Forbes – “Stores are finally turning to WiFi” but is security lacking?

macys

Really interesting article in Forbes by Verne Kopytoff on the reasons retailers have recognized the value of Wi-Fi for their customers and business processes. He notes that after years of resistance, stores have conceded that the shoppers have won the war. They want Wi-Fi and they will use their smartphones to check out deals. There… Read More

Wireless IDS/IPS horror stories from the field

Security Horror Stories

These are some recent stories of the IT organizations who brought in wireless intrusion prevention systems (WIPS) to secure their network environments against Wi-Fi vulnerabilities and attacks, and what they encountered was the incessant flow of security alerts that they could not keep up with. That is because, the systems constantly crunched signatures and thresholds from wireless… Read More

Cisco’s recent acquisition shows exciting times ahead for the lead players in the cloud Wi-Fi space

Cloud Wi-Fi space

Barely two weeks after I posted my last blog discussing benefits of the true cloud Wi-Fi over the controller over WAN architecture using Cisco FlexConnect as example for the latter; news of Cisco acquiring Meraki broke out. I got a kick out of it since it showed that my inferences on Cisco FlexConnect and other… Read More

Is your cloud Wi-Fi genuine, or is it controller over WAN imitation?

_MG_0292

With rising popularity of the cloud Wi-Fi in the distributed Wi-Fi deployments, there is also an attempt to pass off the legacy controller technology as the cloud Wi-Fi by deploying conventional controllers over the WAN. Realizing that it is infeasible to deploy many smaller controllers in the distributed Wi-Fi deployments such as retail, remote offices,… Read More

3 things to consider in selecting 3×3:3 MIMO Wi-Fi access points

Currently, market is inundated with announcements from vendors on 3-stream MIMO APs. Sure enough AirTight has also launched one being at the forefront of Wi-Fi technology. But what sticks out of some of those announcements is lopsided mention of high speed wireless connectivity, even to the extent of misleading claim of 900 Mbps for the… Read More

Why retailers embrace cloud for Wi-Fi access, PCI and wireless security

In-Store Wi-Fi

Retailers are increasingly looking to deploy Wi-Fi in their stores. They want to provide guest Wi-Fi to their patrons and also want to deploy in-store applications such as wireless POS and printers, wireless kiosks, wireless digital signage, and HQ network access over Wi-Fi. Coupled with these business drivers there is also a wireless PCI compliance… Read More

Securing your network from bring-your-own-device (BYOD)

table1

Managing BYOD in the enterprise is not a simple task. Encryption, MDM, virus protection etc. as mentioned in Ashley Furness’ post on the subject are all helpful, but preventing anauthorized devices or rogue APs from getting on your network at all is the real goal. WIPS is the perfect ally to all those tools.   Read more

AirTight BYOD Survey – Only Two weeks left

Survey

Only two weeks left – take AirTight’s One Minute Survey – BYOD: Love it? Hate it? Click the link – take the survey – enter to win an 8GB iPod Touch. https://www.surveymonkey.com/s/ATNBYODsurvey2012 Corporate users (e.g. employees, contractors) are accessing enterprise network and data, and bypassing corporate security controls using their personal Wi-Fi devices. This uncontrolled… Read More

Smart Mobile Devices — “Stress Test” for the WIPS of the Future

nintendo-video

Traditionally, talking of wireless security in the enterprises we talked about embedded Centrio Wi-Fi, Linksys rogue APs, open source DoS tools, and compliance requirements (PCI, DoD, HIPAA). While these topics continue to be important today, the upcoming proliferation of the smart mobile devices is the new frontier for the enterprise wireless security to address. The inundation of smart mobile devices… Read More

Don’t let BYOD turn into “BYOR” in your network

505airport

BYOD (Bring Your Own Device) seems to be the dominant theme for 2012 in the Wi-Fi infrastructure and security space. As people increasingly bring in personal smartphone devices on the enterprise premises, the network/security administrators are grappling with the security implications. Given how engaging the new smartphone and tablet apps are, conflict arises between the users’… Read More