Archive

Posts Tagged ‘WiFi access point’

Live Demo – Secure Wi-Fi Armed to Defend Your Network

September 13th, 2012

With AirTight Wi-Fi™, enterprises now have a truly secure Wi-Fi solution that is armed to defend your network from wireless threats 24/7.
Join AirTight on September 19 at 11 AM Pacific for a live demo. Find out how easy it is to deploy, manage and secure AirTight’s cloud-managed Wi-Fi. AirTight Wi-Fi Benefits: •Simple to deploy and manage with limited IT resources •Fully user-customizable HTML5 UI to improve IT efficiency •Get your Wi-Fi up and running quickly without the need for extensive training and certifications •Infinitely scalable to grow the WLAN deployment over time •Provides high performance 3×3 MIMO within the 802.3af power budget •Top rated WIPS to automatically detect and block threats •Provides automated BYOD policy enforcement including device onboarding.

Register now: http://airtightnetworks.adobeconnect.com/wifilivedemo9-19/event/event_info.html

Cloud computing, WiFi Access, Wireless security, WLAN networks , , , , , ,

Windows 7: A New Wireless Risk for the Enterprise – Webinar

March 3rd, 2010

Last week AirTight presented the first Webinar designed to educate network administrators and security professionals about the wireless risk introduced with Windows 7. The response was so overwhelming that we are presenting it live again on March 10. I guess we hit a nerve since AirMagnet is bringing up the rear now and presenting a Webinar on the subject. But if you want an in depth look at this topic and solid advice on protecting your network, join AirTight experts for a live encore presentation of our webinar:
Windows 7 – a New Enterprise Wireless Risk

When: Wednesday 10 March 2010, 10:45 AM – 12:00 PM
Time Zone: (GMT-08:00) Pacific Time (US and Canada); Tijuana
Read more…

Windows 7, Wireless security , , , ,

TKIP Primer on Security Tube

June 8th, 2009

Michael is the Message Integrity Code adapter by the TKIP standard. Michael is actually a weak code which uses simple additions and shift operation which are computationally less expensive, but strong enough as a intermediate solution from WEP. Michael was chosen as MIC in TKIP, so that the already deployed low end Access Points can also be software upgraded to TKIP without any hardware change. This video explains the working of MIC in TKIP.

Wireless security , , , , ,