SlideShare a Scribd company logo
© 2013 AirTight Networks, Inc. All rights reserved.
Considerations for a Secure Enterprise WLAN
Kaustubh Phanse, Ph.D.
Chief Wireless Architect & Evangelist
AirTight Networks
© 2013 AirTight Networks, Inc. All rights reserved.
(Re)Considering Wireless Security
2
We don’t have “that” problem because…A “No Wi-Fi” policy without enforcement
What does not work?
© 2013 AirTight Networks, Inc. All rights reserved.
Managing the “Unmanaged”
3
WPA2/802.1x cannot prevent unauthorized devices
from accessing the enterprise network
© 2013 AirTight Networks, Inc. All rights reserved.
Managing the “Unmanaged”
4
© 2013 AirTight Networks, Inc. All rights reserved.
BYOD Survey Results
5
11%
20%
69%
16%
34%
50%
Do you see an increasing trend
of employees bringing Rogue Wi-Fi APs?
Are you concerned about employees using
mobile hotspots to bypass corporate policies?
© 2013 AirTight Networks, Inc. All rights reserved.
Wireless Intrusion Prevention System (WIPS)
6
Automatic
Device Classification
Comprehensive
Threat Coverage
Reliable
Threat Prevention
Accurate
Location Tracking
BYOD
Policy Enforcement
© 2013 AirTight Networks, Inc. All rights reserved.
Automatic Device Classification
7
Rogue	
  External	
  
Authorized	
  
Rogue	
  AP?	
  	
  
(High	
  RSSI)	
  
Rogue	
  AP?	
  (SSIDs)	
  
Undetected	
  
Rogue	
  APs	
  
Rogue	
  AP?	
  (Vendor)	
  
Rogue	
  AP	
  	
  
(on	
  wire)	
  
© 2013 AirTight Networks, Inc. All rights reserved.
Signature-based Approach = False Alarms!
8
© 2013 AirTight Networks, Inc. All rights reserved.
Blueprint for Reliable Threat Prevention
9
§  Surgical threat prevention without interfering with legitimate
communication (yours or your neighbor’s)
§  Simultaneous prevention of multiple threats across multiple
channels
External	
  APs	
  
Rogue	
  APs	
  	
  
(On	
  Network)	
  
Authorized	
  	
  
APs	
  
AP	
  Classifica?on	
  
STOP	
  
Client	
  Classifica?on	
  Policy	
  Mis-­‐config	
  
GO	
  
STOP	
  
IGNORE	
  
DoS	
  
External	
  Clients	
  
Authorized	
  
Clients	
  
Rogue	
  	
  
Clients	
  
© 2013 AirTight Networks, Inc. All rights reserved.
What Good is a Feature that Cannot be Turned On?
10
Many WLAN vendors offering “so-called WIPS” recommend
their customers to NOT turn on automatic threat prevention!
© 2013 AirTight Networks, Inc. All rights reserved.
Comprehensive Threat Coverage
11
True WIPS Approach
Protects against the
fundamental wireless threat
building blocks
Prevalent
WIDS Approach
Cat and mouse
chase of exploits,
tools and signatures
© 2013 AirTight Networks, Inc. All rights reserved.
Signature-based Approach = False Alarms!
12
© 2013 AirTight Networks, Inc. All rights reserved.
Accurate Location Tracking
13
No need for RF site survey
No search squads to locate Wi-Fi devices
Definitive location tracking within 10-15 ft.
© 2013 AirTight Networks, Inc. All rights reserved.
BYOD Policy Enforcement
14
§  MDM and NAC unable to provide the
first line of defense
§  WIPS complements these solutions to
fully automate secure BYOD
© 2013 AirTight Networks, Inc. All rights reserved.
WIPS Architectures
15
§  Integrated
•  APs repurposed as sensors
•  Background scanning and minimal protection
•  Cannot co-exist with time-sensitive apps, e.g., VoIP
§  Overlay
•  Dedicated sensors on top of existing WLAN
•  24/7 monitoring and protection
§  Combo
•  APs repurposed as sensors
•  24/7 monitoring and protection
•  Able to support all types of apps, including VoIP
Wi-­‐Fi	
  AP	
  with	
  
background	
  scanning	
  
2.4	
  
GHZ	
  
5	
  
GHz	
  
2.4	
  
GHZ	
  
5	
  
GHz	
  
2.4	
  
GHZ	
  
5	
  
GHz	
  
Wi-­‐Fi	
  AP	
   WIPS	
  Sensor	
  
Wi-­‐Fi	
  AP	
  with	
  	
  
Concurrent	
  WIPS	
  sensor	
  
2.4	
  /	
  5	
  
GHZ	
  
2.4	
  +	
  5	
  
GHZ	
  
© 2013 AirTight Networks, Inc. All rights reserved.
AT-C60: Industry’s Most Flexible Wi-Fi Platform
16
§  Software-defined, band-unlocked radios
– an industry first
§  Concurrent Wi-Fi access and 24/7 WIPS
– an industry first
© 2013 AirTight Networks, Inc. All rights reserved.
AirTight Wi-Fi – Key Features
17
Built-in WIPS, Content Filtering,
Firewall and BYOD Onboarding
Support for Multiple SSIDs & VLANs,
QoS and Traffic Shaping
High speed 802.11n access
incl. 3x3:3 on 802.3af PoE
Guest Wi-Fi access with Captive
Portal and Walled Garden
Centralized Management from
single HTML5 console
Social Wi-Fi and Analytics
for Business Intelligence
!
© 2013 AirTight Networks, Inc. All rights reserved.
AirTight WIPS – Key Features
18
Automatic
Device Classification
Comprehensive
Threat Coverage
Reliable
Threat Prevention
Accurate
Location Tracking
BYOD
Policy Enforcement
© 2013 AirTight Networks, Inc. All rights reserved.
Secure Enterprise WLAN Checklist
19
ü  Accurately detect all types of Rogue APs without you having to
define any signatures?
ü  Not flood you with false alerts?
ü  Let you reliably turn on the P in WIPS?
ü  Automate BYOD policy enforcement and onboarding?
ü  Accurately track physical location of detected Wi-Fi devices?
ü  Do all of the above without compromising on Wi-Fi access features
and ripping off your IT budget?
Can your enterprise WLAN solution:
© 2013 AirTight Networks, Inc. All rights reserved.
Thank You!
20
Cloud Managed Secure Wi-Fi Solutions
www.airtightnetworks.com
info@airtightnetworks.com
@AirTight
+1 877 424 7844
US DoD Approved

More Related Content

PPT
AirTight Networks - Wireless Security 2011
PDF
AirTight Networks WIPS at Wireless Field Day 6 WFD6
PPTX
Next-generation Zero Trust Cybersecurity for the Space Age
PPTX
Implementing Enterprise Wireless Security Policy in the BYOD Era
PPTX
i7 pregerine7 - Agentless byod security for Enterprises
PPTX
PDF
The Internet of Things Isn't Coming, It's Here
PDF
Conquering the Minefield of Soft Rogue APs in the Enterprise
AirTight Networks - Wireless Security 2011
AirTight Networks WIPS at Wireless Field Day 6 WFD6
Next-generation Zero Trust Cybersecurity for the Space Age
Implementing Enterprise Wireless Security Policy in the BYOD Era
i7 pregerine7 - Agentless byod security for Enterprises
The Internet of Things Isn't Coming, It's Here
Conquering the Minefield of Soft Rogue APs in the Enterprise

What's hot (20)

PDF
SAE 2014 - Cyber Security: Mission Critical for the Internet of Cars
PPTX
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
PPTX
Zero Trust Cybersecurity for Microsoft Azure Cloud
PDF
Securing Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
PDF
Solution: Block Armour Secure Remote Access for WFH
PDF
UL TS - CSA NL SUMMIT
PPTX
SC Magazine & ForeScout Survey Results
PPTX
Iot(security)
PPTX
IoT Security Imperative: Stop your Fridge from Sending you Spam
PPTX
Ultra-Secure Private Cloud with Open Stack and Block Armour Zero Trust Cybers...
PDF
During the Next Generation Network and Data Centre – Now and into the Future ...
PPT
Verimatrix-Comvenient Acquisition 3-31-11
PDF
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
PDF
Cisco Live Cancun Collaboration Press
PPTX
Call for Papers - International Journal of Network Security & Its Application...
PPTX
Network Security - Fortinet, Dublin June 2017
PDF
IOT Security
PDF
Protect your guest wifi - NOW
PPTX
Blockchain Defined Perimeter for Cloud Security
PPS
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
SAE 2014 - Cyber Security: Mission Critical for the Internet of Cars
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
Zero Trust Cybersecurity for Microsoft Azure Cloud
Securing Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
Solution: Block Armour Secure Remote Access for WFH
UL TS - CSA NL SUMMIT
SC Magazine & ForeScout Survey Results
Iot(security)
IoT Security Imperative: Stop your Fridge from Sending you Spam
Ultra-Secure Private Cloud with Open Stack and Block Armour Zero Trust Cybers...
During the Next Generation Network and Data Centre – Now and into the Future ...
Verimatrix-Comvenient Acquisition 3-31-11
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
Cisco Live Cancun Collaboration Press
Call for Papers - International Journal of Network Security & Its Application...
Network Security - Fortinet, Dublin June 2017
IOT Security
Protect your guest wifi - NOW
Blockchain Defined Perimeter for Cloud Security
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
Ad

Viewers also liked (7)

PDF
Wireless Vulnerability Management: What It Means for Your Enterprise
PPTX
Is 11ac Right for Your Network?
PDF
Deploying the Cisco Mobility Services Engine for Advanced Wireless Services
PPTX
Wireless Security null seminar
PDF
Wireless LAN Security, Policy, and Deployment Best Practices
PPT
Wireless security presentation
PPT
Wireless LAN security
Wireless Vulnerability Management: What It Means for Your Enterprise
Is 11ac Right for Your Network?
Deploying the Cisco Mobility Services Engine for Advanced Wireless Services
Wireless Security null seminar
Wireless LAN Security, Policy, and Deployment Best Practices
Wireless security presentation
Wireless LAN security
Ad

Similar to Considerations for a secure enterprise wlan data connectors 2013 (20)

PPTX
Top 5 wi fi security threats
PPTX
AirTight Corporate Presentation _ July2013
PPTX
Cloud managed secure wi fi
PDF
philip_industry zero trust presentation ppt
PPTX
Did Your Wi-Fi Performance Expire Before the Warranty Did? | Steps to Providi...
PDF
PPT
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
PDF
BYOD Transforming the Enterprise
PPTX
ivanti-swapout_967754 presentation decks
PDF
Fortinet ZTNA - Um contexto de sua Implementação
PPTX
Sophos Wireless Protection Overview
PDF
[CLASS 2014] Palestra Técnica - Delfin Rodillas
PPTX
Trusted Wireless Environment (TWE)
PDF
A stepped approach to unified access
PDF
Businessday okt 2016 - Xirrus
PDF
Bolstering the security of iiot applications – how to go about it
PPT
PPT
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
PDF
Report the whole IoT r0.0.pptx
PDF
7.5 steps to overlaying byod & iot
Top 5 wi fi security threats
AirTight Corporate Presentation _ July2013
Cloud managed secure wi fi
philip_industry zero trust presentation ppt
Did Your Wi-Fi Performance Expire Before the Warranty Did? | Steps to Providi...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
BYOD Transforming the Enterprise
ivanti-swapout_967754 presentation decks
Fortinet ZTNA - Um contexto de sua Implementação
Sophos Wireless Protection Overview
[CLASS 2014] Palestra Técnica - Delfin Rodillas
Trusted Wireless Environment (TWE)
A stepped approach to unified access
Businessday okt 2016 - Xirrus
Bolstering the security of iiot applications – how to go about it
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
Report the whole IoT r0.0.pptx
7.5 steps to overlaying byod & iot

More from AirTight Networks (20)

PDF
Air tight 11ac webinar series session 2 - 11ac feature deep dive - june 2014
PDF
Wi-Fi Offload Summit - Monetise Thyself
PDF
AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014
PDF
Restaurant Wi-Fi Primer: Retail Analytics and Social Integration
PDF
AirTight Networks Evolution - Cloud & MSP
PDF
AirTight social wifi solution brief
PDF
Survey on the Impact of BYOD on Enterprise Security
PDF
AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...
PDF
Non WiFi interference combat guide 1
PDF
WPA2 Hole196 Vulnerability FAQs
PDF
WPA2 Hole196 Vulnerability: Exploits and Remediation Strategies
PPT
Windows 7 - A New Wireless Risk to the Enterprise
PDF
802.11w Tutorial
PDF
Understanding WiFi Security Vulnerabilities and Solutions
PPT
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
PDF
Retail Stores and Wireless Security—Recommendations
PDF
802.11n The Good, The Bad, and The Ugly: Will You Be Ready?
PDF
WPA/WPA2 TKIP Exploit
PPT
When WLANs Launch Self DoS Attacks
PPT
Caffe Latte Attack
Air tight 11ac webinar series session 2 - 11ac feature deep dive - june 2014
Wi-Fi Offload Summit - Monetise Thyself
AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014
Restaurant Wi-Fi Primer: Retail Analytics and Social Integration
AirTight Networks Evolution - Cloud & MSP
AirTight social wifi solution brief
Survey on the Impact of BYOD on Enterprise Security
AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...
Non WiFi interference combat guide 1
WPA2 Hole196 Vulnerability FAQs
WPA2 Hole196 Vulnerability: Exploits and Remediation Strategies
Windows 7 - A New Wireless Risk to the Enterprise
802.11w Tutorial
Understanding WiFi Security Vulnerabilities and Solutions
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
Retail Stores and Wireless Security—Recommendations
802.11n The Good, The Bad, and The Ugly: Will You Be Ready?
WPA/WPA2 TKIP Exploit
When WLANs Launch Self DoS Attacks
Caffe Latte Attack

Recently uploaded (20)

PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
GamePlan Trading System Review: Professional Trader's Honest Take
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Big Data Technologies - Introduction.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Empathic Computing: Creating Shared Understanding
PDF
Electronic commerce courselecture one. Pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Modernizing your data center with Dell and AMD
PDF
Machine learning based COVID-19 study performance prediction
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Advanced Soft Computing BINUS July 2025.pdf
PDF
NewMind AI Monthly Chronicles - July 2025
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
CIFDAQ's Market Insight: SEC Turns Pro Crypto
GamePlan Trading System Review: Professional Trader's Honest Take
Per capita expenditure prediction using model stacking based on satellite ima...
Dropbox Q2 2025 Financial Results & Investor Presentation
Big Data Technologies - Introduction.pptx
Spectral efficient network and resource selection model in 5G networks
Understanding_Digital_Forensics_Presentation.pptx
Empathic Computing: Creating Shared Understanding
Electronic commerce courselecture one. Pdf
Advanced methodologies resolving dimensionality complications for autism neur...
The AUB Centre for AI in Media Proposal.docx
Modernizing your data center with Dell and AMD
Machine learning based COVID-19 study performance prediction
20250228 LYD VKU AI Blended-Learning.pptx
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
Chapter 3 Spatial Domain Image Processing.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Advanced Soft Computing BINUS July 2025.pdf
NewMind AI Monthly Chronicles - July 2025
“AI and Expert System Decision Support & Business Intelligence Systems”

Considerations for a secure enterprise wlan data connectors 2013

  • 1. © 2013 AirTight Networks, Inc. All rights reserved. Considerations for a Secure Enterprise WLAN Kaustubh Phanse, Ph.D. Chief Wireless Architect & Evangelist AirTight Networks
  • 2. © 2013 AirTight Networks, Inc. All rights reserved. (Re)Considering Wireless Security 2 We don’t have “that” problem because…A “No Wi-Fi” policy without enforcement What does not work?
  • 3. © 2013 AirTight Networks, Inc. All rights reserved. Managing the “Unmanaged” 3 WPA2/802.1x cannot prevent unauthorized devices from accessing the enterprise network
  • 4. © 2013 AirTight Networks, Inc. All rights reserved. Managing the “Unmanaged” 4
  • 5. © 2013 AirTight Networks, Inc. All rights reserved. BYOD Survey Results 5 11% 20% 69% 16% 34% 50% Do you see an increasing trend of employees bringing Rogue Wi-Fi APs? Are you concerned about employees using mobile hotspots to bypass corporate policies?
  • 6. © 2013 AirTight Networks, Inc. All rights reserved. Wireless Intrusion Prevention System (WIPS) 6 Automatic Device Classification Comprehensive Threat Coverage Reliable Threat Prevention Accurate Location Tracking BYOD Policy Enforcement
  • 7. © 2013 AirTight Networks, Inc. All rights reserved. Automatic Device Classification 7 Rogue  External   Authorized   Rogue  AP?     (High  RSSI)   Rogue  AP?  (SSIDs)   Undetected   Rogue  APs   Rogue  AP?  (Vendor)   Rogue  AP     (on  wire)  
  • 8. © 2013 AirTight Networks, Inc. All rights reserved. Signature-based Approach = False Alarms! 8
  • 9. © 2013 AirTight Networks, Inc. All rights reserved. Blueprint for Reliable Threat Prevention 9 §  Surgical threat prevention without interfering with legitimate communication (yours or your neighbor’s) §  Simultaneous prevention of multiple threats across multiple channels External  APs   Rogue  APs     (On  Network)   Authorized     APs   AP  Classifica?on   STOP   Client  Classifica?on  Policy  Mis-­‐config   GO   STOP   IGNORE   DoS   External  Clients   Authorized   Clients   Rogue     Clients  
  • 10. © 2013 AirTight Networks, Inc. All rights reserved. What Good is a Feature that Cannot be Turned On? 10 Many WLAN vendors offering “so-called WIPS” recommend their customers to NOT turn on automatic threat prevention!
  • 11. © 2013 AirTight Networks, Inc. All rights reserved. Comprehensive Threat Coverage 11 True WIPS Approach Protects against the fundamental wireless threat building blocks Prevalent WIDS Approach Cat and mouse chase of exploits, tools and signatures
  • 12. © 2013 AirTight Networks, Inc. All rights reserved. Signature-based Approach = False Alarms! 12
  • 13. © 2013 AirTight Networks, Inc. All rights reserved. Accurate Location Tracking 13 No need for RF site survey No search squads to locate Wi-Fi devices Definitive location tracking within 10-15 ft.
  • 14. © 2013 AirTight Networks, Inc. All rights reserved. BYOD Policy Enforcement 14 §  MDM and NAC unable to provide the first line of defense §  WIPS complements these solutions to fully automate secure BYOD
  • 15. © 2013 AirTight Networks, Inc. All rights reserved. WIPS Architectures 15 §  Integrated •  APs repurposed as sensors •  Background scanning and minimal protection •  Cannot co-exist with time-sensitive apps, e.g., VoIP §  Overlay •  Dedicated sensors on top of existing WLAN •  24/7 monitoring and protection §  Combo •  APs repurposed as sensors •  24/7 monitoring and protection •  Able to support all types of apps, including VoIP Wi-­‐Fi  AP  with   background  scanning   2.4   GHZ   5   GHz   2.4   GHZ   5   GHz   2.4   GHZ   5   GHz   Wi-­‐Fi  AP   WIPS  Sensor   Wi-­‐Fi  AP  with     Concurrent  WIPS  sensor   2.4  /  5   GHZ   2.4  +  5   GHZ  
  • 16. © 2013 AirTight Networks, Inc. All rights reserved. AT-C60: Industry’s Most Flexible Wi-Fi Platform 16 §  Software-defined, band-unlocked radios – an industry first §  Concurrent Wi-Fi access and 24/7 WIPS – an industry first
  • 17. © 2013 AirTight Networks, Inc. All rights reserved. AirTight Wi-Fi – Key Features 17 Built-in WIPS, Content Filtering, Firewall and BYOD Onboarding Support for Multiple SSIDs & VLANs, QoS and Traffic Shaping High speed 802.11n access incl. 3x3:3 on 802.3af PoE Guest Wi-Fi access with Captive Portal and Walled Garden Centralized Management from single HTML5 console Social Wi-Fi and Analytics for Business Intelligence !
  • 18. © 2013 AirTight Networks, Inc. All rights reserved. AirTight WIPS – Key Features 18 Automatic Device Classification Comprehensive Threat Coverage Reliable Threat Prevention Accurate Location Tracking BYOD Policy Enforcement
  • 19. © 2013 AirTight Networks, Inc. All rights reserved. Secure Enterprise WLAN Checklist 19 ü  Accurately detect all types of Rogue APs without you having to define any signatures? ü  Not flood you with false alerts? ü  Let you reliably turn on the P in WIPS? ü  Automate BYOD policy enforcement and onboarding? ü  Accurately track physical location of detected Wi-Fi devices? ü  Do all of the above without compromising on Wi-Fi access features and ripping off your IT budget? Can your enterprise WLAN solution:
  • 20. © 2013 AirTight Networks, Inc. All rights reserved. Thank You! 20 Cloud Managed Secure Wi-Fi Solutions www.airtightnetworks.com info@airtightnetworks.com @AirTight +1 877 424 7844 US DoD Approved