SlideShare a Scribd company logo
1 of 5
AirTight Networks           WHITEPAPER




AirTight Secure Wi-Fi™
Cloud-based Secure Wi-Fi Access with PCI Wireless Scanning

A Whitepaper by AirTight Networks, Inc.


339 N. Bernardo Avenue, Suite 200, Mountain View, CA 94043
www.airtightnetworks.com




                                                             © 2011 AirTight Networks, Inc. All rights reserved.
AirTight Networks        WHITEPAPER




AirTight Secure Wi-Fi™




                               Executive Summary
                               Retail enterprises have been yearning for an affordable, easy to use,
                               and scalable Wi-Fi access solution that meets their unique business
                               process and customer service requirements while maintaining their
                               PCI compliance and network security. But, the only options retailers
                               had in the past were: 1) traditional enterprise Wi-Fi solutions that
                               are too complex and costly for managing hundreds or thousands of
                               geographically distributed access points, or 2) unreliable, consumer-
                               grade Wi-Fi access points that lack centralized, remote manageability and
                               have very limited security features.

                               AirTight Secure Wi-Fi™, part of AirTight Cloud Services™, is precisely
                               designed to fill this gap. Retail organizations of all sizes, looking to
                               deploy Wi-Fi across geographically distributed sites, finally have a viable
                               enterprise Wi-Fi solution that:
                                 –     requires zero upfront investment;
                                 –     entails no additional administrative burden;
                                 –     can be securely and remotely managed from anywhere on the
                                       Internet;
                                 –     is infinitely scalable; and
                                 –     takes care of their PCI wireless scanning and security requirements.

                               In fact, organizations with PCI compliance reporting and wireless security
                               as their top priority can start with AirTight’s cloud-based wireless security
                               and compliance service, and seamlessly upgrade the service, with the
                               click of a mouse and a phone call, to include secure Wi-Fi access in the
                               future, without touching the hardware.




                                      © 2011 AirTight Networks, Inc. All rights reserved.                      2
AirTight Networks        WHITEPAPER




AirTight Secure Wi-Fi™




                               More and more establishments in hospitality and retail verticals — such as quick serve
                               restaurants, convenience stores, hotels, and cafes — are considering Wi-Fi access as
                               a strategic business initiative. A number of key applications centered around greater
                               efficiency, increased sales, and customer convenience are driving this interest. But
                               enterprises have been postponing their Wi-Fi rollout in the absence of an affordable,
                               easy to use, and scalable solution.

                               Enterprise Wi-Fi Solutions for Retail
                               Traditional enterprise Wi-Fi solutions (including the controller-based architecture)
                               have been designed to support tens or hundreds of access points (APs) covering a
                               single campus. But typical Wi-Fi deployment in retail enterprises involves hundreds or
                               thousands of locations with only one or two APs covering each location.

                               Centrally managing such fragmented Wi-Fi networks, consisting of thousands of
                               geographically distributed APs, is radically different than managing a Wi-Fi network
                               serving a single campus. Not surprisingly, trying to use existing enterprise Wi-Fi solutions
                               in retail environments turns out to be complex, inefficient, and costly.

                               Consumer-grade Wi-Fi APs present a cheaper alternative, but they lack the security,
                               reliability, and central management capability required in an enterprise solution. In
                               addition to Wi-Fi access, retail organizations are looking for a solution that provides
                               comprehensive wireless security and simplifies their PCI wireless scanning requirement
                               at a minimal cost and without additional administrative burden.

                               An enterprise Wi-Fi solution tailored for retail organizations should enable:
                               PCI wireless compliance and security: Enterprises should be able to centrally enforce
                               their corporate wireless security policies, automate PCI wireless scanning and receive
                               a consolidated PCI compliance report.
                               Ease of use: Remove the complexity of deploying, securing, and managing
                               geographically distributed Wi-Fi networks.
                               Role-based permissions: The solution should allow granular delegation of
                               administrative functions such as policy definition, customization, and reporting by local
                               administrators, store managers, or franchisees while maintaining complete control of
                               security and compliance by the corporate IT department.
                               Remote management: For remote sites having little or no IT staff, the corporate network
                               administrator should be able to manage the Wi-Fi network remotely from anywhere on
                               the Internet.
                               Flexibility: Enterprises should be able to rollout their Wi-Fi network when and where
                               needed, and be able to enforce group-based policies where a group could represent
                               a geographical location, type of stores, a specific consumer brand, etc.
                               Scalability: The Wi-Fi network should scale over thousands of remote locations without
                               compromising on functionality and ease of use.




                                      © 2011 AirTight Networks, Inc. All rights reserved.                                  3
AirTight Networks        WHITEPAPER




AirTight Secure Wi-Fi™




                               One Hospitality Organization, 18,000+ Locations and the Need
                               for Wireless PCI Compliance and Wi-Fi Access
                               A large retail enterprise, with more than 18,000 quick serve restaurants spread across
                               the United States, was looking for a cost-effective and efficient way to conduct wireless
                               scans at all its remote stores as a part of its PCI DSS Compliance project. AirTight’s
                               SpectraGuard wireless intrusion prevention system (WIPS), delivered as a cloud based
                               service, was the solution of choice not only because it automated the wireless scanning
                               of 18,000+ stores and simplified the centralized management and reporting for PCI
                               compliance, but also because it provided solid 24/7 security for the corporate HQ
                               network from wireless threats.

                               With no upfront capital outlay, the organization did not have to wait for budget approval
                               to get started and was able to meet the PCI wireless scanning and reporting compliance
                               deadline.

                               But, as a strategic investment, it also wanted to provision Wi-Fi access to its store owners
                               giving them the options of:
                                 – providing Wi-Fi HotSpot access to their customers as a way to increase the number
                                    of footfalls;
                                 – making their inventory control more efficient; and
                                 – letting the serving staff place customer orders to the kitchen via mobile PoS.
                               A controller-based enterprise Wi-Fi solution was already deployed at its HQ. But with
                               only one AP required per store, the controller-based architecture was overkill. Further,
                               extending that architecture to its remote stores was not practical because of the high
                               cost, high complexity, limited scalability, and limited remote manageability. That is
                               where AirTight’s cloud based solution came into play to provide wireless security, PCI
                               compliance, and in-store Wi-Fi access.

                               After carefully evaluating enterprise Wi-Fi solutions from leading WLAN vendors, AirTight
                               Secure Wi-Fi™, which combines cloud-based PCI wireless scanning and secure Wi-Fi
                               access, was chosen as the most reliable, automated solution to provide Wi-Fi access to
                               18,000+ distributed stores without compromising on PCI compliance.




                                      © 2011 AirTight Networks, Inc. All rights reserved.                                  4
AirTight Networks                        WHITEPAPER




AirTight Secure Wi-Fi™




  About                                              AirTight Secure Wi-Fi™ - Lowest Cost and Complexity for Wi-Fi
  AirTight Networks                                  Access and PCI Wireless Compliance
                                                     AirTight Secure Wi-Fi™ is the first Wi-Fi access and security solution designed specifically
 AirTight Networks is the global
                                                     for retail enterprises with distributed outlets. It is an automated PCI wireless scanning
 leader in wireless security and
                                                     and compliance service that can double as an enterprise Wi-Fi access solution, with the
 compliance products and services,
                                                     following key features.
 providing customers best-of-
 breed technology to automatically                   Automated PCI wireless compliance and security: AirTight’s wireless sensors provide
 detect, classify, locate and block                  24/7 scanning to detect wireless vulnerabilities and policy violations in real time. For
 all current and emerging wireless                   instance, AirTight’s patented Marker packet techniques automatically and accurately
 threats. AirTight offers industry’s                 detect Rogue wireless devices in no time, eliminating the need for manual wireless
 leading wireless intrusion                          scans. With a single click of a mouse on the central console, the wireless sensors can
 prevention system (WIPS) and the                    also be converted into a dual-purpose AP-sensor combo mode. In this mode, the devices
 world’s only SaaS based wireless                    conduct background scanning while providing Wi-Fi access, allowing organizations to
 security, compliance and Wi-Fi                      maintain their PCI wireless compliance.
 access branded as AirTight Cloud                    Cloud-based delivery: A controller-less wireless LAN architecture hosted in the cloud
 Services™. AirTight’s award-                        enables virtually infinite scalability and reduces the complexity of managing network
 winning solutions are used by                       security, PCI compliance and Wi-Fi access.
 customers globally in the financial,
                                                     Pay-as-you-go model: With a pay-as-you-go subscription model and zero upfront
 government, retail and hospitality,
                                                     investment, retailers can start their PCI wireless scanning and in-store Wi-Fi access
 manufacturing, transportation,
                                                     immediately, without waiting for a capital outlay budget.
 education, health care, telecom,
 and technology industries. AirTight                 Plug-and-play installation: Pre-configured wireless sensor-AP devices that automatically
 owns the seminal patents for                        connect and synchronize with the central server, literally enable plug-and-play
 wireless intrusion prevention                       deployment at remote locations in minutes without the need for intricate configuration
 technology with 18 U.S. patents                     or local IT support.
 and three international patents                     Portal-based administration: Administrators can securely access the central
 granted (Australia, Japan and                       management console via their web browser from anywhere on the Internet. They can
 UK), and more than 20 additional                    remotely manage everything from viewing and responding to wireless security alerts to
 patents pending. AirTight Networks                  changing settings on Wi-Fi APs at distributed locations.
 is a privately held company
                                                     Centralized policy enforcement: Administrators can simply define and enforce
 based in Mountain View, CA. For
                                                     corporate security policies across thousands of stores from a central point, while being
 more information please visit:
                                                     able to customize policies for Wi-Fi access, reporting, alerts, incident response, etc. for
 www.airtightnetworks.com.
                                                     specific locations.
 AirTight and SpectraGuard are                       Flexible services model: Organizations have the option to start with the PCI wireless
 registered trademarks of AirTight                   compliance service and then upgrade the service to full wireless intrusion prevention
 Networks, Inc. AirTight Networks,                   or to include secure Wi-Fi access in the future with no IT intervention and no additional
 AirTight Networks logo, AirTight Cloud              hardware.
 Services and AirTight Secure Wi-Fi are
 trademarks. All other trademarks are
 the property of their respective owners.            With its unparalleled wireless security technology and ease of use, automated PCI
                                                     wireless scanning and reporting, and virtually infinite scalability, AirTight Secure Wi-Fi™
                                                     is well positioned to serve the unique requirements of the retail and hospitality industry
                                                     for supporting large-scale distributed Wi-Fi networks.


The Global Leader in Wireless Security Solutions
AirTight Networks, Inc. 339 N. Bernardo Avenue #200, Mountain View, CA 94043
T +1.877.424.7844 T 650.961.1111 F 650.961.1169 www.airtightnetworks.com info@airtightnetworks.com
© 2011 AirTight Networks, Inc. All rights reserved. AirTight Networks and the AirTight Networks logo are trademarks, and
AirTight and SpectraGuard are registered trademarks of AirTight Networks, Inc. All other trademarks mentioned herein are
properties of their respective owners. Specifications are subject to change without notice.

More Related Content

What's hot

Cisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by MerakiCisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by MerakiRowell Dionicio
 
Enterprise-Network-Architectures-Using-4GLTE_v2
Enterprise-Network-Architectures-Using-4GLTE_v2Enterprise-Network-Architectures-Using-4GLTE_v2
Enterprise-Network-Architectures-Using-4GLTE_v2Estee Woods
 
The definitive guide for evaluating enterprise WLAN networks
The definitive guide for evaluating enterprise WLAN networksThe definitive guide for evaluating enterprise WLAN networks
The definitive guide for evaluating enterprise WLAN networksAerohive Networks
 
Inter op nyc_mahbubul alam_october 2012
Inter op nyc_mahbubul alam_october 2012Inter op nyc_mahbubul alam_october 2012
Inter op nyc_mahbubul alam_october 2012Mahbubul Alam
 
Next Generation of Affordable Connectivity - Bristol
Next Generation of Affordable Connectivity - BristolNext Generation of Affordable Connectivity - Bristol
Next Generation of Affordable Connectivity - BristolTodd Kellond
 
Vfm strategic benefits from caching
Vfm strategic benefits from cachingVfm strategic benefits from caching
Vfm strategic benefits from cachingvfmindia
 
Beyond BYOD: Uncompromised Experience for Any Workspace
Beyond BYOD: Uncompromised Experience for Any WorkspaceBeyond BYOD: Uncompromised Experience for Any Workspace
Beyond BYOD: Uncompromised Experience for Any WorkspaceCisco Mobility
 
Mobility report wireless technology supported by sm bs
Mobility report   wireless technology supported by sm bsMobility report   wireless technology supported by sm bs
Mobility report wireless technology supported by sm bsEnterprise Mobility Solutions
 
Nirad The cloud managed networking solution
Nirad The cloud managed networking solutionNirad The cloud managed networking solution
Nirad The cloud managed networking solutionSagar Reddy
 
24online Hotspot presentation
24online Hotspot presentation24online Hotspot presentation
24online Hotspot presentationvismayibhat
 
Mobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solutionMobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solutionCisco Mobility
 
Gigamon Ensures Privacy of Data in Multi-tenant Network and Enables Near Real...
Gigamon Ensures Privacy of Data in Multi-tenant Network and Enables Near Real...Gigamon Ensures Privacy of Data in Multi-tenant Network and Enables Near Real...
Gigamon Ensures Privacy of Data in Multi-tenant Network and Enables Near Real...Grant Swanson
 
Extreme Networks Retail Guest Analytics Solution
Extreme Networks Retail Guest Analytics SolutionExtreme Networks Retail Guest Analytics Solution
Extreme Networks Retail Guest Analytics SolutionExtreme Networks
 
Datacenter and cloud - corporate presentation
Datacenter and cloud - corporate presentationDatacenter and cloud - corporate presentation
Datacenter and cloud - corporate presentationBipin-Singh
 

What's hot (18)

Motorola enterprise mobility_solutions_brochure
Motorola enterprise mobility_solutions_brochureMotorola enterprise mobility_solutions_brochure
Motorola enterprise mobility_solutions_brochure
 
Cisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by MerakiCisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by Meraki
 
Enterprise-Network-Architectures-Using-4GLTE_v2
Enterprise-Network-Architectures-Using-4GLTE_v2Enterprise-Network-Architectures-Using-4GLTE_v2
Enterprise-Network-Architectures-Using-4GLTE_v2
 
Wireless data-checklist[1]
Wireless data-checklist[1]Wireless data-checklist[1]
Wireless data-checklist[1]
 
The definitive guide for evaluating enterprise WLAN networks
The definitive guide for evaluating enterprise WLAN networksThe definitive guide for evaluating enterprise WLAN networks
The definitive guide for evaluating enterprise WLAN networks
 
Inter op nyc_mahbubul alam_october 2012
Inter op nyc_mahbubul alam_october 2012Inter op nyc_mahbubul alam_october 2012
Inter op nyc_mahbubul alam_october 2012
 
Beyond BYOD
Beyond BYODBeyond BYOD
Beyond BYOD
 
Next Generation of Affordable Connectivity - Bristol
Next Generation of Affordable Connectivity - BristolNext Generation of Affordable Connectivity - Bristol
Next Generation of Affordable Connectivity - Bristol
 
Vfm strategic benefits from caching
Vfm strategic benefits from cachingVfm strategic benefits from caching
Vfm strategic benefits from caching
 
Beyond BYOD: Uncompromised Experience for Any Workspace
Beyond BYOD: Uncompromised Experience for Any WorkspaceBeyond BYOD: Uncompromised Experience for Any Workspace
Beyond BYOD: Uncompromised Experience for Any Workspace
 
Mobility report wireless technology supported by sm bs
Mobility report   wireless technology supported by sm bsMobility report   wireless technology supported by sm bs
Mobility report wireless technology supported by sm bs
 
Nirad The cloud managed networking solution
Nirad The cloud managed networking solutionNirad The cloud managed networking solution
Nirad The cloud managed networking solution
 
24online Hotspot presentation
24online Hotspot presentation24online Hotspot presentation
24online Hotspot presentation
 
Mobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solutionMobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solution
 
Gigamon Ensures Privacy of Data in Multi-tenant Network and Enables Near Real...
Gigamon Ensures Privacy of Data in Multi-tenant Network and Enables Near Real...Gigamon Ensures Privacy of Data in Multi-tenant Network and Enables Near Real...
Gigamon Ensures Privacy of Data in Multi-tenant Network and Enables Near Real...
 
Extreme Networks Retail Guest Analytics Solution
Extreme Networks Retail Guest Analytics SolutionExtreme Networks Retail Guest Analytics Solution
Extreme Networks Retail Guest Analytics Solution
 
Campaign Presentation
Campaign PresentationCampaign Presentation
Campaign Presentation
 
Datacenter and cloud - corporate presentation
Datacenter and cloud - corporate presentationDatacenter and cloud - corporate presentation
Datacenter and cloud - corporate presentation
 

Viewers also liked

Conquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the EnterpriseConquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the EnterpriseAirTight Networks
 
Survey on the Impact of BYOD on Enterprise Security
Survey on the Impact of BYOD on Enterprise SecuritySurvey on the Impact of BYOD on Enterprise Security
Survey on the Impact of BYOD on Enterprise SecurityAirTight Networks
 
Retail Stores and Wireless Security—Recommendations
Retail Stores and Wireless Security—RecommendationsRetail Stores and Wireless Security—Recommendations
Retail Stores and Wireless Security—RecommendationsAirTight Networks
 
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...AirTight Networks
 
Wi-Fi Offload Summit - Monetise Thyself
Wi-Fi Offload Summit - Monetise ThyselfWi-Fi Offload Summit - Monetise Thyself
Wi-Fi Offload Summit - Monetise ThyselfAirTight Networks
 
Is 11ac Right for Your Network?
Is 11ac Right for Your Network?Is 11ac Right for Your Network?
Is 11ac Right for Your Network?AirTight Networks
 
Considerations for a secure enterprise wlan data connectors 2013
Considerations for a secure enterprise wlan   data connectors 2013Considerations for a secure enterprise wlan   data connectors 2013
Considerations for a secure enterprise wlan data connectors 2013AirTight Networks
 
Wireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your EnterpriseWireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your EnterpriseAirTight Networks
 
Financial Districs Wi Fi Scan
Financial Districs Wi Fi ScanFinancial Districs Wi Fi Scan
Financial Districs Wi Fi ScanAirTight Networks
 
AirTight Networks WIPS at Wireless Field Day 6 WFD6
AirTight Networks WIPS at Wireless Field Day 6 WFD6AirTight Networks WIPS at Wireless Field Day 6 WFD6
AirTight Networks WIPS at Wireless Field Day 6 WFD6AirTight Networks
 
WPA2 Hole196 Vulnerability: Exploits and Remediation Strategies
WPA2 Hole196 Vulnerability: Exploits and Remediation StrategiesWPA2 Hole196 Vulnerability: Exploits and Remediation Strategies
WPA2 Hole196 Vulnerability: Exploits and Remediation StrategiesAirTight Networks
 
AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014
AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014
AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014AirTight Networks
 
Air tight 11ac webinar series session 2 - 11ac feature deep dive - june 2014
Air tight 11ac webinar series   session 2 - 11ac feature deep dive - june 2014Air tight 11ac webinar series   session 2 - 11ac feature deep dive - june 2014
Air tight 11ac webinar series session 2 - 11ac feature deep dive - june 2014AirTight Networks
 
Restaurant Wi-Fi Primer: Retail Analytics and Social Integration
Restaurant Wi-Fi Primer: Retail Analytics and Social Integration Restaurant Wi-Fi Primer: Retail Analytics and Social Integration
Restaurant Wi-Fi Primer: Retail Analytics and Social Integration AirTight Networks
 

Viewers also liked (16)

Conquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the EnterpriseConquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the Enterprise
 
Survey on the Impact of BYOD on Enterprise Security
Survey on the Impact of BYOD on Enterprise SecuritySurvey on the Impact of BYOD on Enterprise Security
Survey on the Impact of BYOD on Enterprise Security
 
Retail Stores and Wireless Security—Recommendations
Retail Stores and Wireless Security—RecommendationsRetail Stores and Wireless Security—Recommendations
Retail Stores and Wireless Security—Recommendations
 
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
 
WPA/WPA2 TKIP Exploit
WPA/WPA2 TKIP ExploitWPA/WPA2 TKIP Exploit
WPA/WPA2 TKIP Exploit
 
Wi-Fi Offload Summit - Monetise Thyself
Wi-Fi Offload Summit - Monetise ThyselfWi-Fi Offload Summit - Monetise Thyself
Wi-Fi Offload Summit - Monetise Thyself
 
Is 11ac Right for Your Network?
Is 11ac Right for Your Network?Is 11ac Right for Your Network?
Is 11ac Right for Your Network?
 
Considerations for a secure enterprise wlan data connectors 2013
Considerations for a secure enterprise wlan   data connectors 2013Considerations for a secure enterprise wlan   data connectors 2013
Considerations for a secure enterprise wlan data connectors 2013
 
Wireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your EnterpriseWireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your Enterprise
 
Financial Districs Wi Fi Scan
Financial Districs Wi Fi ScanFinancial Districs Wi Fi Scan
Financial Districs Wi Fi Scan
 
AirTight Networks WIPS at Wireless Field Day 6 WFD6
AirTight Networks WIPS at Wireless Field Day 6 WFD6AirTight Networks WIPS at Wireless Field Day 6 WFD6
AirTight Networks WIPS at Wireless Field Day 6 WFD6
 
WPA2 Hole196 Vulnerability: Exploits and Remediation Strategies
WPA2 Hole196 Vulnerability: Exploits and Remediation StrategiesWPA2 Hole196 Vulnerability: Exploits and Remediation Strategies
WPA2 Hole196 Vulnerability: Exploits and Remediation Strategies
 
AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014
AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014
AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014
 
802.11w Tutorial
802.11w Tutorial802.11w Tutorial
802.11w Tutorial
 
Air tight 11ac webinar series session 2 - 11ac feature deep dive - june 2014
Air tight 11ac webinar series   session 2 - 11ac feature deep dive - june 2014Air tight 11ac webinar series   session 2 - 11ac feature deep dive - june 2014
Air tight 11ac webinar series session 2 - 11ac feature deep dive - june 2014
 
Restaurant Wi-Fi Primer: Retail Analytics and Social Integration
Restaurant Wi-Fi Primer: Retail Analytics and Social Integration Restaurant Wi-Fi Primer: Retail Analytics and Social Integration
Restaurant Wi-Fi Primer: Retail Analytics and Social Integration
 

Similar to AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scanning

Aerohive Corporate Brochure
Aerohive Corporate BrochureAerohive Corporate Brochure
Aerohive Corporate BrochureAerohive
 
Simplificando a Rede Wireless - Aerohive
Simplificando a Rede Wireless - AerohiveSimplificando a Rede Wireless - Aerohive
Simplificando a Rede Wireless - AerohiveRodrigo Martini
 
Wifi offload-through-eap-authentication
Wifi offload-through-eap-authenticationWifi offload-through-eap-authentication
Wifi offload-through-eap-authenticationJustus @GreenPacket
 
Wi-Fi Offload Authentication & Security through EAP based approach - White P...
 Wi-Fi Offload Authentication & Security through EAP based approach - White P... Wi-Fi Offload Authentication & Security through EAP based approach - White P...
Wi-Fi Offload Authentication & Security through EAP based approach - White P...Green Packet
 
ROOTS wireless solution - designing the next wireless user experience oct17
ROOTS wireless solution - designing the next wireless user experience oct17ROOTS wireless solution - designing the next wireless user experience oct17
ROOTS wireless solution - designing the next wireless user experience oct17ROOTS Communications Pte Ltd
 
WiTech Wi-Fi cloud - managed services forum 2011 - lisbon
WiTech Wi-Fi cloud - managed services forum 2011 - lisbon WiTech Wi-Fi cloud - managed services forum 2011 - lisbon
WiTech Wi-Fi cloud - managed services forum 2011 - lisbon Claudio Adriani
 
Case Study: Aerohive
Case Study: AerohiveCase Study: Aerohive
Case Study: AerohiveOpSource
 
Top 10 VoIP Trends Powering Communications in 2023
Top 10 VoIP Trends Powering Communications in 2023Top 10 VoIP Trends Powering Communications in 2023
Top 10 VoIP Trends Powering Communications in 2023Bankai Group
 
5 Emerging Innovations In Carrier WiFi
5 Emerging Innovations In Carrier WiFi5 Emerging Innovations In Carrier WiFi
5 Emerging Innovations In Carrier WiFiAlepo
 
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTXCustomer Presentation - Aruba Wi-Fi Overview (1).PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTXssuser5824cf
 
Taking Wi-Fi Beyond Offload
Taking Wi-Fi Beyond OffloadTaking Wi-Fi Beyond Offload
Taking Wi-Fi Beyond OffloadVideoBeet.TV
 
Top 10 Reasons Why F5 Makes Sense
Top 10 Reasons Why F5 Makes SenseTop 10 Reasons Why F5 Makes Sense
Top 10 Reasons Why F5 Makes SenseF5 Networks
 
Transforming enterprise network infrastructure with sd wan services
Transforming enterprise network infrastructure with sd wan servicesTransforming enterprise network infrastructure with sd wan services
Transforming enterprise network infrastructure with sd wan servicesRehanShrivastav
 
Cloud Managed Mobility
Cloud Managed MobilityCloud Managed Mobility
Cloud Managed MobilityCoranet Corp
 
Enterprise agility for the Cloud
Enterprise agility for the CloudEnterprise agility for the Cloud
Enterprise agility for the CloudSteven_Jackson
 
Achieving Cloud Enterprise Agility
Achieving Cloud Enterprise AgilityAchieving Cloud Enterprise Agility
Achieving Cloud Enterprise AgilitySteven_Jackson
 

Similar to AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scanning (20)

Aerohive Corporate Brochure
Aerohive Corporate BrochureAerohive Corporate Brochure
Aerohive Corporate Brochure
 
Simplificando a Rede Wireless - Aerohive
Simplificando a Rede Wireless - AerohiveSimplificando a Rede Wireless - Aerohive
Simplificando a Rede Wireless - Aerohive
 
Wifi offload-through-eap-authentication
Wifi offload-through-eap-authenticationWifi offload-through-eap-authentication
Wifi offload-through-eap-authentication
 
Wi-Fi Offload Authentication & Security through EAP based approach - White P...
 Wi-Fi Offload Authentication & Security through EAP based approach - White P... Wi-Fi Offload Authentication & Security through EAP based approach - White P...
Wi-Fi Offload Authentication & Security through EAP based approach - White P...
 
ROOTS wireless solution - designing the next wireless user experience oct17
ROOTS wireless solution - designing the next wireless user experience oct17ROOTS wireless solution - designing the next wireless user experience oct17
ROOTS wireless solution - designing the next wireless user experience oct17
 
WiTech Wi-Fi cloud - managed services forum 2011 - lisbon
WiTech Wi-Fi cloud - managed services forum 2011 - lisbon WiTech Wi-Fi cloud - managed services forum 2011 - lisbon
WiTech Wi-Fi cloud - managed services forum 2011 - lisbon
 
Case Study: Aerohive
Case Study: AerohiveCase Study: Aerohive
Case Study: Aerohive
 
xclaim-brochure
xclaim-brochurexclaim-brochure
xclaim-brochure
 
xclaim-brochure
xclaim-brochurexclaim-brochure
xclaim-brochure
 
Top 10 VoIP Trends Powering Communications in 2023
Top 10 VoIP Trends Powering Communications in 2023Top 10 VoIP Trends Powering Communications in 2023
Top 10 VoIP Trends Powering Communications in 2023
 
5 Emerging Innovations In Carrier WiFi
5 Emerging Innovations In Carrier WiFi5 Emerging Innovations In Carrier WiFi
5 Emerging Innovations In Carrier WiFi
 
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTXCustomer Presentation - Aruba Wi-Fi Overview (1).PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX
 
Taking Wi-Fi Beyond Offload
Taking Wi-Fi Beyond OffloadTaking Wi-Fi Beyond Offload
Taking Wi-Fi Beyond Offload
 
Wp wi fi-as-a-service-saasmax
Wp wi fi-as-a-service-saasmaxWp wi fi-as-a-service-saasmax
Wp wi fi-as-a-service-saasmax
 
Featured White Paper: PowerCloud's CloudCommand!
Featured White Paper:  PowerCloud's CloudCommand! Featured White Paper:  PowerCloud's CloudCommand!
Featured White Paper: PowerCloud's CloudCommand!
 
Top 10 Reasons Why F5 Makes Sense
Top 10 Reasons Why F5 Makes SenseTop 10 Reasons Why F5 Makes Sense
Top 10 Reasons Why F5 Makes Sense
 
Transforming enterprise network infrastructure with sd wan services
Transforming enterprise network infrastructure with sd wan servicesTransforming enterprise network infrastructure with sd wan services
Transforming enterprise network infrastructure with sd wan services
 
Cloud Managed Mobility
Cloud Managed MobilityCloud Managed Mobility
Cloud Managed Mobility
 
Enterprise agility for the Cloud
Enterprise agility for the CloudEnterprise agility for the Cloud
Enterprise agility for the Cloud
 
Achieving Cloud Enterprise Agility
Achieving Cloud Enterprise AgilityAchieving Cloud Enterprise Agility
Achieving Cloud Enterprise Agility
 

More from AirTight Networks

AirTight Networks Evolution - Cloud & MSP
AirTight Networks Evolution - Cloud & MSPAirTight Networks Evolution - Cloud & MSP
AirTight Networks Evolution - Cloud & MSPAirTight Networks
 
AirTight social wifi solution brief
AirTight social wifi solution briefAirTight social wifi solution brief
AirTight social wifi solution briefAirTight Networks
 
Non WiFi interference combat guide 1
Non WiFi interference combat guide 1Non WiFi interference combat guide 1
Non WiFi interference combat guide 1AirTight Networks
 
WPA2 Hole196 Vulnerability FAQs
WPA2 Hole196 Vulnerability FAQsWPA2 Hole196 Vulnerability FAQs
WPA2 Hole196 Vulnerability FAQsAirTight Networks
 
Windows 7 - A New Wireless Risk to the Enterprise
Windows 7 - A New Wireless Risk to the EnterpriseWindows 7 - A New Wireless Risk to the Enterprise
Windows 7 - A New Wireless Risk to the EnterpriseAirTight Networks
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsAirTight Networks
 
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And CountermeasuresSkyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And CountermeasuresAirTight Networks
 
802.11n The Good, The Bad, and The Ugly: Will You Be Ready?
802.11n The Good, The Bad, and The Ugly: Will You Be Ready?802.11n The Good, The Bad, and The Ugly: Will You Be Ready?
802.11n The Good, The Bad, and The Ugly: Will You Be Ready?AirTight Networks
 
When WLANs Launch Self DoS Attacks
When WLANs Launch Self DoS AttacksWhen WLANs Launch Self DoS Attacks
When WLANs Launch Self DoS AttacksAirTight Networks
 
Air Tight Airport Wi Fi Scan Analysis
Air Tight Airport Wi Fi Scan AnalysisAir Tight Airport Wi Fi Scan Analysis
Air Tight Airport Wi Fi Scan AnalysisAirTight Networks
 

More from AirTight Networks (11)

AirTight Networks Evolution - Cloud & MSP
AirTight Networks Evolution - Cloud & MSPAirTight Networks Evolution - Cloud & MSP
AirTight Networks Evolution - Cloud & MSP
 
AirTight social wifi solution brief
AirTight social wifi solution briefAirTight social wifi solution brief
AirTight social wifi solution brief
 
Non WiFi interference combat guide 1
Non WiFi interference combat guide 1Non WiFi interference combat guide 1
Non WiFi interference combat guide 1
 
WPA2 Hole196 Vulnerability FAQs
WPA2 Hole196 Vulnerability FAQsWPA2 Hole196 Vulnerability FAQs
WPA2 Hole196 Vulnerability FAQs
 
Windows 7 - A New Wireless Risk to the Enterprise
Windows 7 - A New Wireless Risk to the EnterpriseWindows 7 - A New Wireless Risk to the Enterprise
Windows 7 - A New Wireless Risk to the Enterprise
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and Solutions
 
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And CountermeasuresSkyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
 
802.11n The Good, The Bad, and The Ugly: Will You Be Ready?
802.11n The Good, The Bad, and The Ugly: Will You Be Ready?802.11n The Good, The Bad, and The Ugly: Will You Be Ready?
802.11n The Good, The Bad, and The Ugly: Will You Be Ready?
 
When WLANs Launch Self DoS Attacks
When WLANs Launch Self DoS AttacksWhen WLANs Launch Self DoS Attacks
When WLANs Launch Self DoS Attacks
 
Caffe Latte Attack
Caffe Latte AttackCaffe Latte Attack
Caffe Latte Attack
 
Air Tight Airport Wi Fi Scan Analysis
Air Tight Airport Wi Fi Scan AnalysisAir Tight Airport Wi Fi Scan Analysis
Air Tight Airport Wi Fi Scan Analysis
 

Recently uploaded

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Recently uploaded (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scanning

  • 1. AirTight Networks WHITEPAPER AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scanning A Whitepaper by AirTight Networks, Inc. 339 N. Bernardo Avenue, Suite 200, Mountain View, CA 94043 www.airtightnetworks.com © 2011 AirTight Networks, Inc. All rights reserved.
  • 2. AirTight Networks WHITEPAPER AirTight Secure Wi-Fi™ Executive Summary Retail enterprises have been yearning for an affordable, easy to use, and scalable Wi-Fi access solution that meets their unique business process and customer service requirements while maintaining their PCI compliance and network security. But, the only options retailers had in the past were: 1) traditional enterprise Wi-Fi solutions that are too complex and costly for managing hundreds or thousands of geographically distributed access points, or 2) unreliable, consumer- grade Wi-Fi access points that lack centralized, remote manageability and have very limited security features. AirTight Secure Wi-Fi™, part of AirTight Cloud Services™, is precisely designed to fill this gap. Retail organizations of all sizes, looking to deploy Wi-Fi across geographically distributed sites, finally have a viable enterprise Wi-Fi solution that: – requires zero upfront investment; – entails no additional administrative burden; – can be securely and remotely managed from anywhere on the Internet; – is infinitely scalable; and – takes care of their PCI wireless scanning and security requirements. In fact, organizations with PCI compliance reporting and wireless security as their top priority can start with AirTight’s cloud-based wireless security and compliance service, and seamlessly upgrade the service, with the click of a mouse and a phone call, to include secure Wi-Fi access in the future, without touching the hardware. © 2011 AirTight Networks, Inc. All rights reserved. 2
  • 3. AirTight Networks WHITEPAPER AirTight Secure Wi-Fi™ More and more establishments in hospitality and retail verticals — such as quick serve restaurants, convenience stores, hotels, and cafes — are considering Wi-Fi access as a strategic business initiative. A number of key applications centered around greater efficiency, increased sales, and customer convenience are driving this interest. But enterprises have been postponing their Wi-Fi rollout in the absence of an affordable, easy to use, and scalable solution. Enterprise Wi-Fi Solutions for Retail Traditional enterprise Wi-Fi solutions (including the controller-based architecture) have been designed to support tens or hundreds of access points (APs) covering a single campus. But typical Wi-Fi deployment in retail enterprises involves hundreds or thousands of locations with only one or two APs covering each location. Centrally managing such fragmented Wi-Fi networks, consisting of thousands of geographically distributed APs, is radically different than managing a Wi-Fi network serving a single campus. Not surprisingly, trying to use existing enterprise Wi-Fi solutions in retail environments turns out to be complex, inefficient, and costly. Consumer-grade Wi-Fi APs present a cheaper alternative, but they lack the security, reliability, and central management capability required in an enterprise solution. In addition to Wi-Fi access, retail organizations are looking for a solution that provides comprehensive wireless security and simplifies their PCI wireless scanning requirement at a minimal cost and without additional administrative burden. An enterprise Wi-Fi solution tailored for retail organizations should enable: PCI wireless compliance and security: Enterprises should be able to centrally enforce their corporate wireless security policies, automate PCI wireless scanning and receive a consolidated PCI compliance report. Ease of use: Remove the complexity of deploying, securing, and managing geographically distributed Wi-Fi networks. Role-based permissions: The solution should allow granular delegation of administrative functions such as policy definition, customization, and reporting by local administrators, store managers, or franchisees while maintaining complete control of security and compliance by the corporate IT department. Remote management: For remote sites having little or no IT staff, the corporate network administrator should be able to manage the Wi-Fi network remotely from anywhere on the Internet. Flexibility: Enterprises should be able to rollout their Wi-Fi network when and where needed, and be able to enforce group-based policies where a group could represent a geographical location, type of stores, a specific consumer brand, etc. Scalability: The Wi-Fi network should scale over thousands of remote locations without compromising on functionality and ease of use. © 2011 AirTight Networks, Inc. All rights reserved. 3
  • 4. AirTight Networks WHITEPAPER AirTight Secure Wi-Fi™ One Hospitality Organization, 18,000+ Locations and the Need for Wireless PCI Compliance and Wi-Fi Access A large retail enterprise, with more than 18,000 quick serve restaurants spread across the United States, was looking for a cost-effective and efficient way to conduct wireless scans at all its remote stores as a part of its PCI DSS Compliance project. AirTight’s SpectraGuard wireless intrusion prevention system (WIPS), delivered as a cloud based service, was the solution of choice not only because it automated the wireless scanning of 18,000+ stores and simplified the centralized management and reporting for PCI compliance, but also because it provided solid 24/7 security for the corporate HQ network from wireless threats. With no upfront capital outlay, the organization did not have to wait for budget approval to get started and was able to meet the PCI wireless scanning and reporting compliance deadline. But, as a strategic investment, it also wanted to provision Wi-Fi access to its store owners giving them the options of: – providing Wi-Fi HotSpot access to their customers as a way to increase the number of footfalls; – making their inventory control more efficient; and – letting the serving staff place customer orders to the kitchen via mobile PoS. A controller-based enterprise Wi-Fi solution was already deployed at its HQ. But with only one AP required per store, the controller-based architecture was overkill. Further, extending that architecture to its remote stores was not practical because of the high cost, high complexity, limited scalability, and limited remote manageability. That is where AirTight’s cloud based solution came into play to provide wireless security, PCI compliance, and in-store Wi-Fi access. After carefully evaluating enterprise Wi-Fi solutions from leading WLAN vendors, AirTight Secure Wi-Fi™, which combines cloud-based PCI wireless scanning and secure Wi-Fi access, was chosen as the most reliable, automated solution to provide Wi-Fi access to 18,000+ distributed stores without compromising on PCI compliance. © 2011 AirTight Networks, Inc. All rights reserved. 4
  • 5. AirTight Networks WHITEPAPER AirTight Secure Wi-Fi™ About AirTight Secure Wi-Fi™ - Lowest Cost and Complexity for Wi-Fi AirTight Networks Access and PCI Wireless Compliance AirTight Secure Wi-Fi™ is the first Wi-Fi access and security solution designed specifically AirTight Networks is the global for retail enterprises with distributed outlets. It is an automated PCI wireless scanning leader in wireless security and and compliance service that can double as an enterprise Wi-Fi access solution, with the compliance products and services, following key features. providing customers best-of- breed technology to automatically Automated PCI wireless compliance and security: AirTight’s wireless sensors provide detect, classify, locate and block 24/7 scanning to detect wireless vulnerabilities and policy violations in real time. For all current and emerging wireless instance, AirTight’s patented Marker packet techniques automatically and accurately threats. AirTight offers industry’s detect Rogue wireless devices in no time, eliminating the need for manual wireless leading wireless intrusion scans. With a single click of a mouse on the central console, the wireless sensors can prevention system (WIPS) and the also be converted into a dual-purpose AP-sensor combo mode. In this mode, the devices world’s only SaaS based wireless conduct background scanning while providing Wi-Fi access, allowing organizations to security, compliance and Wi-Fi maintain their PCI wireless compliance. access branded as AirTight Cloud Cloud-based delivery: A controller-less wireless LAN architecture hosted in the cloud Services™. AirTight’s award- enables virtually infinite scalability and reduces the complexity of managing network winning solutions are used by security, PCI compliance and Wi-Fi access. customers globally in the financial, Pay-as-you-go model: With a pay-as-you-go subscription model and zero upfront government, retail and hospitality, investment, retailers can start their PCI wireless scanning and in-store Wi-Fi access manufacturing, transportation, immediately, without waiting for a capital outlay budget. education, health care, telecom, and technology industries. AirTight Plug-and-play installation: Pre-configured wireless sensor-AP devices that automatically owns the seminal patents for connect and synchronize with the central server, literally enable plug-and-play wireless intrusion prevention deployment at remote locations in minutes without the need for intricate configuration technology with 18 U.S. patents or local IT support. and three international patents Portal-based administration: Administrators can securely access the central granted (Australia, Japan and management console via their web browser from anywhere on the Internet. They can UK), and more than 20 additional remotely manage everything from viewing and responding to wireless security alerts to patents pending. AirTight Networks changing settings on Wi-Fi APs at distributed locations. is a privately held company Centralized policy enforcement: Administrators can simply define and enforce based in Mountain View, CA. For corporate security policies across thousands of stores from a central point, while being more information please visit: able to customize policies for Wi-Fi access, reporting, alerts, incident response, etc. for www.airtightnetworks.com. specific locations. AirTight and SpectraGuard are Flexible services model: Organizations have the option to start with the PCI wireless registered trademarks of AirTight compliance service and then upgrade the service to full wireless intrusion prevention Networks, Inc. AirTight Networks, or to include secure Wi-Fi access in the future with no IT intervention and no additional AirTight Networks logo, AirTight Cloud hardware. Services and AirTight Secure Wi-Fi are trademarks. All other trademarks are the property of their respective owners. With its unparalleled wireless security technology and ease of use, automated PCI wireless scanning and reporting, and virtually infinite scalability, AirTight Secure Wi-Fi™ is well positioned to serve the unique requirements of the retail and hospitality industry for supporting large-scale distributed Wi-Fi networks. The Global Leader in Wireless Security Solutions AirTight Networks, Inc. 339 N. Bernardo Avenue #200, Mountain View, CA 94043 T +1.877.424.7844 T 650.961.1111 F 650.961.1169 www.airtightnetworks.com info@airtightnetworks.com © 2011 AirTight Networks, Inc. All rights reserved. AirTight Networks and the AirTight Networks logo are trademarks, and AirTight and SpectraGuard are registered trademarks of AirTight Networks, Inc. All other trademarks mentioned herein are properties of their respective owners. Specifications are subject to change without notice.