by Devin Akin
At AirTight Networks, we talk a lot of SMAC (Social, Mobile, Analytics, Cloud). Together these forces have come together to significantly impact and radically change various markets. It’s not hard to wax eloquent about SMAC for long periods of time, but in this article, I want to focus only on the Analytics piece – that numerical, statistical, miracle whip that drives business decisions.
Analytics Data: Type and Collection
In the SMAC model using Wi-Fi as the Mobile piece, data is collected from Wi-Fi access points. The analytics data itself generally falls into one of two categories: 1) Presence, and 2) Opt-in.
Presence Analytics is, as it sounds, focused around whether the client device is on-location (“present”) and whether it is inside or outside a boundary (e.g. a store front). This type of data is device-specific (MAC Address), independent from the user of a device (contains no user-identifying information), and therefore anonymous. It is collected by using Access Points (APs) to scan the air and to gather MAC addresses (which only a hashed representation thereof is stored). Presence Analytics can be used for a variety of things, but some examples might include:
Did 2013 have to end with the somber news of a big credit card security breach? But it did! It is reported that 40 million credit cards were compromised in the security breach in stores of a major U.S. retailer Target. This is only a shade second to the earlier TJX breach in which 45 million credit cards were compromised. (After this blog was published, it was reported that the number of affected accounts in the Target breach is as high as 110 million, which would make it more that double the TJX breach!)
After any breach, and surely after the breach of such dimension, discussion on the data security issues at the retailers escalates. Earlier, the TJX breach resulted in stricter wireless PCI (Payment Card Industry) compliance requirements. The current Target breach can also trigger tightening of the compliance requirements. This breach may also prompt IT, security and compliance managers at major retailers to take a hard look at the information security aspects of the various technologies that they have deployed. Add to it the fact that retailers are aggressively deploying mobile and wireless technologies like POS, kiosks and tablets in stores. What are some of the core issues they should be looking at?
Compliance, PCI, Retail