SlideShare une entreprise Scribd logo
1  sur  12
Cloud Managed Secure Wi-Fi
Dr. Pravin Bhagwat
CTO, AirTight Networks

© 2013 AirTight Networks, Inc. All rights reserved.
Enabling Today’s Distributed Enterprise

Wi-Fi’s Impact
 Reduced costs
 Mobile workforce
 Agility and productivity
 New business opportunities

© 2013 AirTight Networks, Inc. All rights reserved.

2
Challenges in Distributed Wi-Fi
 Geographically distributed locations
 Large scale operation
 Lack of IT staff

 Cost concerns
 Security and compliance

© 2013 AirTight Networks, Inc. All rights reserved.

3
Traditional Enterprise WLAN Deployments








Multi-tiered architecture
Feature based licensing
Basic WIDS “bolt-on”
Dedicated IT resources
Extensive training
On-going/on-site support

© 2013 AirTight Networks, Inc. All rights reserved.
Comparison of Wi-Fi Deployment of Architectures

Controller based

Cloud managed

Complex
High cost
Not scalable
Difficult to manage

© 2013 AirTight Networks, Inc. All rights reserved.

Simple
Lower cost
Infinitely scalable
Easy to manage

5
AirTight Cloud – Salient Features

SSAE-16 Certified
Data Centers

Massively Scalable, Multi-Tenant
Elastic Cloud Architecture

Drop-Ship, Plug-n-Play
Deployment

Built-in High Availability
& Fault-Tolerance

Single Console
Centralized Management

Location-based
Administration

© 2013 AirTight Networks, Inc. All rights reserved.

6
AirTight Cloud Footprint
Fully virtualized, running on VMware ESXi hypervisor

© 2013 AirTight Networks, Inc. All rights reserved.

7
Intelligent Edge, Controller-less WLAN Architecture
Intelligence built into every AirTight AP



Plug-and-play zero touch deployment
Data switching and control at the edge including
segregation of corporate and guest networks

Per SSID bandwidth and security controls





Stateful firewall; DNS-based content filtering
Secure BYOD onboarding
QoS for real-time applications, e.g., VoIP
Admission control and traffic shaping

No dependence on a central controller –
local or in the cloud



No choke point or single point of failure
Fault-tolerant stand-alone AP operation with
no loss of functionality

© 2013 AirTight Networks, Inc. All rights reserved.

8
WIPS Architectures

 Integrated
• APs repurposed as sensors
• Background scanning and minimal protection
• Cannot co-exist with time-sensitive apps, e.g., VoIP

2.4

5

GHZ

GHz

Wi-Fi AP with
background scanning

 Overlay
• Dedicated sensors on top of existing WLAN
• 24/7 monitoring and protection

2.4

5

2.4

5

GHZ

GHz

GHZ

GHz

Wi-Fi AP

WIPS Sensor

 Combo
• APs repurposed as sensors
• 24/7 monitoring and protection
• Able to support all types of apps, including VoIP

© 2013 AirTight Networks, Inc. All rights reserved.

2.4 / 5

2.4 + 5

GHZ

GHZ

Wi-Fi AP with
Concurrent WIPS sensor

9
AT-C60: Industry’s Most Flexible Wi-Fi Platform


Software-defined, band-unlocked radios
– an industry first



Concurrent Wi-Fi access and 24/7 WIPS
– an industry first

© 2013 AirTight Networks, Inc. All rights reserved.

10
AirTight Cloud Secure Wi-Fi Benefits
Distributed Wi-Fi
Challenges
Remote/distributed/SMB
locations

Minimal or no IT staff
at remote sites

Limited IT budget

AirTight Cloud Wi-Fi Benefits
Hassle Free
Deployment

• Controller-less architecture
• Plug-n-play deployment
• Centralized control

Ease of Use

• Designed for little or no IT support
• Single portal administration
• Location-based policies

Low Cost

• Pay-as-you-go OpEx model
• No capital expenditures
• Support and maintenance included
•

Security/Compliance

Strong Security

•
•
•

Top-ranked WIPS technology
Includes security and compliance
Blocks rogues while providing access
Blocks access to unauthorized devices

© 2013 AirTight Networks, Inc. All rights reserved.

11
Thank You!

Cloud Managed Secure Wi-Fi Solutions

www.airtightnetworks.com
info@airtightnetworks.com
@AirTight
+1 877 424 7844

© 2013 AirTight Networks, Inc. All rights reserved.

12

Contenu connexe

Tendances

Siprotec 5 v7.9 v8.0 DigitalTwin
Siprotec 5 v7.9 v8.0  DigitalTwinSiprotec 5 v7.9 v8.0  DigitalTwin
Siprotec 5 v7.9 v8.0 DigitalTwinRyan O'Mara
 
Siprotec 5 - Expanded Cyber Security Capabilities
Siprotec 5  - Expanded Cyber Security CapabilitiesSiprotec 5  - Expanded Cyber Security Capabilities
Siprotec 5 - Expanded Cyber Security CapabilitiesRyan O'Mara
 
Ditek 110C6A Data Sheet
Ditek 110C6A Data SheetDitek 110C6A Data Sheet
Ditek 110C6A Data SheetJMAC Supply
 
Secure Connectivity on Every Network Layer
Secure Connectivity on Every Network LayerSecure Connectivity on Every Network Layer
Secure Connectivity on Every Network LayerADVA
 
Protection, Automation and Monitoring: SIPROTEC 5 v7.9/v8.0
Protection, Automation and Monitoring:  SIPROTEC 5 v7.9/v8.0Protection, Automation and Monitoring:  SIPROTEC 5 v7.9/v8.0
Protection, Automation and Monitoring: SIPROTEC 5 v7.9/v8.0Ryan O'Mara
 
TechWiseTV Workshop: Cisco Hybrid Cloud Platform for Google Cloud
TechWiseTV Workshop:  Cisco Hybrid Cloud Platform for Google CloudTechWiseTV Workshop:  Cisco Hybrid Cloud Platform for Google Cloud
TechWiseTV Workshop: Cisco Hybrid Cloud Platform for Google CloudRobb Boyd
 
ADVA ConnectGuard™
ADVA ConnectGuard™ADVA ConnectGuard™
ADVA ConnectGuard™ADVA
 
Cisco presentatie 25 juni 2014
Cisco presentatie 25 juni 2014Cisco presentatie 25 juni 2014
Cisco presentatie 25 juni 2014Claudia Sträter
 
Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018Jiunn-Jer Sun
 
Automated and secure service activation at the network edge with zero touch p...
Automated and secure service activation at the network edge with zero touch p...Automated and secure service activation at the network edge with zero touch p...
Automated and secure service activation at the network edge with zero touch p...ADVA
 
Enterprise Cloud Computing and the Data Center
Enterprise Cloud Computing and the Data CenterEnterprise Cloud Computing and the Data Center
Enterprise Cloud Computing and the Data CenterFIBERTOWN DC
 
FSP 150-GO102Pro Series: Redefining demarcation for the small cell era
FSP 150-GO102Pro Series: Redefining demarcation for the small cell eraFSP 150-GO102Pro Series: Redefining demarcation for the small cell era
FSP 150-GO102Pro Series: Redefining demarcation for the small cell eraADVA
 
ADVA launches world’s first commercial optical transport solution with post-q...
ADVA launches world’s first commercial optical transport solution with post-q...ADVA launches world’s first commercial optical transport solution with post-q...
ADVA launches world’s first commercial optical transport solution with post-q...ADVA
 
New SIPROTEC 5 Version 7.8 - Overview
New SIPROTEC 5  Version 7.8 - OverviewNew SIPROTEC 5  Version 7.8 - Overview
New SIPROTEC 5 Version 7.8 - OverviewRyan O'Mara
 
Cisco Connect Halifax 2018 Putting firepower into the next generation firewall
Cisco Connect Halifax 2018   Putting firepower into the next generation firewallCisco Connect Halifax 2018   Putting firepower into the next generation firewall
Cisco Connect Halifax 2018 Putting firepower into the next generation firewallCisco Canada
 
Cisco asa firewall
Cisco asa firewallCisco asa firewall
Cisco asa firewallIT Tech
 
Bl wdr3750-specification-www.ttbvs.com
Bl wdr3750-specification-www.ttbvs.comBl wdr3750-specification-www.ttbvs.com
Bl wdr3750-specification-www.ttbvs.comTTBVS
 
Ditek MRJPOE Data Sheet
Ditek MRJPOE Data SheetDitek MRJPOE Data Sheet
Ditek MRJPOE Data SheetJMAC Supply
 

Tendances (20)

Siprotec 5 v7.9 v8.0 DigitalTwin
Siprotec 5 v7.9 v8.0  DigitalTwinSiprotec 5 v7.9 v8.0  DigitalTwin
Siprotec 5 v7.9 v8.0 DigitalTwin
 
Siprotec 5 - Expanded Cyber Security Capabilities
Siprotec 5  - Expanded Cyber Security CapabilitiesSiprotec 5  - Expanded Cyber Security Capabilities
Siprotec 5 - Expanded Cyber Security Capabilities
 
Ditek 110C6A Data Sheet
Ditek 110C6A Data SheetDitek 110C6A Data Sheet
Ditek 110C6A Data Sheet
 
Secure Connectivity on Every Network Layer
Secure Connectivity on Every Network LayerSecure Connectivity on Every Network Layer
Secure Connectivity on Every Network Layer
 
Protection, Automation and Monitoring: SIPROTEC 5 v7.9/v8.0
Protection, Automation and Monitoring:  SIPROTEC 5 v7.9/v8.0Protection, Automation and Monitoring:  SIPROTEC 5 v7.9/v8.0
Protection, Automation and Monitoring: SIPROTEC 5 v7.9/v8.0
 
TechWiseTV Workshop: Cisco Hybrid Cloud Platform for Google Cloud
TechWiseTV Workshop:  Cisco Hybrid Cloud Platform for Google CloudTechWiseTV Workshop:  Cisco Hybrid Cloud Platform for Google Cloud
TechWiseTV Workshop: Cisco Hybrid Cloud Platform for Google Cloud
 
ADVA ConnectGuard™
ADVA ConnectGuard™ADVA ConnectGuard™
ADVA ConnectGuard™
 
Cisco presentatie 25 juni 2014
Cisco presentatie 25 juni 2014Cisco presentatie 25 juni 2014
Cisco presentatie 25 juni 2014
 
Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018
 
Automated and secure service activation at the network edge with zero touch p...
Automated and secure service activation at the network edge with zero touch p...Automated and secure service activation at the network edge with zero touch p...
Automated and secure service activation at the network edge with zero touch p...
 
Enterprise Cloud Computing and the Data Center
Enterprise Cloud Computing and the Data CenterEnterprise Cloud Computing and the Data Center
Enterprise Cloud Computing and the Data Center
 
FSP 150-GO102Pro Series: Redefining demarcation for the small cell era
FSP 150-GO102Pro Series: Redefining demarcation for the small cell eraFSP 150-GO102Pro Series: Redefining demarcation for the small cell era
FSP 150-GO102Pro Series: Redefining demarcation for the small cell era
 
ADVA launches world’s first commercial optical transport solution with post-q...
ADVA launches world’s first commercial optical transport solution with post-q...ADVA launches world’s first commercial optical transport solution with post-q...
ADVA launches world’s first commercial optical transport solution with post-q...
 
New SIPROTEC 5 Version 7.8 - Overview
New SIPROTEC 5  Version 7.8 - OverviewNew SIPROTEC 5  Version 7.8 - Overview
New SIPROTEC 5 Version 7.8 - Overview
 
Cisco Connect Halifax 2018 Putting firepower into the next generation firewall
Cisco Connect Halifax 2018   Putting firepower into the next generation firewallCisco Connect Halifax 2018   Putting firepower into the next generation firewall
Cisco Connect Halifax 2018 Putting firepower into the next generation firewall
 
Cisco asa firewall
Cisco asa firewallCisco asa firewall
Cisco asa firewall
 
Airheads vail 2011 pci 2.0 compliance
Airheads vail 2011   pci 2.0 complianceAirheads vail 2011   pci 2.0 compliance
Airheads vail 2011 pci 2.0 compliance
 
Physically securing the wireless installation
Physically securing the wireless installationPhysically securing the wireless installation
Physically securing the wireless installation
 
Bl wdr3750-specification-www.ttbvs.com
Bl wdr3750-specification-www.ttbvs.comBl wdr3750-specification-www.ttbvs.com
Bl wdr3750-specification-www.ttbvs.com
 
Ditek MRJPOE Data Sheet
Ditek MRJPOE Data SheetDitek MRJPOE Data Sheet
Ditek MRJPOE Data Sheet
 

Similaire à Cloud managed secure wi fi

Considerations for a secure enterprise wlan data connectors 2013
Considerations for a secure enterprise wlan   data connectors 2013Considerations for a secure enterprise wlan   data connectors 2013
Considerations for a secure enterprise wlan data connectors 2013AirTight Networks
 
CUE Customer Sales Presentation-2023 pdf
CUE Customer Sales Presentation-2023 pdfCUE Customer Sales Presentation-2023 pdf
CUE Customer Sales Presentation-2023 pdfabenyeung
 
Did Your Wi-Fi Performance Expire Before the Warranty Did? | Steps to Providi...
Did Your Wi-Fi Performance Expire Before the Warranty Did? | Steps to Providi...Did Your Wi-Fi Performance Expire Before the Warranty Did? | Steps to Providi...
Did Your Wi-Fi Performance Expire Before the Warranty Did? | Steps to Providi...Xirrus
 
CohesiveFT and IBM joint EMEA Webinar - 20Jun13
CohesiveFT and IBM joint EMEA Webinar - 20Jun13CohesiveFT and IBM joint EMEA Webinar - 20Jun13
CohesiveFT and IBM joint EMEA Webinar - 20Jun13Cohesive Networks
 
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTXCustomer Presentation - Aruba Wi-Fi Overview (1).PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTXssuser5824cf
 
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01Sergiy Pitel
 
Cisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager NetworksCisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager NetworksNTS UK - Part of Capita
 
Simplificando a Rede Wireless - Aerohive
Simplificando a Rede Wireless - AerohiveSimplificando a Rede Wireless - Aerohive
Simplificando a Rede Wireless - AerohiveRodrigo Martini
 
Businessday okt 2016 - Xirrus
Businessday okt 2016 - Xirrus Businessday okt 2016 - Xirrus
Businessday okt 2016 - Xirrus Marketing Team
 
Software-Defined WAN: A Real World Success Story
Software-Defined WAN: A Real World Success StorySoftware-Defined WAN: A Real World Success Story
Software-Defined WAN: A Real World Success StoryCisco Enterprise Networks
 
Cisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by MerakiCisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by MerakiRowell Dionicio
 
SpiderCloud Wireless Scaling Small Cells indoors
SpiderCloud Wireless Scaling Small Cells indoorsSpiderCloud Wireless Scaling Small Cells indoors
SpiderCloud Wireless Scaling Small Cells indoorsSmall Cell Forum
 
Managing Student Devices on the School Wireless Network
Managing Student Devices on the School Wireless NetworkManaging Student Devices on the School Wireless Network
Managing Student Devices on the School Wireless NetworkSecurEdgeNetworks
 
Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...
Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...
Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...Xirrus
 
Cloud networking use cases with VNS3
Cloud networking use cases with VNS3Cloud networking use cases with VNS3
Cloud networking use cases with VNS3Cohesive Networks
 
Addressing Needs of BYOD for Enterprises with Unified Access
Addressing Needs of BYOD for Enterprises with Unified AccessAddressing Needs of BYOD for Enterprises with Unified Access
Addressing Needs of BYOD for Enterprises with Unified AccessAlcatel-Lucent Enterprise
 

Similaire à Cloud managed secure wi fi (20)

Considerations for a secure enterprise wlan data connectors 2013
Considerations for a secure enterprise wlan   data connectors 2013Considerations for a secure enterprise wlan   data connectors 2013
Considerations for a secure enterprise wlan data connectors 2013
 
CUE Customer Sales Presentation-2023 pdf
CUE Customer Sales Presentation-2023 pdfCUE Customer Sales Presentation-2023 pdf
CUE Customer Sales Presentation-2023 pdf
 
Breakout - Airheads Macau 2013 - Cloud WiFi
Breakout - Airheads Macau 2013 - Cloud WiFiBreakout - Airheads Macau 2013 - Cloud WiFi
Breakout - Airheads Macau 2013 - Cloud WiFi
 
Did Your Wi-Fi Performance Expire Before the Warranty Did? | Steps to Providi...
Did Your Wi-Fi Performance Expire Before the Warranty Did? | Steps to Providi...Did Your Wi-Fi Performance Expire Before the Warranty Did? | Steps to Providi...
Did Your Wi-Fi Performance Expire Before the Warranty Did? | Steps to Providi...
 
CohesiveFT and IBM joint EMEA Webinar - 20Jun13
CohesiveFT and IBM joint EMEA Webinar - 20Jun13CohesiveFT and IBM joint EMEA Webinar - 20Jun13
CohesiveFT and IBM joint EMEA Webinar - 20Jun13
 
A stepped approach to unified access
A stepped approach to unified access A stepped approach to unified access
A stepped approach to unified access
 
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTXCustomer Presentation - Aruba Wi-Fi Overview (1).PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX
 
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
 
Cisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager NetworksCisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager Networks
 
Sigfox User Group Launch UK
Sigfox User Group Launch UKSigfox User Group Launch UK
Sigfox User Group Launch UK
 
Simplificando a Rede Wireless - Aerohive
Simplificando a Rede Wireless - AerohiveSimplificando a Rede Wireless - Aerohive
Simplificando a Rede Wireless - Aerohive
 
Businessday okt 2016 - Xirrus
Businessday okt 2016 - Xirrus Businessday okt 2016 - Xirrus
Businessday okt 2016 - Xirrus
 
Software-Defined WAN: A Real World Success Story
Software-Defined WAN: A Real World Success StorySoftware-Defined WAN: A Real World Success Story
Software-Defined WAN: A Real World Success Story
 
Cisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by MerakiCisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by Meraki
 
SpiderCloud Wireless Scaling Small Cells indoors
SpiderCloud Wireless Scaling Small Cells indoorsSpiderCloud Wireless Scaling Small Cells indoors
SpiderCloud Wireless Scaling Small Cells indoors
 
Managing Student Devices on the School Wireless Network
Managing Student Devices on the School Wireless NetworkManaging Student Devices on the School Wireless Network
Managing Student Devices on the School Wireless Network
 
Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...
Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...
Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...
 
Cloud networking use cases with VNS3
Cloud networking use cases with VNS3Cloud networking use cases with VNS3
Cloud networking use cases with VNS3
 
Young Enterprise Day 2014 – Unified Access
Young Enterprise Day 2014 – Unified AccessYoung Enterprise Day 2014 – Unified Access
Young Enterprise Day 2014 – Unified Access
 
Addressing Needs of BYOD for Enterprises with Unified Access
Addressing Needs of BYOD for Enterprises with Unified AccessAddressing Needs of BYOD for Enterprises with Unified Access
Addressing Needs of BYOD for Enterprises with Unified Access
 

Dernier

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Dernier (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Cloud managed secure wi fi

  • 1. Cloud Managed Secure Wi-Fi Dr. Pravin Bhagwat CTO, AirTight Networks © 2013 AirTight Networks, Inc. All rights reserved.
  • 2. Enabling Today’s Distributed Enterprise Wi-Fi’s Impact  Reduced costs  Mobile workforce  Agility and productivity  New business opportunities © 2013 AirTight Networks, Inc. All rights reserved. 2
  • 3. Challenges in Distributed Wi-Fi  Geographically distributed locations  Large scale operation  Lack of IT staff  Cost concerns  Security and compliance © 2013 AirTight Networks, Inc. All rights reserved. 3
  • 4. Traditional Enterprise WLAN Deployments       Multi-tiered architecture Feature based licensing Basic WIDS “bolt-on” Dedicated IT resources Extensive training On-going/on-site support © 2013 AirTight Networks, Inc. All rights reserved.
  • 5. Comparison of Wi-Fi Deployment of Architectures Controller based Cloud managed Complex High cost Not scalable Difficult to manage © 2013 AirTight Networks, Inc. All rights reserved. Simple Lower cost Infinitely scalable Easy to manage 5
  • 6. AirTight Cloud – Salient Features SSAE-16 Certified Data Centers Massively Scalable, Multi-Tenant Elastic Cloud Architecture Drop-Ship, Plug-n-Play Deployment Built-in High Availability & Fault-Tolerance Single Console Centralized Management Location-based Administration © 2013 AirTight Networks, Inc. All rights reserved. 6
  • 7. AirTight Cloud Footprint Fully virtualized, running on VMware ESXi hypervisor © 2013 AirTight Networks, Inc. All rights reserved. 7
  • 8. Intelligent Edge, Controller-less WLAN Architecture Intelligence built into every AirTight AP   Plug-and-play zero touch deployment Data switching and control at the edge including segregation of corporate and guest networks Per SSID bandwidth and security controls     Stateful firewall; DNS-based content filtering Secure BYOD onboarding QoS for real-time applications, e.g., VoIP Admission control and traffic shaping No dependence on a central controller – local or in the cloud   No choke point or single point of failure Fault-tolerant stand-alone AP operation with no loss of functionality © 2013 AirTight Networks, Inc. All rights reserved. 8
  • 9. WIPS Architectures  Integrated • APs repurposed as sensors • Background scanning and minimal protection • Cannot co-exist with time-sensitive apps, e.g., VoIP 2.4 5 GHZ GHz Wi-Fi AP with background scanning  Overlay • Dedicated sensors on top of existing WLAN • 24/7 monitoring and protection 2.4 5 2.4 5 GHZ GHz GHZ GHz Wi-Fi AP WIPS Sensor  Combo • APs repurposed as sensors • 24/7 monitoring and protection • Able to support all types of apps, including VoIP © 2013 AirTight Networks, Inc. All rights reserved. 2.4 / 5 2.4 + 5 GHZ GHZ Wi-Fi AP with Concurrent WIPS sensor 9
  • 10. AT-C60: Industry’s Most Flexible Wi-Fi Platform  Software-defined, band-unlocked radios – an industry first  Concurrent Wi-Fi access and 24/7 WIPS – an industry first © 2013 AirTight Networks, Inc. All rights reserved. 10
  • 11. AirTight Cloud Secure Wi-Fi Benefits Distributed Wi-Fi Challenges Remote/distributed/SMB locations Minimal or no IT staff at remote sites Limited IT budget AirTight Cloud Wi-Fi Benefits Hassle Free Deployment • Controller-less architecture • Plug-n-play deployment • Centralized control Ease of Use • Designed for little or no IT support • Single portal administration • Location-based policies Low Cost • Pay-as-you-go OpEx model • No capital expenditures • Support and maintenance included • Security/Compliance Strong Security • • • Top-ranked WIPS technology Includes security and compliance Blocks rogues while providing access Blocks access to unauthorized devices © 2013 AirTight Networks, Inc. All rights reserved. 11
  • 12. Thank You! Cloud Managed Secure Wi-Fi Solutions www.airtightnetworks.com info@airtightnetworks.com @AirTight +1 877 424 7844 © 2013 AirTight Networks, Inc. All rights reserved. 12