AirTight Networks Named by CRN as One of the IT Industry’s Tech Innovators. AirTight’s C-75 802.11ac AP Takes Top Honors in the 2014 Wireless Category. Read more
Choose your wireless network carefully. Cloud and APs are not all created equal.
Clearly we’re not in Kansas anymore … According to IDC, the growing global Internet of Things (IoT) market is on course to hit $7.1 trillion by 2020. With the rapid rise of connected devices in the IoT landscape there is growing concern about elevated security risks associated with the sheer volume of new devices coming online. AirTight can help you plan for IoT capacity and network traffic, as well as optimal secure coverage across your site. Read more
The FCC’s decision to fine Marriott Hotels for unscrupulous Wi-Fi containment practices has set off numerous debates around the use of unlicensed spectrum. Many in the WLAN community have posted their interpretation of the decision and recommended best practices moving forward (see references below). Twitter debates have abounded as well. These parleys have focused on topics ranging from performance, to security, and monetization.
That being said, in the domain of security and PCI compliance, there is one Wi-Fi containment feature that hasn’t been mentioned, but deserves a shout-out as it is still very effective and virtually unperturbed by these events. It is called “wire-side containment”. Read more
The FCC issued an order and consent decree (settlement details) DA 14-1444 in the investigation of Marriott International regarding blocking of personal Wi-Fi hot spots in the conference facilities of the Gaylord Opryland hotel. The FCC imposed $600,000 fine. Read more
Did you know that sales of enterprise-grade wireless LAN equipment with the new 802.11ac Wi-Fi standard are expected to skyrocket over the next four years? This is partly due to the aggressive pricing strategies, according to a report from Dell’Oro Group. Find out why customers should interested in AirTight Networks for their 11AC needs. Read more
| Shortly following the conclusion of Blackhat’13, a few articles came out reporting wireless scanning data from the venue. Inside the Black Hat 2013 Wi-Fi Network Karma is a …Errr, What We Learned at BlackHat 2013 Both reports state that many security relevant events were detected in the Wi-Fi traffic during the… Read More
Are you considering new Wi-Fi deployment or upgrade of legacy system? Then you should be prepared to navigate the maze of multiple decision factors given that Wi-Fi bake-offs increasingly require multi-faceted evaluation. Follow these 11 “C”ommandments to navigate the Wi-Fi decision tree: Cost Complexity Coverage Capacity Capabilities Channels Clients Cloud Controller 11aC, and last but not least… Read More
| With the ever increasing importance of Wi-Fi as the de facto access technology, WIPS plays a key role in overall enterprise network infrastructure security. | The U.S. Department of Defense (DoD) recently created a separate category for wireless intrusion detection/prevention in its approved product listing for deployments in defense agencies. Gartner now recommends including WIPS as… Read More
IDC’s recent IT Buyer Experience Survey reveals that “45% of the buying decision is made before your potential buyer even says “hello” to your sales rep.” and “buyers are more knowledgeable and connected”. If you’re still in the investigation stage (as suggested by the IDC survey) and not quite ready for a customized personal demo with an… Read More
| Wi-Fi has become the de facto access medium for smart mobile devices in enterprise networks. Sitting at the edge of the network, Wi-Fi can assist greatly in implementing secure and disciplined BYOD in these networks. There is no one-size-fits-all when it comes to BYOD management in the enterprise. However, from my experiences working with Wi-Fi and… Read More