPads, Smartphones and Droids outsmarting your network security perimeter? The consumerization of smart phones is now perceived as top threat to the enterprise network security.AirTight CTO, Pravin Bhagwat, will describe the threat scenarios posed by the proliferation of smartphones and discuss strategies you can use today to keep tabs on their usage in your network.   Read more