MOJO Wireless http://blog.airtightnetworks.com AirTight Networks Blog Tue, 09 Dec 2014 19:40:52 +0000 en-US hourly 1 Kaustubh Phanse talks 4Cs and The Future with Cloud Wi-Fi http://blog.airtightnetworks.com/kaustubh-phanse-talks-4cs-future-cloud-wi-fi/ http://blog.airtightnetworks.com/kaustubh-phanse-talks-4cs-future-cloud-wi-fi/#respond Fri, 05 Dec 2014 16:30:28 +0000 http://blog.airtightnetworks.com/?p=8421 What is the CxOs to do? Whether you’re a CEO, CMO, CIO/CSO, or COO, your organization’s future must have a stake with cloud Wi-Fi. Dr. Kaustubh Phanse, VP of Content and Product Design at AirTight Networks recently keynoted on this very topic at CRN’s NexGenCloud Conference. In case you missed his keynote, you can flip through the SlideShare companion.   Read more

The post Kaustubh Phanse talks 4Cs and The Future with Cloud Wi-Fi appeared first on MOJO Wireless.

]]>
What is the CxOs to do?  Whether you’re a CEO, CMO, CIO/CSO, or COO, your organization’s future must have a stake with cloud Wi-Fi.  Dr. Kaustubh Phanse, VP of Content and Product Design at AirTight Networks recently keynoted on this very topic at CRN’s NexGenCloud Conference.  In case you missed his keynote, you can flip through the SlideShare companion.

IDC logoCloud-managed business Wi-Fi – infrastructure and managed services – will reach $653 Million in 2014 and $2.5 Billion by 2018.

Source:  IDC Insight Report, March 2014

Gartner logo‘Risk-On’ attitudes and modern technology key to business growth in the digital era.

Source: The 2014 Gartner CEO and Senior Executive Survey, April 2014

AirTight Cloud Services™ provide a cost-effective, easy to manage, scalable and robust solution to deliver enterprise class Wi-Fi access, wireless intrusion prevention system (WIPS) and regulatory compliance.

Dr. Kaustubh Phanse keynotes at NexGenCloud Conference:  4Cs and The Future with Cloud Wi-Fi

Dr. Kaustubh Phanse keynotes at NexGenCloud Conference: 4Cs and The Future with Cloud Wi-Fi. View the companion SlideShare.

Individual customers or even MSPs managing multiple customers can centrally manage the AirTight WLAN and WIPS services as well as other applications such as WizShark and BrandBuilder from AirTight’s single sign-on Mojo Studio console.

AirTight’s C-75 802.11ac access points and the companion MOJO Studio cloud-based portal provide value-added business services beyond basic connectivity. The access points combine rich data analytics with social Wi-Fi to help customers build targeted loyalty programs, while also providing measurement of the marketing programs’ performances through visibility into customer traffic and engagement.

Additionally, they offer AirTight’s top rated wireless intrusion prevention system (WIPS), customized guest Wi-Fi and social sign-in options for guest engagement.

AirTight’s channel partners can design their own value-added business services, such as wireless vulnerability assessments for proactive threat prevention. They can also create custom branded engagement leveraging AirTight’s BrandBuilder™ application to build Wi-Fi splash pages.

Get things done quickly and simply!

Powered by AirTight’s RESTful Web APIs and SS, AirTight Nano provides enterprise Wi-F functionality with consumer-level user-friendliness.  AirTight Nano provides a level of simplicity unprecedented in the configuration of an enterprise access point (AP). It gives personnel, with or without IT skills, the ability to customize their Wi-Fi networks right from their mobile device – even remotely, – without the need to go into the cloud console. They can get Wi-Fi up and running in minutes with enterprise-class features.

AirTight Networks vision for the moretization of wifi

Recognized as an innovation leader in the wireless space, AirTight is at the forefront of moretization of Wi-Fi. Dr. Phanse’s keynote addresses this central thesis.  The same topic was also recently covered by Dr. Hemant Chaskar (VP Technology and Innovation at AirTight) and Pravin Bhagwat (AirTight CTO) in discussion with Rohit Mehra (VP Network Infrastructure at IDC) in the following video interview.

Video:  Rohit Mehra (VP Network Infrastructure at IDC) questions Hemant Chaskar (VP Technology and Innovation at AirTight) and Pravin Bhawat (AirTight CTO) about “monetization” and “more-itization” of Wi-Fi.  click-to-tweet

4Cs and Planning for the Future

In the end, Dr. Phanse concludes that CxOs must make sure whatever WLAN they choose gives them the ability to provide an instantaneous, positive user experience that will meet the expectations of their business and customers, without compromising security.

 

Related information:

  • Dr. Kaustubh Phanse keynotes at NexGenCloud Conference:  4Cs and The Future with Cloud Wi-Fi | via SlideShare

 

The post Kaustubh Phanse talks 4Cs and The Future with Cloud Wi-Fi appeared first on MOJO Wireless.

]]>
http://blog.airtightnetworks.com/kaustubh-phanse-talks-4cs-future-cloud-wi-fi/feed/ 0
Horizontal Scaling of Cloud Wi-Fi Management Plane http://blog.airtightnetworks.com/horizontal-scaling-cloud-wi-fi-management-plane/ http://blog.airtightnetworks.com/horizontal-scaling-cloud-wi-fi-management-plane/#respond Thu, 04 Dec 2014 20:40:47 +0000 http://blog.airtightnetworks.com/?p=8389 One of the biggest benefits of using the cloud is its ability to scale. In the world of cloud managed Wi-Fi, scale really means being able to deploy tens of thousands of access points (APs) without having to worry about additional resources being available to manage them. However scaling Cloud Wi-Fi is not without its set of challenges. In this blog we will look at some interesting challenges in scaling Cloud Wi-Fi, and how they are addressed.   Read more

The post Horizontal Scaling of Cloud Wi-Fi Management Plane appeared first on MOJO Wireless.

]]>
One of the biggest benefits of using the cloud is its ability to scale. In the world of cloud managed Wi-Fi, scale really means being able to deploy tens of thousands of access points (APs) without having to worry about additional resources being available to manage them. However scaling Cloud Wi-Fi is not without its set of challenges. In this blog we will look at some interesting challenges in scaling Cloud Wi-Fi, and how they are addressed. So read on!

There are two techniques to scaling resources in the cloud – vertical scaling and horizontal scaling. In vertical scaling, you keep adding more hardware resources like processor and memory on the same server instance to meet the capacity demand. In horizontal scaling, you increase the capacity by adding parallel server instances to meet the demand. In vertical scaling, you will hit the limit on how much resources can be added on to a single instance of the server, whereas horizontal scaling allows you to surpass the capacity limits of Vertical Scaling.

There are two techniques to scaling resources in the cloud – vertical scaling and horizontal scaling.

 

Horizontal Scaling in Cloud Wi-Fi

In cloud managed Wi-Fi, there are two factors that affect scalability.

  • First is the number of APs being managed, which dictates the amount of management processing power required. The processing power required per AP is almost static, but as a deployment grows to large number of APs, scaling challenges need to be addressed.
  • The second factor that affects scalability is the volume of data from the APs that needs to be stored for analytics and security forensics. The amount of analytics and security data to be stored increases over time; and with the growth of Wi-Fi enabled devices, the rate of increases is expected to keep rising.

In this blog, I will address the problem of scaling the management processing power and will address storage scaling in the follow up blog.

One of the very first considerations in horizontal scaling is distributing the management processing amongst the servers. This can be addressed by having the APs managed across multiple servers in the cloud. We call this ‘Server Peering’. Server instances and environments are created on demand as and when required.

Now, when a single customer’s AP management gets distributed across multiple servers (which is often the case with large distributed Wi-Fi rollouts), the cloud architecture has to ensure that customers are still able to manage their entire network from a single pane of glass for configuration, monitoring, reporting etc. This is the requirement of ‘Unified Console’ over multiple servers.

Some questions that arise are:

  • How do configuration changes get distributed to multiple servers?
  • How are stats aggregated from all the servers and rolled up for unified reporting and monitoring?

The server instances in the AirTight cloud communicate and co-ordinate with each other using our communication channel called ‘Graft’. Grafts create a logical communication channel between instances that are managing a specific customer network and this keeps these instances in sync with each other to provide unified console. When a customer logs in to the cloud account, the management console has aggregated view of APs distributed across multiple servers. Also, policies and configuration changes for the network are pushed from console seamlessly to multiple servers.

Unified Console over Multiple Servers

Hierarchical Management Model using Tree Structure

The AirTight management console uses a Tree Structure to logically represent geographical, functional and/or administrative organization of a distributed rollout in a hierarchical fashion. The APs live within logical folders consistent with their location in the network. As administrators navigate the tree structure, the server boundaries are transparent even though APs belonging to different folders in the tree structure could be managed by multiple servers in the cloud.

The tree structure is context aware throughout for management, monitoring and admin roles. What that means is that any configuration or policy change at any specific folder is inherited to all devices falling under the logical context of the selected folder. Similarly, the statistics, alarms and reports presented at any folder is the aggregation of information from devices falling under the logical context of the selected folder. Importantly, both of the above actions are seamlessly performed as the user navigates the tree, irrespective of devices in multiple folders being managed by multiples servers. Below is a screen shot of AirTight’s cloud console managing 10,000+ APs distributed across multiple servers in the AirTight Cloud.

Unified Console over Multiple Servers

In large distributed deployments such as service provider networks and retail and restaurant chains, number of APs under management grows organically to large numbers over a period of time. The management processing power in the cloud required to manage them also needs to grow organically and surpasses capacity of a single server instance, thus necessitating horizontal scaling. Distribution of management processing across multiple servers while preserving the unified management console is the key to achieve horizontal scaling in the cloud managed Wi-Fi.

 

Additional Information:

-

 -
-

The post Horizontal Scaling of Cloud Wi-Fi Management Plane appeared first on MOJO Wireless.

]]>
http://blog.airtightnetworks.com/horizontal-scaling-cloud-wi-fi-management-plane/feed/ 0
CRN 2014 Tech Innovator Awards http://blog.airtightnetworks.com/crn-2014-tech-innovator-awards/ http://blog.airtightnetworks.com/crn-2014-tech-innovator-awards/#respond Thu, 20 Nov 2014 12:55:05 +0000 http://blog.airtightnetworks.com/?p=8343 AirTight Networks Named by CRN as One of the IT Industry's Tech Innovators. AirTight's C-75 802.11ac AP Takes Top Honors in the 2014 Wireless Category.   Read more

The post CRN 2014 Tech Innovator Awards appeared first on MOJO Wireless.

]]>
Each year, CRN Test Center’s Tech Innovator Award program recognizes companies that deliver outstanding innovation in hardware and software solutions specifically developed for the enterprise.

To determine this year’s winners and also those worthy of honorable mention CRN Test Center editors reviewed hundreds of products across 18 hardware and software categories.  The AirTight team is thrilled that the C-75 802.11ac access point took top honors in the 2014 wireless category.  This is our third industry award in recent months.

Back in September, AirTight Networks was honored with two industry awards.  AirTight won a 2014 Cloudys Cloud Channel Innovation Award and a Gold status from 2014 Golden Bridge Awards. In addition, Anita Pandey – AirTight Vice President of Marketing – was named to the @CRN 100 People You Don’t Know But Should 2014 list.

 

News for solution providers, VARs and other technophiles via crn.com

News for solution providers and VARs  via crn.com

Hardware and software products from 18 categories are evaluated based on their ability to increase worker productivity and reduce cost and complexity for solution providers, IT departments and end users through innovation and technical advancement.

Source:  CRN 2014 Tech Innovator Awards

AirTight’s C-75 802.11ac access points and the companion MOJO Studio cloud-based portal provide value-added business services beyond basic connectivity. The access points combine rich data analytics with social Wi-Fi to help customers build targeted loyalty programs, while also providing measurement of the marketing programs’ performances through visibility into customer traffic and engagement.

Additionally, they offer AirTight’s top rated wireless intrusion prevention system (WIPS), customized guest Wi-Fi and social sign-in options for guest engagement.

AirTight’s channel partners can design their own value-added business services, such as wireless vulnerability assessments for proactive threat prevention. They can also create custom branded engagement leveraging AirTight’s BrandBuilder™ application to build Wi-Fi splash pages.

-

 

“AirTight Networks is honored to be named one of CRN’s top Tech Innovators for our 802.11ac access points. This award is proof that resellers are in tune with our message and that value-added applications are the wave of the future for Wi-Fi business models.”

AirTight CEO David King

The annual Tech Innovator Awards are showcased in the December issue of CRN magazine, and the complete list of winners and honorable mentions is available online. Award winners will also be spotlighted during the NexGen Cloud Conference & Expo, December 4-5, 2014, in San Diego.

The AirTight team will be on hand at NextGen Cloud and we hope you’ll drop by our booth for a chat, a MOJO Studio demo and some MOJO Moonshine!

———————————- updated December 4th 2014 ———————————-

Tops in Wireless = Smiles All Around at NexGenCloud Conference

CRN Test Center’s Tech Innovator Award for the Wireless category

From left to right: Anita Pandey – Vice President of Marketing at AirTight Networks, Lisa MacKenzie – Senior Vice President at The Channel Company, and Ashley McLean, Director Channels at AirTight Networks.
Airtight Networks beat out VMware and other major vendors to take top honors in the CRN Test Center’s Tech Innovator Award for the Wireless category.

Related Information:

AirTight Networks Named by CRN as One of the IT Industry’s Tech Innovators | via AirTight PR – November 2014

AirTight Networks Honored With Two Industry Awards for Cloud Wi-Fi, Social and Analytics | via AirTight PR – September 2014

AirTight Networks Honored with Two Industry Awards | via AirTight blog

Video Repap: Cloudys – Cloud Channel Innovation Awards – September 2014

AirTight Networks wins 2014 Golden Bridge Awards | via YouTube.  Ksenia Koffman accepts the award on behalf of AirTight Networks.

View the C-75 data sheet.


AirTight’s C-75 AP takes top honors in the #wireless category #CRNAwards | via @AirTight blog
Click To Tweet


 

Kaustubh Phanse keynotes on the 4Cs and The Future with Cloud Wi-Fi at NexGenCloud Conference | via AirTight blog

The post CRN 2014 Tech Innovator Awards appeared first on MOJO Wireless.

]]>
http://blog.airtightnetworks.com/crn-2014-tech-innovator-awards/feed/ 0
How Long Will Wi-Fi Protect You from Carrier Monetization Programs? http://blog.airtightnetworks.com/how-long-will-wifi-protect-you-from-carrier-monetization-programs/ http://blog.airtightnetworks.com/how-long-will-wifi-protect-you-from-carrier-monetization-programs/#comments Thu, 13 Nov 2014 12:55:15 +0000 http://blog.airtightnetworks.com/?p=8272 In the last couple of weeks, several reports on carriers’ plans and practices to track and analyze their mobile web traffic caught the attention of consumers and privacy watchers.

According to media reports, US and international carriers are experimenting with inserting unique identifiers into the data traffic flowing between your smart phone and websites you visit.   Read more

The post How Long Will Wi-Fi Protect You from Carrier Monetization Programs? appeared first on MOJO Wireless.

]]>
In the last couple of weeks, several reports on carriers’ plans and practices to track and analyze their mobile web traffic caught the attention of consumers and privacy watchers.

According to media reports, US and international carriers are experimenting with inserting unique identifiers into the data traffic flowing between your smart phone and websites you visit.

Verizon

Verizon Wireless has been doing it for the past two years by implementing a device identifier which it calls a “Unique Identifier Header” or “UIDH.” The UIDH is a core enabler of Verizon’s Precision Market Insights program targeted at agencies, partners and brands. According to Verizon:

Verizon Wireless:   Precision Market Insights “Precision Market Insights create the next generation of advertising, publishing and commerce technology solutions to improve how brands, publishers and consumers connect.”

Source:  Precision Market Insights by Verizon.

The carrier further explains how it can create anonymous identifiers it dubs “PrecisionID” to target advertising based on demographics, location, and interest:

Precision Insights by Verizon“The PrecisionID is a deterministic, privacy-safe identifier matched to devices on Verizon’s wireless network powering data-driven marketing and addressable advertising solutions that offer audience scale and increase ROI.”

Source:  Precision Market Insights by Verizon.

AT&T

Verizon is not the only carrier injecting a unique identifier into the web traffic your phone generates. ProPublica reports that:

ATT Wireless“In 2013, AT&T launched its version — a plan to offer anonymous AT&T data to allow advertisers to deliver the most relevant messages to consumers. AT&T’s program eventually shut down. […] AT&T is currently inserting the identifiers as part of a test for a possible future relevant advertising service.”

Source:  ProPublica, October 30th 2014.

Opting Out of Carrier Monetization…

ProPublica has a handy tool to check if your phone is assigned a unique identifier when browsing online over a cellular data connection.

propublica mobile tracking tool

Does Your Phone Company Track You? Find out with Tracking Code Check by Al Shaw and Jonathan Stray via ProPublica.

Test it out and see if you get one of the following messages:

Test with T-Mobile.

Test with T-Mobile device.

 

tracking

However, as Wired notes:

Verizon’s ‘Perma-Cookie’ Is a Privacy-Killing Machine | By Robert McMillan via Wired, October 27 2014.“because Verizon is broadcasting this unique identifier to every website, ad networks could start using it to build a profile of your web activity, even without your consent.”

Source:  Verizon’s ‘Perma-Cookie’ Is a Privacy-Killing Machine | By Robert McMillan via Wired, October 27 2014.

ProPublica has called out Twitter as the apparent user of this ad technology from Verizon.

Opting out is hard to do. Now I know I know that it’s true

Let’s all sing along to the classic 1962 song recorded by Neil Sedaka. Or better yet, let’s go for the Toni Tenille version!   All that to say that it is very hard to opt out, and results are not guaranteed. ProPublica recaps the efforts of an AT&T user who tried to opt out:

Does Your Phone Company Track You?  Find out with Tracking Code Check by Al Shaw and Jonathan Stray via ProPublica.“He found that he needed to visit four different webpages to opt out, including one web page not even on AT&T’s domain: http://205.234.28.93/mobileoptout/ . But he continues to see the AT&T identifier in his mobile traffic.”

Source:  ProPublica, October 30th 2014.

 UIDHs Not Present When Connecting Over Wi-Fi

Wired notes that if you connect via Wi-Fi, or a virtual private network (personal or enterprise), or are talking to a site via SSL, then the UIDH “will not display.”

If you connect over Wi-Fi, carriers cannot track your website visits since you are not on a cellular data connection any more. However, we do not know if hotspot providers on the internet side are injecting any other identifiers – perhaps security researchers have not found a way to ferret these out yet.

Still, we can posit that using Wi-Fi does protect you to some extent from potentially omni-present carrier tracking and subsequent monetization. You may be connecting to the web across many heterogeneous Wi-Fi networks, with no way, at least at this time, to correlate your data across all the places you visit: airports, coffee shops, malls and restaurants. Some hotspots may be AT&T, some may be Comcast, etc.

In contrast, your carrier’s unique identifier follows you everywhere you use your cellular data connection, day in and day out. By using Wi-Fi you disperse your digital breadcrumbs and leave your phone carrier with just snippets of your data.

Will This Still Be True in Hotspot 2.0 World?

However, this perceived protection of Wi-Fi may go away with Hotspot 2.0.

Hotspot 2.0, and a related certification program Passpoint™, is an approach to public access Wi-Fi by the Wi-Fi Alliance. Passpoint aims to make the process of connecting to public Wi-Fi networks seamless and secure, by automatically authenticating the user to a Wi-Fi network based on an existing relationship with the user’s mobile carrier or internet service provider.

Wi-Fi CERTIFIED Passpoint via Wi-Fi AlliancePasspoint is a foundational ingredient to Wi-Fi roaming standards currently taking shape across the world. For example, while traveling internationally, you may be able to take advantage of hotspots managed by a provider you do not have a relationship with, based on a roaming agreement between the provider and your home-based ISP or carrier.

But this increased convenience will come with caveats. Wi-Fi web traffic from carrier-deployed hotspots will pass through carrier service gateways providing them an opportunity to inject UIDHs into Wi-Fi traffic.

Carriers may be able to observe you digital behavior across many more locations, even those they don’t own. The implication is that when Passpoint becomes pervasive, your digital breadcrumbs may eventually be correlated.

As things stand now, Passpoint is still in early stages of adoption by device manufacturers and mobile OS providers. According to several speakers at WBA Wi-Fi Global Congress in October of this year, consumer awareness is even lower.

Passpoint: Why all the no-shows? Most of what’s broken with Wi-Fi is fixed with Passpoint. So why are so many important companies on the sidelines?

Source:  Larry Seltzer for Zero Day via ZDnet.

Reverse Offload is Not the Solution, Unfortunately

In the context of discussions on Wi-Fi analytics, monetization and privacy, some people joked that the widespread application of Wi-Fi analytics would lead to ‘reverse 3G/4G offload’ – with consumers favoring cellular data connections over Wi-Fi to avoid their digital behavior being analyzed.

The stories referenced in this post bring an interesting twist in how we look at Wi-Fi analytics vs web usage tracking. Today’s public facing enterprise Wi-Fi technology does not inject unique identifiers into your traffic while accessing the Internet. The ability to sense the presence of Wi-Fi devices in the air is used for anonymous analytics, such as dwell time or repeat visits. One can say that Wi-Fi MAC-based presence analytics technology looks relatively benign in comparison to carriers inserting unique identifiers for every web site to potentially see.

In light of these unique identifiers, ‘carrier analytics’ technology is beginning to look like a more intrusive and persistent option.

One way or another, Wi-Fi or cellular analytics and monetization programs appear inevitable.

 

Related Information:

-

The post How Long Will Wi-Fi Protect You from Carrier Monetization Programs? appeared first on MOJO Wireless.

]]>
http://blog.airtightnetworks.com/how-long-will-wifi-protect-you-from-carrier-monetization-programs/feed/ 2
What’s Under the Hood in Wi-Fi Analytics http://blog.airtightnetworks.com/whats-hood-wi-fi-analytics/ http://blog.airtightnetworks.com/whats-hood-wi-fi-analytics/#respond Wed, 05 Nov 2014 13:25:58 +0000 http://blog.airtightnetworks.com/?p=8232 Our security researchers recently took a look at Apple’s iOS8 MAC randomization feature. It was touted by Apple for its ability to protect consumer privacy from persistent Wi-Fi tracking, but turned out to be of limited usability as currently implemented. With all the interest in privacy features, we thought we’d give you a look at what’s ‘under the hood’ in retail Wi-Fi analytics in our upcoming webinar (available on-demand).   Read more

The post What’s Under the Hood in Wi-Fi Analytics appeared first on MOJO Wireless.

]]>
Our security researchers recently took a look at Apple’s iOS8 MAC randomization feature. It was touted by Apple for its ability to protect consumer privacy from persistent Wi-Fi tracking, but turned out to be of limited usability as currently implemented. With all the interest in privacy features, we thought we’d give you a look at what’s ‘under the hood’ in retail Wi-Fi analytics in our upcoming webinar.

 

Webinar:  What’s ‘Under the Hood’ in Retail Wi-Fi Analytics: Technology, Engagement, Privacy

November 11th at 8:00 a.m. PT (and available on-demand)

Register

 

Wi-Fi is becoming a new medium of communication, which – as physical or online ‘real estate’ – is now being evaluated for its capacity to deliver community building, ‘monetization’ and stickiness. The new way of leveraging Wi-Fi is through accessing the information that you can garner out of ‘thin air.’

 

  • The top advanced analytic project planned for 2015 is customer segmentation and personalization (57.9%). Social analytics comes in second at 44.7%.
  • The top core retail functions that achieve the most measurable performance gains are personalized marketing (68.4%), customer loyalty (55.3%) and inventory management (52.6%).

Source:  It’s the 11th Hour, Do You Know Where Your Retail Analytics Are? | by Joe Skorupa via RIS News

IT managers used to focus on the Wi-Fi service itself – its value and reliability. They are now dealing with the information that the business can derive from it. This provides them with a springboard to bring in marketing and merchandising into the conversation. Now that the system can provide analytics data, these teams can be much more engaged in IT projects and can even become drivers of this new technology in store.

 

  • 8% of retailers locate the decision maker for managing, executing and investing in advanced analytics under the umbrella of the CIO. Marketing is only the decision maker for 13.5% and merchandising for just 8.1%. The only constituency that has a large say in analytic investment aside from the CIO is the C-suite at 29.7%.
  • Although the CIO and C-suite control the purse strings, the top three departments that are driving greater expansion of advanced analytic capabilities are marketing (76.3%), merchandising (60.5%) and store/channel operations (31.6%).

Source:  It’s the 11th Hour, Do You Know Where Your Retail Analytics Are? | by Joe Skorupa via RIS News

Wi-Fi based analytics is one of the crucial tools in the retailer’s arsenal to be able to compete for the customer’s disposable income. The more retailers understand the patterns, the more efficiently they can deploy their (limited) resources, be it staffing, IT, marketing dollars, or make decision on store locations and merchandizing. The retailers now have the means to market directly to the customer through splash pages, push promotions or loyalty programs.

The real-time presence and engagement data sets are powerful. That is why Wi-Fi based analytics garnered so much interest from retailers, creating the discussion in the mainstream press around technology and its privacy implications.

We saw this in June when the new MAC randomization feature was first spotted at Apple’s developers’ conference, and why we got so much attention with our testing on how this feature works in the real world when iOS 8 was released in September.


-
Read the iOS Blog Series by Bhupinder Misra via AirTight blog.
  1. iOS8 MAC Randomization – Analyzed!
  2. iOS8 MAC Address Randomization Update

There is a need in the market for education on big data opportunities in retail Wi-Fi analytics, related technologies and options for customer engagement. Ivey Business School professor Niraj Dawar wrote about the importance of harnessing as much data as possible for marketing initiatives in his 2013 book Tilt, published by Harvard Business Review Press.

AirTight one of the few Wi-Fi companies that offer both association analytics and customer engagement through social login, while maintaining an option for anonymous access.  Join me for the upcoming webinar to learn and ask questions.

-

Webinar:  What’s ‘Under the Hood’ in Retail Wi-Fi Analytics: Technology, Engagement, Privacy

November 11th at 8:00 a.m. PT (and available on-demand)

Register

-

Wipro commissioned Economic Intelligence Unit to study the effects of Big Data Analytics on Retailers. The study conducted has been compiled into an infographic. It shows how big data analytics is being used by the retailers to their advantage. (March 2014)

Wipro commissioned Economic Intelligence Unit to study the effects of Big Data Analytics on Retailers. The study conducted has been compiled into an infographic. It shows how big data analytics is being used by the retailers to their advantage. (March 2014)

Related Information:


What’s ‘Under the Hood’ in Retail Wi-Fi Analytics: Technology, Engagement, Privacy
Click To Tweet


The post What’s Under the Hood in Wi-Fi Analytics appeared first on MOJO Wireless.

]]>
http://blog.airtightnetworks.com/whats-hood-wi-fi-analytics/feed/ 0
AirTight Networks Honored with Two Industry Awards http://blog.airtightnetworks.com/airtight-networks-honored-with-two-industry-awards/ http://blog.airtightnetworks.com/airtight-networks-honored-with-two-industry-awards/#respond Mon, 03 Nov 2014 22:45:00 +0000 http://blog.airtightnetworks.com/?p=8205 AirTight Networks was honored with two industry awards for Cloud Wi-Fi, and Social & Analytics. AirTight won a 2014 Cloudys Cloud Channel Innovation Award and a Gold status from 2014 Golden Bridge Awards. Both awards were announced on September 8, 2014.   Read more

The post AirTight Networks Honored with Two Industry Awards appeared first on MOJO Wireless.

]]>
AirTight Networks was honored with two industry awards for Cloud Wi-Fi, and Social & Analytics.   AirTight won a 2014 Cloudys Cloud Channel Innovation Award and a Gold status from 2014 Golden Bridge Awards. Both awards were announced on September 8, 2014.

1) Data-backed marketing programs deliver big returns to win a Cloudy

AirTight’s Wi-Fi project for Roosevelt’s at 7 restaurant, deployed by AirTight partner Frontera Consulting, won in the category of Most Innovative Cloud Customer Deployment at the Cloudys award ceremony in New Orleans. The award program is managed by Channel Partners, a resource for indirect sales channels offering IT and telecom solutions.

The deployment delivers big company capabilities made easy for a family-owned restaurant whose staff and owners are not experts in IT, security or marketing. Using visitor analytics provided by the AirTight system, the restaurant was able to encourage longer stays and to provide special promotions to draw in patrons on slow nights. The result was a 10% month over month increase in visitors staying longer. This translated to a run rate of $60,000 per year of additional profit at a single restaurant location.

Great things are happening! Congrats @scrapecorp @gofrontera & our partner @Airtight! #CPEXPO

Great things are happening! Congrats @scrapecorp @gofrontera & our partner @Airtight! #CPEXPO | View original tweet.

For an easy-to-budget monthly fee, Frontera Consulting delivered a 5-in-1 AirTight-based solution including cloud-managed Wi-Fi, wireless intrusion prevention, automated PCI (payment card industry) compliance reports, presence analytics and demographics information for visitors who opt into Wi-Fi via social logins.

Frontera developed an innovative cloud-based application called Scrape which allows the restaurant to take the AirTight solution even further. The app takes opt-in social media information collected by the AirTight social Wi-Fi and uses it to compile individual guest preferences. The result is playback of favorite music and videos that match, in real time, the known likes of customers who are at that location at that exact moment.

-

 

2) Social Wi-Fi wins in social media category of Golden Bridge Awards

On the same night as the Cloudys awards were announced at a Cloud Partners event in New Orleans, AirTight earned Gold status at the Golden Bridge Awards in San Francisco.

More than 40 judges from a broad spectrum of industry voices participated around the world. Their average scores determined the 2014 Golden Bridge Business Awards winners. AirTight won for its Social Wi-Fi and Analytics, an innovative platform that integrates Wi-Fi access and social networking to facilitate omnichannel communication and new ways to drive user engagement.

Retailers can integrate social media channels with AirTight’s customizable guest Wi-Fi captive portals to engage with in-store customers and turn them into loyal promoters, encourage them to opt into marketing programs and reach out to them via geo-marketing campaigns, coupons or special offers. Similarly, event organizers can use social Wi-Fi at live venues to encourage participation, provide real-time updates, and then follow up after the event.

What Facebook friends info is shared during social login, and does it spam them?

Will my friends get spam if I use Facebook social login? What information about my friends will be shared?  These questions come to many when faced with the Facebook login option on websites and captive portals. A blog post by Hemant Chaskar seeks to answer these questions from the technical standpoint.

 

Cloud innovation and business model transformation key to AirTight’s winning entries.

The Wi-Fi industry is changing. The value chain is moving from hardware to software and applications as is evidenced by these awards. Our industry peers and the channel community are taking notice.  Two awards in one night is a reflection of the growing momentum of AirTight solutions.

More Information:

 

Cloud innovation and business transformation key to AirTight winning award entries

#Cloud innovation and business transformation key to AirTight winning award entries http://t.co/Zk0wZexkjF #WiFi pic.twitter.com/yiwmdZHetd
— AirTight Networks (@Airtight) September 18, 2014

Anita Pandey named to @CRN 100 People You Don’t Know But Should 2014

 

Update (November 2014):  AirTight Networks Named Tops in Wireless Category for 2014 CRN Tech Innovator Awards via @AirTight blog

 

 

The post AirTight Networks Honored with Two Industry Awards appeared first on MOJO Wireless.

]]>
http://blog.airtightnetworks.com/airtight-networks-honored-with-two-industry-awards/feed/ 0
The Hunt for Rogue October http://blog.airtightnetworks.com/hunt-rogue-october/ http://blog.airtightnetworks.com/hunt-rogue-october/#respond Thu, 30 Oct 2014 12:00:56 +0000 http://blog.airtightnetworks.com/?p=8176 Rick Farina describes his Wi-Fi investigations at Wireless LAN Professionals Conference Europe in Maastricht, Netherlands 2014. WIPS   Read more

The post The Hunt for Rogue October appeared first on MOJO Wireless.

]]>
Recently, I was invited to speak on Wi-Fi security at Wireless LAN Professionals Conference Europe in Maastricht, Netherlands.  Excited about my first trip to the Netherlands, I quickly said yes and off I went. After meeting up with my co-worker, we arrived the evening before the conference to relax and check in.  As a vendor neutral conference, the only Wi-Fi available was offered by the hotel (free!).  On night one, we enjoyed some conversation with a few of our peers, and retired early to catch up on email (and sleep).

Normally the conferences I attend are full of hackers wearing black t-shirts and carrying MacBook Pros covered in stickers, however, this convention was full of Wireless LAN Professionals wearing black polo shirts and carrying Macbook Pros not covered in stickers…a truly different kind of convention.  As people showed up, I resorted to one of my favorite past times, people watching.  I spent a lot of time quietly monitoring all of the conversations, and even having a few great exchanges of my own.  The more conversations I observed, or was a part of, the more I realized that these Wireless LAN Professionals seemed to share a lot with my usual hacker crowd, especially the sense of humor.  I overheard a number of delegates having chats about how easy it would be to put up an AP to spoof the hotel wireless, and even a few boasted about their Wi-Fi pineapples.  As the day wound down, I went back to my room to finish up some work, respond to some emails, and possibly work on my presentation for the next day.

Like many others, my time in the evening was dedicated to catching up on the work I had been ignoring all day, and the email from my customers in the US was building at an alarming rate.  I sat down to get some work done, and found the hotel splash page wasn’t loading.  Great, everyone at the hotel had the same plan… but wait, we were all clumped together all day and things worked fine, why would the hotel network fail after we spread out?  Immediately my thoughts returned to all the conversations I overheard that morning, of people talking about evil twins and Wi-Fi pineapples and other things that would look exactly like what I was experiencing, and all at once I felt like I was finally at home.

Immediately the game began.  I opened up my wireless sniffer and took a survey of the Access Points in the area, for the hotel SSID, I saw many from the same manufacturer, and one from a different manufacturer.  The one mis-matched AP also happened to be the one I was currently connected to, and the one which didn’t appear to be getting me to the Internet.  I then started looking at data.  All over the airspace, you could see clients talking to AP’s, Internet traffic, all working as it should.  When any client roamed from an AP to the mis-matched AP, all of a sudden, their Wi-Fi packets seemed to never go past the AP to the wired side of the network; no DHCP, no DNS, and certainly no gateway or Internet.  Armed with the fact that nothing was making it through the AP, it seemed obvious what was going on, someone was spoofing the hotel Wi-Fi, not providing Internet, and being generally obnoxious.

Obnoxious is a game I am very familiar with due to my experiences at hacker conventions, so I figured I would play to win.  I dug around in my bag, and took my AirTight WIPS Sensor.  I positioned it near the window, where I would have maximum visibility of the hotel airspace, and then settled myself back on the desk.  Once the WIPS system was up and running, it was again obvious, all the AP’s with the hotel’s SSID were made by the same manufacturer except one, and that one was clearly not actually passing traffic to the internet.  I clicked the quarantine button, and with just that one click, I knocked every client off the evil twin, and suddenly, everyone at the hotel had working internet again.  I laughed to myself, and made a quick tweet:

 

After finishing some work and email, I couldn’t help but check back on my new friend, the quarantined Evil Twin.  I noticed the device was still on and functional, even as the hour grew late, and I couldn’t help but notice my battery was full.  So off to fox hunt I went.  I took a look out my window, made a few guesses of where the target could be, and I started walking around.  I put my cell phone in my pocket with “Wi-fi Analyzer” tracking the evil twin, then I put my bluetooth headset on to listen to the Geiger counter like sounds as I got closer and farther from the AP.  Fully armed with my Wi-Fi tracker I left my room, and began to walk the hotel.  I walked my floor, some of the common areas, and found myself on the first floor.  I wandered around the restaurant as it was closing, the business center, and various other places.  One thing was certain, the device was powerful, and I couldn’t seem to get close to it. I wandered through the bar and found our happy host Keith, as well as a few other conference go-ers, and discussed my activities.

One of them was certain he knew who was behind the evil twin, so the whole group of us got up to go hunting.  We went to the front desk to ask what room the potential evil doer was in, and they were happy to provide the information, so off to the 4th floor we went.  The large group of us stormed out into the hallway, certain we would find our target, but alas, we searched the whole floor, and not a blip, not a beep, no sign of the AP we were looking for.  Discouraged by failure and the late hour, my newly acquired entourage said goodnight as I headed back to the first floor to continue the hunt.  I reached the lobby, and one of my helpers had decided to ignore the call for sleep, in exchange for joining the hunt.

 We searched all over the lobby looking for strong signals.  We ended in the business center, searching around under desks and behind hidden doors for anywhere an AP could have been hidden.  We came up short, but not without attracting some attention from the hotel staff.  Leaving the business center we were greeted by the front desk clerk, who was very curious what we were doing.  I explained that we were playing a game called a “fox hunt” and trying to find an AP which was placed by one of our people.  She laughed and thought it was very interesting, so I asked her if she would like to play as well, and escort us into some of the more secure areas of the hotel to search.  She happily agreed, and unlocked the restaurant for us. 

We searched high and low, searched through the kitchen, searched the dining room, and just when we were ready to give up, the Wi-Fi analyzer started to go crazy.  We were in the middle of the dining room, nothing in sight, but the signal was climbing rapidly.  We looked around, checked every nearby power outlet, every hidden corner, nothing to be found. The hunting party, now three strong, went out onto the patio which was closed for the night, and continued the search.  We searched high and low, under benches, in the boxes that contained yard toys (I was shocked to see how many frisbees the hotel had), but again, completely foiled.  We looked everywhere we could with the flashlights on our cell phones to guide us, but it looked like failure. 

After an exhaustive search of the entire hotel, we managed to get right on top of the evil AP, but couldn’t pinpoint it.  We went back to the lobby and my cohort and I discussed our search.  After a short while, we only had one conclusion, maybe it wasn’t an evil AP at all, maybe one of the hotel’s legitimate AP’s was stuffed up in the ceiling where we couldn’t see it, and that AP was malfunctioning in some way.  We asked the front desk when their network technician normally shows up to work, and then we went to bed. In the morning there was much discussion over breakfast about my tweet and my search the night before, but everyone was disappointed to hear that I was unable to pinpoint the problem.  After breakfast, the technician was scheduled to arrive, so I went by the front desk to ask to speak with the tech. 

A very nice gentleman greeted me, and said he heard a little bit about all the fun we had the night before, and asked me what I thought was going on.  I took him back to the spot where I had the strongest signal, and told him all about the problems which led me up to my hunt, and how we had given up unable to find the device.  The tech was very excited to hear the story, he mentioned that they had been having problems with the Wi-Fi in half the hotel for weeks, and no one had been able to trace it down.  I told him I traced it to a single AP, I had a map of its coverage, I knew who made it, but for the life of me I just couldn’t find the darn thing.  He laughed, and walked me 12 ft. from where my strongest signal was and pointed up. 

There, in the glory of the morning light, was the AP in question.  Just barely visible, crammed up against the doors to the courtyard was an AP, the right manufacturer, the right location, with a madly blinking Wi-Fi light, and an unlit LAN light.  We found the problem.  For the last several weeks, everyone near this side of the hotel had been having Wi-Fi issues as they tried to connect to this AP because the LAN cable was damaged and no longer passing data.  

 

And the moral of the story is, never assume malice when the problem can be adequately explained by hardware failure.  In a conference filled with nearly 100 WLAN professionals, it took one determined security guy to track down the network issues. Next time you see a convention which offers games like Wireless Capture the Flag or Fox and Hound, join in. 

Not only is the game fun to play, but you can gain valuable experience to track down not only attackers, but problems in a hotel’s wiring. On the enterprise security front, this also shows how manual effort intensive it can be to chase security alerts. And if they are false alerts, it means next time nobody will even chase real alerts. As a result, my colleagues and I at AirTight have always preached approach to wireless intrusion prevention that does not rely on chasing alerts and maintaining signatures. Find out more about it here.    


The Hunt for Rogue October | by @RicklikesWIPS via @AirTight blog #WLPC_EU
Click To Tweet


Related Information:

 

   

The post The Hunt for Rogue October appeared first on MOJO Wireless.

]]>
http://blog.airtightnetworks.com/hunt-rogue-october/feed/ 0
The Impact of IoT on Enterprise Wi-Fi http://blog.airtightnetworks.com/impact-iot-enterprise-wi-fi/ http://blog.airtightnetworks.com/impact-iot-enterprise-wi-fi/#respond Wed, 22 Oct 2014 12:00:00 +0000 http://blog.airtightnetworks.com/?p=8139 Choose your wireless network carefully. Cloud and APs are not all created equal.

Clearly we’re not in Kansas anymore … According to IDC, the growing global Internet of Things (IoT) market is on course to hit $7.1 trillion by 2020. With the rapid rise of connected devices in the IoT landscape there is growing concern about elevated security risks associated with the sheer volume of new devices coming online. AirTight can help you plan for IoT capacity and network traffic, as well as optimal secure coverage across your site.   Read more

The post The Impact of IoT on Enterprise Wi-Fi appeared first on MOJO Wireless.

]]>
Choose your wireless network carefully.  Cloud and APs are not all created equal.

Clearly we’re not in Kansas anymore … According to IDC, the growing global Internet of Things (IoT) market is on course to hit $7.1 trillion by 2020. With the rapid rise of connected devices in the IoT landscape there is growing concern about elevated security risks associated with the sheer volume of new devices coming online.

Video:  Pravin Bhagwat (AirTight CTO) asks Rohit Mehra (VP Network Infrastructure at IDC) about 802.11ac adoptions trends.  click-to-tweet

More on IoT at ZDnet.com.

Watch out for the Flying Monkeys!

The design of your wireless LAN (WLAN) must plan for IoT capacity and network traffic, as well as optimal secure coverage across your site. Tracking and monitoring devices on your network as well as devices around your network are important considerations of WLAN design. Choosing the right cloud solution is imperative as the wrong solution will quickly create two scalability challenges:

  1. system scalability and
  2. operational scalability.

System Scalability involves the ability to monitor many devices, store and process their data in the cloud whereas operational scalability focuses on minimizing false alarms resulting from the exponentially increasing volume of devices on your wireless network.

 

Half of Holiday Shoppers Say They’ll Avoid Stores That Got Hacked | by Gerry F Smith via Huffington Tech.

Lions, Tigers and Bears

Cloud Wi-Fi is a great choice to consider when planning your wireless network’s ability to handle the coming tidal wave of IoT devices.  On the road to an IoT future your focus should be on how your wireless network offers simplicity, scalability and security.

Simplicity,

Scalability, and

Security.

Oh my!

The Cloud provides an optimal architecture for managing scalability especially in a large distributed environment where IT staffing can be limited.  A Cloud solution also offers efficiency because all of the data does not have to be tunneled through a central controller. This translates into increased performance.


Wi-Fi as a Platform

Video:  Rohit Mehra (VP Network Infrastructure at IDC) asks Hemant Chaskar (VP Technology and Innovation at AirTight) about CIO considerations for when and how to upgrade to an 802.11ac infrastructure.  click-to-tweet

A good cloud solution must provide speed, efficiency, and be secure.  It should also offer value by providing user engagement capabilities that allow innovative new value added services for your business through the Wi-Fi platform.

More-itization

New aspects of wireless LAN technology that were not anticipated will be fueling the growth of Enterprise wireless LAN over the next 5 years. There have been two surprising developments aside from the predictable evolution of speed, the first was detecting and preventing attacks on the WLAN. The second unexpected development of the Enterprise WLAN has come from the reverse of the technology that keeps it secure and now using it to allow engagement into the network. This is especially relevant in markets such as retail, hospitality, healthcare and even public venues.

Video:  Rohit Mehra (VP Network Infrastructure at IDC) questions Hemant Chaskar (VP Technology and Innovation at AirTight) and Pravin Bhawat (AirTight CTO) about “monetization” and “more-itization” of Wi-Fi.  click-to-tweet

Click-to-tweet: Within the next 5 years we will see more new ideas and creativity that will continue to evolve the “more-tization” of Wi-Fi.   Hemant Chaskar @CHemantC

Planning for the Future

In the end, make sure whatever WLAN you choose gives you the ability to provide an instantaneous, positive user experience that will meet the expectations of your business and customers, without compromising your security.

Choose your wireless network carefully.  Cloud and APs are not all created equal.  

AirTight can help you plan for IoT capacity and network traffic, as well as optimal secure coverage across your site.

 

Additional Information:


The Impact of IoT on Enterprise Wi-Fi | via @AirTight blog
Click To Tweet


Social Information:

 

The post The Impact of IoT on Enterprise Wi-Fi appeared first on MOJO Wireless.

]]>
http://blog.airtightnetworks.com/impact-iot-enterprise-wi-fi/feed/ 0
Wire-Side Containment – Hidden Gem of Rogue Access Point Protection http://blog.airtightnetworks.com/wire-side-containment-hidden-gem-rogue-access-point-protection/ http://blog.airtightnetworks.com/wire-side-containment-hidden-gem-rogue-access-point-protection/#respond Thu, 16 Oct 2014 12:00:04 +0000 http://blog.airtightnetworks.com/?p=8116 The FCC’s decision to fine Marriott Hotels for unscrupulous Wi-Fi containment practices has set off numerous debates around the use of unlicensed spectrum. Many in the WLAN community have posted their interpretation of the decision and recommended best practices moving forward (see references below). Twitter debates have abounded as well. These parleys have focused on topics ranging from performance, to security, and monetization.
That being said, in the domain of security and PCI compliance, there is one Wi-Fi containment feature that hasn't been mentioned, but deserves a shout-out as it is still very effective and virtually unperturbed by these events. It is called "wire-side containment".   Read more

The post Wire-Side Containment – Hidden Gem of Rogue Access Point Protection appeared first on MOJO Wireless.

]]>
The FCC’s decision to impose a fine on Marriott Hotels for unscrupulous Wi-Fi containment has set off numerous debates. Many in the WLAN community have opined on its implications for the use of unlicensed spectrum (see references below and follow Twitter discussion on the topic). These parleys have touched upon performance impact, security challenges and Wi-Fi monetization practices.

Talking of security and PCI compliance in light of this FCC decision, there is one Wi-Fi containment  feature that deserves a shout-out,  as it is still very effective and virtually unaffected by these events. It is called “wire-side containment”.

Wire-Side Containment

This is meant to block rogue access points (APs) connected to the enterprise wired LAN. Rogue APs get connected to the LAN by unscrupulous employees, casual visitors or intruders.

Traditionally, wire-side containment has received attention in scenarios such as containing rogue APs operating on illegal channels (since the security system cannot legally transmit wireless de-authentication on channels that are not allowed in the regulatory domain) or containing rogue APs that may be using MFP (802.11w) to resist de-authentication based containment. However, nothing prevents making wire-side containment a primary containment feature for rogue APs and avoid the FCC debate altogether.

Depending on the level of confidence the security system has in its detection of the network connectivity of rogue APs and the technique used for wire-side containment (see below), wire-side containment can be triggered manually or automatically. There are two main techniques for wire-side containment – switch port blocking and ARP tarpitting.

Switch Port Blocking

Once the rogue AP is confirmed to be connected to the LAN, the idea here is to trace the switch port where it is connected and turn it off. As appealing as it may sound, I have observed that administrators are generally averse to using this approach in real life deployments. This is because it requires entering and maintaining IP addresses and SNMP community strings of network switches in the Wi-Fi security system, which is a large overhead in big networks. Also, the port tracing job requires fetching CAM table entries from all these switches which is quite an overhead in large networks and can also face interoperability hurdles.

And then, most systems that support this feature do not attempt to trace the leaf switch. Remember, the MAC address of the rogue AP or of the client connected to the rogue AP shows up in the switch hierarchy all the way up to the core switch. It is not technically impossible to follow the spanning tree databases in the switches to isolate the leaf switch, but this is additional complexity and I have not seen that done in most systems. Accordingly, administrators do not want to take the risk of turning off a port on the distribution switch or the core switch with this feature. One way around this issue could be to enter only access switches identities in the Wi-Fi security system, but then rogue APs connected into ports on the distribution or core switches will not be traced. However, even the access switches count can be large in big/distributed networks and sometimes  the access switches are not managed switches which creates a roadblock for this approach.

ARP Tarpitting

This approach is quite lightweight and still effective. It is based on ARP poisoning – aren’t most containment techniques usually blackhat tools in whitehat hands? The idea here is to tarpit communication through the rogue AP by sending ARP messages on the subnet advertising altered IP-to-MAC mapping for the rogue AP’s wire-side interface or for the wireless interface of the client connecting through the rogue AP.

Background Scanning Radios

Many customers deploy 24×7 background scanning on AirTight access points for the purpose of rogue AP protection. In this mode, the AirTight system uses ARP tarpitting for automatic containment as it is lightweight, does not require switch ID management and is safe for automatic trigger. Also, use of wire-side prevention avoids the stress on background scanning radios of frequent channel switching to send periodic de-authentication to rogue AP. This type of deployment is very popular among our retail customers covered by PCI compliance. Today there is reason for them to cheer as their deployments are not affected whichever way the debate around FCC’s decision swings. Wire-side containment turned out to be a hidden gem for them in the security system!


Wire-Side Containment – Hidden Gem of Rogue Access Point Protection via @AirTight blog
Click To Tweet


Related Information:

The post Wire-Side Containment – Hidden Gem of Rogue Access Point Protection appeared first on MOJO Wireless.

]]>
http://blog.airtightnetworks.com/wire-side-containment-hidden-gem-rogue-access-point-protection/feed/ 0
Wireless LAN Professionals Conference – Europe http://blog.airtightnetworks.com/wireless-lan-professionals-conference-europe/ http://blog.airtightnetworks.com/wireless-lan-professionals-conference-europe/#respond Tue, 14 Oct 2014 08:00:00 +0000 http://blog.airtightnetworks.com/?p=7767 October 13-15 2014: Wireless LAN Professionals EU Summit #WLPC_EU | video archive available | Keith R. Parsons   Read more

The post Wireless LAN Professionals Conference – Europe appeared first on MOJO Wireless.

]]>
Unless you’ve been hiding under a rock or are a WLAN newbie (in which case you’re forgiven), you know about Keith R. Parsons and WLAN Pros …

For the uninitiated few, Keith R Parsons is a certified Wireless LAN professional, consultant and teacher.  He has more certifications that you can shake a stick at! In fact, teacher is perhaps too small a word to apply to him.  Mentor is far more fitting:  an experienced and trusted adviser – this is Keith Parsons.

Follow Keith R Parsons on Twitter @KeithRParsons

Wireless LAN Professionals on the web

Keith R Parsons on TwitterWLAN Pros is a community founded and curated by Keith.  It is dedicated to those who are passionate about the craft of Wireless LANs.  Unlike many organizations, WLAN Pros is clear about its identity, audience (the name says it all) and mission statement:  “A place to educate, inform, entertain, and inspire”.

This “place” is a far reaching networked community of people and ideas; it has a no-frills web home and many social channels.  The evolving story of Wireless LAN shines through these outlets – it’s long on substance and short on window dressing. More on Keith Parsons and WLAN Pros can be found here.

A place to come and learn from, hang out with, and be inspired by other like-minded individuals.

Keith R Parsons 

Outside of the virtual aspects of this Wireless LAN Pros community there is also an in-person conference series. Earlier this year, there was WLAN Pros Summit – US.  In case you’ve missed out, you can find the video archive here.

October 13-15 2014:  Wireless LAN Professionals EU Summit #WLPC_EU

Its sister event sold out in record time.  Wireless LAN Professionals Conference – Europe is taking place October 13-15 2014 in Maastricht, The Netherlands.

The Wireless LAN Professionals EU Summit #WLPC_EU consists of two days of fun, great topics, awesome gear, and wonderful networking.  The conference features presentations from a vast array of experts in the field. The event is designed with two track sessions and short powerful talks called Top Ten Talks.  These are just like Ted Talks, only for all things Wi-Fi.

“We designed the Wireless LAN Professionals Conference to be the kind of event we’d like to personally attend. Lots of great technical content wrapped around an opportunity to spend time with our friends, colleagues, and a chance to meet more people who shared our passion for Wi-Fi. We say it is a conference for WLAN Professionals, by WLAN Professionals.”

Keith R. Parsons


#WLPC_EU is a conference by #WLAN professionals for #WLAN professionals via @KeithRParsons
Click To Tweet


Top Ten Talks

AirTight has 2 Top Ten Talk speakers.  Allen Walker (@AirTight_Allen) who heads up AirTight’s EMEA technical team will speak on “Trials and Tribulations from a Wi-Fi and WIPS Deployment for a Global Distributed Enterprise”.  If security forensics is your thing, you won’t want to miss senior wireless security researcher Rick Farina (@RickLikesWIPS) and “Wireless Hacking 201: Protecting Your Data in the Mobile World”.  Both of these Top Ten Talks are scheduled for Wednesday, 15 October, 10 am – 11 am.  Pick one or the other – either way you can’t go wrong.

More on the conference agenda, sessions and goodies.

Wireless LAN Professionals EU Summit #WLPC_EU has professional video production - tweet

“The reason we have all the sessions recorded and available free online after the conference is that is the way we wish all conferences would be – it’s all about the sharing of knowledge – making it as easy and seamless as possible.”

Keith R. Parsons

Related Information:

Spotlight on Keith Parsons’ blog:

 

Rick Farina @RickLikesWIPS saves the day …  Updated >> Read the full account:  The Hunt for Rogue October by Rick Farina

Rick Farina saves the day at the WLAN Professionals Conference in Europe - October 14 2014

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

The post Wireless LAN Professionals Conference – Europe appeared first on MOJO Wireless.

]]>
http://blog.airtightnetworks.com/wireless-lan-professionals-conference-europe/feed/ 0