Kaustubh Phanse - Wireless in the Enterprise: Security Risks, Challenges and the Solution - Interop Mumbai 2009
Upcoming SlideShare
Loading in...5
×
 

Like this? Share it with your network

Share

Kaustubh Phanse - Wireless in the Enterprise: Security Risks, Challenges and the Solution - Interop Mumbai 2009

on

  • 1,577 views

Unsecured WiFi provides an easy target for hit-and-run style attacks allowing hackers to cause severe damage while remaining invisible and undetected. In fact, recent incidents show a growing trend ...

Unsecured WiFi provides an easy target for hit-and-run style attacks allowing hackers to cause severe damage while remaining invisible and undetected. In fact, recent incidents show a growing trend that unsecured WiFi is becoming a safe haven for cybercriminals. In this session, Dr Phanse will discuss the wireless threat landscape, the business risks, and how enterprises can best secure themselves against wireless vulnerabilities and attacks.

Statistics

Views

Total Views
1,577
Views on SlideShare
1,573
Embed Views
4

Actions

Likes
0
Downloads
38
Comments
0

2 Embeds 4

http://www.slideshare.net 3
http://janet-sonali.blogspot.com 1

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Kaustubh Phanse - Wireless in the Enterprise: Security Risks, Challenges and the Solution - Interop Mumbai 2009 Presentation Transcript

  • 1. Wireless in the Enterprise: Security Risks, Challenges, and the Solution Kaustubh Phanse Wireless Architect, AirTight Networks
  • 2. Convenience Efficiency Cost savings Opportunities
  • 3. Everywhere
  • 4. sed cen m nli s U ectru se Fi u ncy Sp Wi ue Freq
  • 5. Off-the-shelf
  • 6. Plug and play
  • 7. “ Wireless is a wonderful thing, unless you are worried about security. – John Pescatore, Gartner ”
  • 8. Enterprise LAN is confined to wires Outside is insecure Inside is secure Internet Firewall shields inside from outside
  • 9. Network not confined to wires or the building anymore Internet Wireless security holes bypass the firewall
  • 10. Wardriving
  • 11. WEP Encryption WEP was meant to be “Wired Equivalent Privacy” WEP turned out to be “Worst Ever Privacy”
  • 12. WiFi Protected Access (WPA/WPA2)
  • 13. Simply having “No WiFi” policy does not make your organization immune to WiFi Threats
  • 14. 319 million units shipped in 2008 Source: WiFi Alliance and In-Stat 144 23% 71 33% 56 48 52% 51% Notebooks, Portable Cellular phones Stationary Consumer ultra-mobile PCs Consumer electronics electronics
  • 15. 2010 All notebooks, ultra-mobile PCs will have WiFi
  • 16. Rogue AP is an unauthorized access point connected to the wired enterprise network Usually consumer or home-grade APs Deployed casually or maliciously
  • 17. Inadvertent Deliberate Malicious
  • 18. Administrators lack transparency and control
  • 19. Are your employees connecting Is your sensitive data to neighboring WiFi networks? leaking over the air? Are Rogue APs attached to your enterprise network? Internet Firewall Are you having difficulty enforcing your security policies at multiple sites? Can someone across the street shutdown your WiFi network?
  • 20. WLAN Infrastructure Attacks Next Generation Threats and Vulnerabilities Projection June 2009 Mobile and Wireless Device Endpoint Attacks
  • 21. Wireless intrusion prevention system (WIPS)
  • 22. Automate your wireless security with a WIPS Gain visibility 24x7 Instantaneously detect and block wireless threats Accurately locate wireless devices Regain and stay in control
  • 23. The Global Leader in Wireless Security and Compliance Solutions www.airtightnetworks.com kaustubh.phanse@airtightnetworks.com