802.11ac WLAN Sales Poised To Surge

11ac feature image

Did you know that sales of enterprise-grade wireless LAN equipment with the new 802.11ac Wi-Fi standard are expected to skyrocket over the next four years? This is partly due to the aggressive pricing strategies, according to a report from Dell’Oro Group. Find out why customers should interested in AirTight Networks for their 11AC needs.   Read more

Blackhat Wi-Fi Security Reports and Nuances of Detection Methods

blackhat USA 13

| Shortly following the conclusion of Blackhat’13, a few articles came out reporting wireless scanning data from the venue.   Inside the Black Hat 2013 Wi-Fi Network   Karma is a …Errr, What We Learned at BlackHat 2013    Both reports state that many security relevant events were detected in the Wi-Fi traffic during the… Read More

11 Commandments of Wi-Fi Decision Making

Wi-Fi Commandments

Are you considering new Wi-Fi deployment or upgrade of legacy system? Then you should be prepared to navigate the maze of multiple decision factors given that Wi-Fi bake-offs increasingly require multi-faceted evaluation. Follow these 11 “C”ommandments to navigate the Wi-Fi decision tree: Cost Complexity Coverage Capacity Capabilities Channels Clients Cloud Controller 11aC, and last but not least… Read More

The WIPS Detective

wips detective with list

| With the ever increasing importance of Wi-Fi as the de facto access technology, WIPS plays a key role in overall enterprise network infrastructure security. | The U.S. Department of Defense (DoD) recently created a separate category for wireless intrusion detection/prevention in its approved product listing for deployments in defense agencies. Gartner now recommends including WIPS as… Read More

AirTight Demos on Demand and WFD5

Airtight Demo

IDC’s recent IT Buyer Experience Survey reveals that “45% of the buying decision is made before your potential buyer even says “hello” to your sales rep.” and “buyers are more knowledgeable and connected”. If you’re still in the investigation stage (as suggested by the IDC survey) and not quite ready for a customized personal demo with an… Read More

How to implement BYOD with Wi-Fi / WIPS assist

Monitor new devices entering Wi-Fi

| Wi-Fi has become the de facto access medium for smart mobile devices in enterprise networks. Sitting at the edge of the network, Wi-Fi can assist greatly in implementing secure and disciplined BYOD in these networks. There is no one-size-fits-all when it comes to BYOD management in the enterprise. However, from my experiences working with Wi-Fi and… Read More

How AirTight’s new network+security console tames distributed Wi-Fi

AirTight UI

As Wi-Fi deployments extend into large distributed environments, management of these Wi-Fi networks poses unique challenges. It could be the clinic-wide deployment for the medical facility running into 100’s of sites, branch-wide deployment for the bank running into 1000’s of sites, or store-wide deployment for the fast food restaurant running into 10,000’s sites. The network… Read More

Wireless IDS/IPS horror stories from the field

Security Horror Stories

These are some recent stories of the IT organizations who brought in wireless intrusion prevention systems (WIPS) to secure their network environments against Wi-Fi vulnerabilities and attacks, and what they encountered was the incessant flow of security alerts that they could not keep up with. That is because, the systems constantly crunched signatures and thresholds from wireless… Read More

Cisco’s recent acquisition shows exciting times ahead for the lead players in the cloud Wi-Fi space

Cloud Wi-Fi space

Barely two weeks after I posted my last blog discussing benefits of the true cloud Wi-Fi over the controller over WAN architecture using Cisco FlexConnect as example for the latter; news of Cisco acquiring Meraki broke out. I got a kick out of it since it showed that my inferences on Cisco FlexConnect and other… Read More

Don’t let BYOD turn into “BYOR” in your network

505airport

BYOD (Bring Your Own Device) seems to be the dominant theme for 2012 in the Wi-Fi infrastructure and security space. As people increasingly bring in personal smartphone devices on the enterprise premises, the network/security administrators are grappling with the security implications. Given how engaging the new smartphone and tablet apps are, conflict arises between the users’… Read More