SlideShare une entreprise Scribd logo
1  sur  25
© 2013 AirTight Networks, Inc. All rights reserved.
AirTight Networks
The Global Leader in Secure Cloud Wi-Fi
© 2013 AirTight Networks, Inc. All rights reserved. 2
2002-20032000-2001 2004-2005
Encryption
Authentication
Wireless intrusion
detection
AirTight Networks
Wireless IDS circa 2004
© 2013 AirTight Networks, Inc. All rights reserved. 3
AirTight Growth Story
2005
World’s first
WIPS - fully
automated
2008
World’s first
cloud based
WIPS &
802.11n WIPS
2007
Widely
recognized as
WIPS leader
Social Wi-Fi
and Analytics
Super-Tenant
Cloud
Wi-Fi access
and concurrent
24/7 WIPS in
one platform
2012
2006
2011
Largest cloud-
managed Wi-Fi
deployment
2010
2009
Most affordable
and efficient
wireless PCI
solution
Wireless
Intrusion
Prevention
29 patents granted
9 patents pending
2013
© 2013 AirTight Networks, Inc. All rights reserved.
Trusted by Thousands of Customers Worldwide
4
Government TransportationTelco Manufacturing Technology
HealthcareRetailServicesFinancial Hospitality
© 2013 AirTight Networks, Inc. All rights reserved.
Yum! Brands: Hungry for Wi-Fi
AirTight Wi-Fi being rolled out across 17,000+ locations
across North America
© 2013 AirTight Networks, Inc. All rights reserved.
Growing AirTight Wi-Fi Customer Base
6
© 2013 AirTight Networks, Inc. All rights reserved.
AirTight Sales/Distribution Expansion
7
Americas EMEA APAC
Access IT
Accuvant
ACR
Cadre
Fishnet
FutureCom
Insight
IPC
M&K
Presidio
Transparent Technoogy
Telus
Vandis
Verizon Business
Virtual Graffiti
…
A fast growing base of 1000+ channel partners and MSPs
Aditinet
B-Able
Comguard
Computerlinks
Data Equipment
e92Plus
Head Technology
iSecure
IT Way
Kappa Data
New Edge
Secure Data
Selcoms
Synetix
VADition
…
ASL
Bright Nexus
Dataworld
Dimension Data
Docutek
Energy One
Fortress
HPKom
Hyundai HDS
LG U-Plus
Marubeni
Muhan
mForce
NetOne
Netpolean
Observatory Crest
Quantum
Samsung S1
SKC&C
SoftBank
Synergy
Teamsun
Toshiba TTSS
uFinite
Uninet
Viet Distribution
Wavelink
…
Global MSPs: AT&T, Dell, Earthlink, Hughes, IBM, ISS, …
© 2013 AirTight Networks, Inc. All rights reserved.
AirTight Cloud – Salient Features
8
Built-in High Availability
& Fault-Tolerance
SAS70 Type II Certified
Data Centers
Drop-Ship, Plug-n-Play
Deployment
Location-based
Administration
Massively Scalable, Multi-Tenant
Elastic Cloud Architecture
Single Console
Centralized Management
© 2013 AirTight Networks, Inc. All rights reserved.
Industry’s Largest Global Cloud Footprint
9
Massively scalable, multi-tenant, fault-tolerant cloud architecture
serving over 25,000 customer sites
© 2013 AirTight Networks, Inc. All rights reserved.
Undisputed Global Leader in Wireless Security
10
Rated at the top in all six Gartner MarketScope reports on WLAN IPS
US DoD Approved
© 2013 AirTight Networks, Inc. All rights reserved.
Wireless Intrusion Prevention System (WIPS)
11
Automatic
Device Classification
Comprehensive
Threat Coverage
Reliable
Threat Prevention
Accurate
Location Tracking
BYOD
Policy Enforcement
Automated
Compliance Reporting
© 2013 AirTight Networks, Inc. All rights reserved.
AirTight Wi-Fi – Salient Features
12
High Speed 802.11n Access
with Built-in WIPS
Guest Wi-Fi with Analytics
and Social Media Integration
Intelligent Edge, Controller-
less, Fault Tolerant Architecture
Multiple SSIDs and VLANs
per AP
Content
Filtering, Firewall, QoS, BYOD
Controls per SSID
Software-Defined
Band Unlocked Radios
2.4 GHZ
5 GHZ
Wi-Fi
Wi-Fi with
background WIPS
Dedicated WIPS
© 2013 AirTight Networks, Inc. All rights reserved.
The AirTight Advantage
13
© 2013 AirTight Networks, Inc. All rights reserved.
AirTight Social Wi-Fi and Analytics
14
© 2013 AirTight Networks, Inc. All rights reserved.
Empowering Guest Wi-Fi with Social Media
15
Engage your customers and turn
them into loyal promoters
© 2013 AirTight Networks, Inc. All rights reserved.
AirTight Social Wi-Fi™ Workflow
16
1. Custom branded captive portal 2. Customers turn loyal promoters 3. Engage your customers
© 2013 AirTight Networks, Inc. All rights reserved.
AirTight Analytics for Business Intelligence
17
 Presence Analytics
• Total Foot Traffic
• Catchment Area Visitor Traffic
• Dwell Time (or Visit Duration)
 Loyalty Analytics
• Repeat Visitors
• Visit Frequency
• Visit Recency
 Engagement Analytics
• Conversion and Bounce Rates
• Social Wi-Fi Demographics
• Social Wi-Fi Visitor Logs
 Wi-Fi Usage Analytics
• Device Types
• Data Traffic
• Session Duration
 Intra-day or times of the day
 Daily, weekly, monthly trends
 Specific store or across selected stores
 Raw data (to generate custom reports)
How We Can Report
What We Can Measure
© 2013 AirTight Networks, Inc. All rights reserved.
Social Analytics for Opt-in Customers
18
© 2013 AirTight Networks, Inc. All rights reserved.
Identity Analytics for Opt-in Customers
19
© 2013 AirTight Networks, Inc. All rights reserved.
Sample Presence Analytics
20
No.ofvisitorsNo.ofvisitors
Dwell Time
Total Foot Traffic
© 2013 AirTight Networks, Inc. All rights reserved.
Sample Presence Analytics
21
!"
#!"
$!!"
$#!"
%!!"
%#!"
&"'()*+(,-./"
&01*2)!$#33#"
&45*2)!%367$"
&48*2)!!9:%7"
&4;*2)!%3<73"
&=4*2)!%:<%%"
&>?*2)!!%96:"
&@A*2)!%!<$!"
&?@*2)!%3#!3"
&?;*2)!!$:$3"
&5B*2)!%36#6"
&5C*2)!!%769"
!"#$%&'()'*%+,-%.'
/( -01( 234 ,.%'5 ,36,'7.%&.'899': ; &'<='3'9>': ; &'<=?'
6( D ","$$( D "
$$( D ","$ED "
$ED ",": ED "
: ED ","6ED "
6ED ","$$ED "
$$ED ","6( D "
! "
#! "
$! ! "
$#! "
%! ! "
%#! "
!"#$%&'()'*%+,-%.'
/( -01( 234 ,.%'5 ,36,'7 .%&.'899': ; &'<='3'9>': ; &'<=?'
&5B*2)!%36#6"
&5C*2)!!%769"
/( -01( 234 ,.%'5 ,36,'7 .%&.'899': ; &'<='3'9>': ; &'<=?'
6( D ","$$( D "
$$( D ","$ED "
$ED ",": ED "
: ED ","6ED "
6ED ","$$ED "
$$ED ","6( D "
Unique Visitors by Location
Distribution of No. of Visits
© 2013 AirTight Networks, Inc. All rights reserved.
AirTight APs/Sensors
22
AT-C10
DoD approved WIPS Sensor
 Common Criteria
 FIPS 140-2
 DISA APL
AT-C55
Dual band dual radio 2x2
 AP + background scanning
 Dedicated WIPS sensor
AT-C50
Dual band single radio 2x3
 AP + background scanning
 Dedicated WIPS sensor
AT-C60
Dual band dual radio 3x3
 AP + background scanning
 Dedicated WIPS sensor
 Concurrent AP + Dedicated
WIPS
© 2013 AirTight Networks, Inc. All rights reserved.
AT-C60: Industry’s Most Flexible Wi-Fi Platform
23
 Software-defined, band-unlocked radios
– an industry first
 Concurrent Wi-Fi access and 24/7 WIPS
– an industry first
© 2013 AirTight Networks, Inc. All rights reserved.
AirTight Deployment Choices
24
Public Cloud
Private Cloud
VMware
Appliance
 Zero Capex
 Bundled
 Capex
Deployment Pricing
No feature based licensing!
No user based licensing!
AT-C10 AT-C50
AT-C60
Platforms
AT-C55
© 2013 AirTight Networks, Inc. All rights reserved.
Thank You!
25
Cloud Managed Secure Wi-Fi Solutions
www.airtightnetworks.com
info@airtightnetworks.com
@AirTight
+1 877 424 7844

Contenu connexe

Tendances

Tendances (20)

Internet of everything
Internet of everything Internet of everything
Internet of everything
 
Xirrus - The Best Wi-Fi on the Planet
Xirrus - The Best Wi-Fi on the PlanetXirrus - The Best Wi-Fi on the Planet
Xirrus - The Best Wi-Fi on the Planet
 
Cisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance ÜrünleriCisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance Ürünleri
 
Звиад Кардава. Интернет вещей - модное слово или реальность? РИФ-Воронеж 2016
Звиад Кардава. Интернет вещей - модное слово или реальность? РИФ-Воронеж 2016Звиад Кардава. Интернет вещей - модное слово или реальность? РИФ-Воронеж 2016
Звиад Кардава. Интернет вещей - модное слово или реальность? РИФ-Воронеж 2016
 
BYOD Transforming the Enterprise
BYOD Transforming the EnterpriseBYOD Transforming the Enterprise
BYOD Transforming the Enterprise
 
Enterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without CompromiseEnterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without Compromise
 
AirTight Networks Evolution - Cloud & MSP
AirTight Networks Evolution - Cloud & MSPAirTight Networks Evolution - Cloud & MSP
AirTight Networks Evolution - Cloud & MSP
 
Beginners: Fixed Wireless Access (FWA)
Beginners: Fixed Wireless Access (FWA)Beginners: Fixed Wireless Access (FWA)
Beginners: Fixed Wireless Access (FWA)
 
6G Training Course Part 3: 6G Use Cases & Applications
6G Training Course Part 3: 6G Use Cases & Applications6G Training Course Part 3: 6G Use Cases & Applications
6G Training Course Part 3: 6G Use Cases & Applications
 
Conférence ARBOR ACSS 2018
Conférence ARBOR ACSS 2018Conférence ARBOR ACSS 2018
Conférence ARBOR ACSS 2018
 
Securing Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
Securing Smart Cities with Blockchain-enabled Zero Trust CybersecuitySecuring Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
Securing Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
 
Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...
Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...
Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...
 
Cisco connect winnipeg 2018 introducing the network intuitive
Cisco connect winnipeg 2018   introducing the network intuitiveCisco connect winnipeg 2018   introducing the network intuitive
Cisco connect winnipeg 2018 introducing the network intuitive
 
Mavenir: Evolution of Real-Time Machine Learning (RRML) in Core Network Secur...
Mavenir: Evolution of Real-Time Machine Learning (RRML) in Core Network Secur...Mavenir: Evolution of Real-Time Machine Learning (RRML) in Core Network Secur...
Mavenir: Evolution of Real-Time Machine Learning (RRML) in Core Network Secur...
 
Open source IoT
Open source IoTOpen source IoT
Open source IoT
 
Opinion: Would 5G NSA undergo Sunset?
Opinion: Would 5G NSA undergo Sunset?Opinion: Would 5G NSA undergo Sunset?
Opinion: Would 5G NSA undergo Sunset?
 
Prakash Padariya - IoT Cyber Warfare
Prakash Padariya - IoT Cyber WarfarePrakash Padariya - IoT Cyber Warfare
Prakash Padariya - IoT Cyber Warfare
 
Air Tight Airport Wi Fi Scan Analysis
Air Tight Airport Wi Fi Scan AnalysisAir Tight Airport Wi Fi Scan Analysis
Air Tight Airport Wi Fi Scan Analysis
 
Safety reliability and security lessons from defense for IoT
Safety reliability and security lessons from defense for IoTSafety reliability and security lessons from defense for IoT
Safety reliability and security lessons from defense for IoT
 
Decoding the IoT Ecosystem
Decoding the IoT EcosystemDecoding the IoT Ecosystem
Decoding the IoT Ecosystem
 

Similaire à AirTight Corporate Presentation _ July2013

Top 5 wi fi security threats
Top 5 wi fi security threatsTop 5 wi fi security threats
Top 5 wi fi security threats
gruzabb
 
Cloud managed secure wi fi
Cloud managed secure wi fiCloud managed secure wi fi
Cloud managed secure wi fi
gruzabb
 

Similaire à AirTight Corporate Presentation _ July2013 (20)

Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
 
Top 5 wi fi security threats
Top 5 wi fi security threatsTop 5 wi fi security threats
Top 5 wi fi security threats
 
Appi fi
Appi fiAppi fi
Appi fi
 
1. How will the IoT help your business - cisco
1. How will the IoT help your business - cisco1. How will the IoT help your business - cisco
1. How will the IoT help your business - cisco
 
Securing the edge with AWS IoT services - FND330 - AWS re:Inforce 2019
Securing the edge with AWS IoT services - FND330 - AWS re:Inforce 2019 Securing the edge with AWS IoT services - FND330 - AWS re:Inforce 2019
Securing the edge with AWS IoT services - FND330 - AWS re:Inforce 2019
 
Lorna Slott ATT new frontier
Lorna Slott ATT new frontierLorna Slott ATT new frontier
Lorna Slott ATT new frontier
 
Did Your Wi-Fi Performance Expire Before the Warranty Did? | Steps to Providi...
Did Your Wi-Fi Performance Expire Before the Warranty Did? | Steps to Providi...Did Your Wi-Fi Performance Expire Before the Warranty Did? | Steps to Providi...
Did Your Wi-Fi Performance Expire Before the Warranty Did? | Steps to Providi...
 
Cloud managed secure wi fi
Cloud managed secure wi fiCloud managed secure wi fi
Cloud managed secure wi fi
 
Internet of Cars, Andreas Mai, Cisco Systems
Internet of Cars, Andreas Mai, Cisco SystemsInternet of Cars, Andreas Mai, Cisco Systems
Internet of Cars, Andreas Mai, Cisco Systems
 
Snowflake Data Science and AI/ML at Scale
Snowflake Data Science and AI/ML at ScaleSnowflake Data Science and AI/ML at Scale
Snowflake Data Science and AI/ML at Scale
 
Firewall Webinar
Firewall WebinarFirewall Webinar
Firewall Webinar
 
What is ThousandEyes Webinar
What is ThousandEyes WebinarWhat is ThousandEyes Webinar
What is ThousandEyes Webinar
 
802.11ac 5th gen_channel_presentation
802.11ac 5th gen_channel_presentation802.11ac 5th gen_channel_presentation
802.11ac 5th gen_channel_presentation
 
Introducing MSite Mobile for Lenel (Feb14)
Introducing MSite Mobile for Lenel (Feb14)Introducing MSite Mobile for Lenel (Feb14)
Introducing MSite Mobile for Lenel (Feb14)
 
Next gen 80211ac_overview
Next gen 80211ac_overviewNext gen 80211ac_overview
Next gen 80211ac_overview
 
AirTight Networks - Wireless Security 2011
AirTight Networks - Wireless Security 2011AirTight Networks - Wireless Security 2011
AirTight Networks - Wireless Security 2011
 
Leadership Session: AWS IoT (IOT218-L) - AWS re:Invent 2018
Leadership Session: AWS IoT (IOT218-L) - AWS re:Invent 2018Leadership Session: AWS IoT (IOT218-L) - AWS re:Invent 2018
Leadership Session: AWS IoT (IOT218-L) - AWS re:Invent 2018
 
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security FrameworkThe Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
 
Top 5 predictions webinar
Top 5 predictions webinarTop 5 predictions webinar
Top 5 predictions webinar
 
The Four Horsemen of Mobile Security
The Four Horsemen of Mobile SecurityThe Four Horsemen of Mobile Security
The Four Horsemen of Mobile Security
 

Dernier

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Dernier (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

AirTight Corporate Presentation _ July2013

  • 1. © 2013 AirTight Networks, Inc. All rights reserved. AirTight Networks The Global Leader in Secure Cloud Wi-Fi
  • 2. © 2013 AirTight Networks, Inc. All rights reserved. 2 2002-20032000-2001 2004-2005 Encryption Authentication Wireless intrusion detection AirTight Networks Wireless IDS circa 2004
  • 3. © 2013 AirTight Networks, Inc. All rights reserved. 3 AirTight Growth Story 2005 World’s first WIPS - fully automated 2008 World’s first cloud based WIPS & 802.11n WIPS 2007 Widely recognized as WIPS leader Social Wi-Fi and Analytics Super-Tenant Cloud Wi-Fi access and concurrent 24/7 WIPS in one platform 2012 2006 2011 Largest cloud- managed Wi-Fi deployment 2010 2009 Most affordable and efficient wireless PCI solution Wireless Intrusion Prevention 29 patents granted 9 patents pending 2013
  • 4. © 2013 AirTight Networks, Inc. All rights reserved. Trusted by Thousands of Customers Worldwide 4 Government TransportationTelco Manufacturing Technology HealthcareRetailServicesFinancial Hospitality
  • 5. © 2013 AirTight Networks, Inc. All rights reserved. Yum! Brands: Hungry for Wi-Fi AirTight Wi-Fi being rolled out across 17,000+ locations across North America
  • 6. © 2013 AirTight Networks, Inc. All rights reserved. Growing AirTight Wi-Fi Customer Base 6
  • 7. © 2013 AirTight Networks, Inc. All rights reserved. AirTight Sales/Distribution Expansion 7 Americas EMEA APAC Access IT Accuvant ACR Cadre Fishnet FutureCom Insight IPC M&K Presidio Transparent Technoogy Telus Vandis Verizon Business Virtual Graffiti … A fast growing base of 1000+ channel partners and MSPs Aditinet B-Able Comguard Computerlinks Data Equipment e92Plus Head Technology iSecure IT Way Kappa Data New Edge Secure Data Selcoms Synetix VADition … ASL Bright Nexus Dataworld Dimension Data Docutek Energy One Fortress HPKom Hyundai HDS LG U-Plus Marubeni Muhan mForce NetOne Netpolean Observatory Crest Quantum Samsung S1 SKC&C SoftBank Synergy Teamsun Toshiba TTSS uFinite Uninet Viet Distribution Wavelink … Global MSPs: AT&T, Dell, Earthlink, Hughes, IBM, ISS, …
  • 8. © 2013 AirTight Networks, Inc. All rights reserved. AirTight Cloud – Salient Features 8 Built-in High Availability & Fault-Tolerance SAS70 Type II Certified Data Centers Drop-Ship, Plug-n-Play Deployment Location-based Administration Massively Scalable, Multi-Tenant Elastic Cloud Architecture Single Console Centralized Management
  • 9. © 2013 AirTight Networks, Inc. All rights reserved. Industry’s Largest Global Cloud Footprint 9 Massively scalable, multi-tenant, fault-tolerant cloud architecture serving over 25,000 customer sites
  • 10. © 2013 AirTight Networks, Inc. All rights reserved. Undisputed Global Leader in Wireless Security 10 Rated at the top in all six Gartner MarketScope reports on WLAN IPS US DoD Approved
  • 11. © 2013 AirTight Networks, Inc. All rights reserved. Wireless Intrusion Prevention System (WIPS) 11 Automatic Device Classification Comprehensive Threat Coverage Reliable Threat Prevention Accurate Location Tracking BYOD Policy Enforcement Automated Compliance Reporting
  • 12. © 2013 AirTight Networks, Inc. All rights reserved. AirTight Wi-Fi – Salient Features 12 High Speed 802.11n Access with Built-in WIPS Guest Wi-Fi with Analytics and Social Media Integration Intelligent Edge, Controller- less, Fault Tolerant Architecture Multiple SSIDs and VLANs per AP Content Filtering, Firewall, QoS, BYOD Controls per SSID Software-Defined Band Unlocked Radios 2.4 GHZ 5 GHZ Wi-Fi Wi-Fi with background WIPS Dedicated WIPS
  • 13. © 2013 AirTight Networks, Inc. All rights reserved. The AirTight Advantage 13
  • 14. © 2013 AirTight Networks, Inc. All rights reserved. AirTight Social Wi-Fi and Analytics 14
  • 15. © 2013 AirTight Networks, Inc. All rights reserved. Empowering Guest Wi-Fi with Social Media 15 Engage your customers and turn them into loyal promoters
  • 16. © 2013 AirTight Networks, Inc. All rights reserved. AirTight Social Wi-Fi™ Workflow 16 1. Custom branded captive portal 2. Customers turn loyal promoters 3. Engage your customers
  • 17. © 2013 AirTight Networks, Inc. All rights reserved. AirTight Analytics for Business Intelligence 17  Presence Analytics • Total Foot Traffic • Catchment Area Visitor Traffic • Dwell Time (or Visit Duration)  Loyalty Analytics • Repeat Visitors • Visit Frequency • Visit Recency  Engagement Analytics • Conversion and Bounce Rates • Social Wi-Fi Demographics • Social Wi-Fi Visitor Logs  Wi-Fi Usage Analytics • Device Types • Data Traffic • Session Duration  Intra-day or times of the day  Daily, weekly, monthly trends  Specific store or across selected stores  Raw data (to generate custom reports) How We Can Report What We Can Measure
  • 18. © 2013 AirTight Networks, Inc. All rights reserved. Social Analytics for Opt-in Customers 18
  • 19. © 2013 AirTight Networks, Inc. All rights reserved. Identity Analytics for Opt-in Customers 19
  • 20. © 2013 AirTight Networks, Inc. All rights reserved. Sample Presence Analytics 20 No.ofvisitorsNo.ofvisitors Dwell Time Total Foot Traffic
  • 21. © 2013 AirTight Networks, Inc. All rights reserved. Sample Presence Analytics 21 !" #!" $!!" $#!" %!!" %#!" &"'()*+(,-./" &01*2)!$#33#" &45*2)!%367$" &48*2)!!9:%7" &4;*2)!%3<73" &=4*2)!%:<%%" &>?*2)!!%96:" &@A*2)!%!<$!" &?@*2)!%3#!3" &?;*2)!!$:$3" &5B*2)!%36#6" &5C*2)!!%769" !"#$%&'()'*%+,-%.' /( -01( 234 ,.%'5 ,36,'7.%&.'899': ; &'<='3'9>': ; &'<=?' 6( D ","$$( D " $$( D ","$ED " $ED ",": ED " : ED ","6ED " 6ED ","$$ED " $$ED ","6( D " ! " #! " $! ! " $#! " %! ! " %#! " !"#$%&'()'*%+,-%.' /( -01( 234 ,.%'5 ,36,'7 .%&.'899': ; &'<='3'9>': ; &'<=?' &5B*2)!%36#6" &5C*2)!!%769" /( -01( 234 ,.%'5 ,36,'7 .%&.'899': ; &'<='3'9>': ; &'<=?' 6( D ","$$( D " $$( D ","$ED " $ED ",": ED " : ED ","6ED " 6ED ","$$ED " $$ED ","6( D " Unique Visitors by Location Distribution of No. of Visits
  • 22. © 2013 AirTight Networks, Inc. All rights reserved. AirTight APs/Sensors 22 AT-C10 DoD approved WIPS Sensor  Common Criteria  FIPS 140-2  DISA APL AT-C55 Dual band dual radio 2x2  AP + background scanning  Dedicated WIPS sensor AT-C50 Dual band single radio 2x3  AP + background scanning  Dedicated WIPS sensor AT-C60 Dual band dual radio 3x3  AP + background scanning  Dedicated WIPS sensor  Concurrent AP + Dedicated WIPS
  • 23. © 2013 AirTight Networks, Inc. All rights reserved. AT-C60: Industry’s Most Flexible Wi-Fi Platform 23  Software-defined, band-unlocked radios – an industry first  Concurrent Wi-Fi access and 24/7 WIPS – an industry first
  • 24. © 2013 AirTight Networks, Inc. All rights reserved. AirTight Deployment Choices 24 Public Cloud Private Cloud VMware Appliance  Zero Capex  Bundled  Capex Deployment Pricing No feature based licensing! No user based licensing! AT-C10 AT-C50 AT-C60 Platforms AT-C55
  • 25. © 2013 AirTight Networks, Inc. All rights reserved. Thank You! 25 Cloud Managed Secure Wi-Fi Solutions www.airtightnetworks.com info@airtightnetworks.com @AirTight +1 877 424 7844