Your SlideShare is downloading. ×
Kaustubh Phanse - Wireless in the Enterprise: Security Risks, Challenges and the Solution - Interop Mumbai 2009
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Introducing the official SlideShare app

Stunning, full-screen experience for iPhone and Android

Text the download link to your phone

Standard text messaging rates apply

Kaustubh Phanse - Wireless in the Enterprise: Security Risks, Challenges and the Solution - Interop Mumbai 2009

880
views

Published on

Unsecured WiFi provides an easy target for hit-and-run style attacks allowing hackers to cause severe damage while remaining invisible and undetected. In fact, recent incidents show a growing trend …

Unsecured WiFi provides an easy target for hit-and-run style attacks allowing hackers to cause severe damage while remaining invisible and undetected. In fact, recent incidents show a growing trend that unsecured WiFi is becoming a safe haven for cybercriminals. In this session, Dr Phanse will discuss the wireless threat landscape, the business risks, and how enterprises can best secure themselves against wireless vulnerabilities and attacks.

Published in: Technology, Business

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
880
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
39
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Wireless in the Enterprise: Security Risks, Challenges, and the Solution Kaustubh Phanse Wireless Architect, AirTight Networks
  • 2. Convenience Efficiency Cost savings Opportunities
  • 3. Everywhere
  • 4. sed cen m nli s U ectru se Fi u ncy Sp Wi ue Freq
  • 5. Off-the-shelf
  • 6. Plug and play
  • 7. “ Wireless is a wonderful thing, unless you are worried about security. – John Pescatore, Gartner ”
  • 8. Enterprise LAN is confined to wires Outside is insecure Inside is secure Internet Firewall shields inside from outside
  • 9. Network not confined to wires or the building anymore Internet Wireless security holes bypass the firewall
  • 10. Wardriving
  • 11. WEP Encryption WEP was meant to be “Wired Equivalent Privacy” WEP turned out to be “Worst Ever Privacy”
  • 12. WiFi Protected Access (WPA/WPA2)
  • 13. Simply having “No WiFi” policy does not make your organization immune to WiFi Threats
  • 14. 319 million units shipped in 2008 Source: WiFi Alliance and In-Stat 144 23% 71 33% 56 48 52% 51% Notebooks, Portable Cellular phones Stationary Consumer ultra-mobile PCs Consumer electronics electronics
  • 15. 2010 All notebooks, ultra-mobile PCs will have WiFi
  • 16. Rogue AP is an unauthorized access point connected to the wired enterprise network Usually consumer or home-grade APs Deployed casually or maliciously
  • 17. Inadvertent Deliberate Malicious
  • 18. Administrators lack transparency and control
  • 19. Are your employees connecting Is your sensitive data to neighboring WiFi networks? leaking over the air? Are Rogue APs attached to your enterprise network? Internet Firewall Are you having difficulty enforcing your security policies at multiple sites? Can someone across the street shutdown your WiFi network?
  • 20. WLAN Infrastructure Attacks Next Generation Threats and Vulnerabilities Projection June 2009 Mobile and Wireless Device Endpoint Attacks
  • 21. Wireless intrusion prevention system (WIPS)
  • 22. Automate your wireless security with a WIPS Gain visibility 24x7 Instantaneously detect and block wireless threats Accurately locate wireless devices Regain and stay in control
  • 23. The Global Leader in Wireless Security and Compliance Solutions www.airtightnetworks.com kaustubh.phanse@airtightnetworks.com