Your SlideShare is downloading. ×
0
Wireless in the Enterprise:
Security Risks, Challenges, and the Solution
Kaustubh Phanse
Wireless Architect, AirTight Netw...
Convenience

 Efficiency
Cost savings

Opportunities
Everywhere
sed
                 cen m
             nli
          s U ectru
       se
   Fi u ncy Sp
Wi ue
 Freq
Off-the-shelf
Plug and play
“   Wireless is a wonderful thing, unless
    you are worried about security.
    – John Pescatore, Gartner
              ...
Enterprise LAN is
                          confined to wires



Outside is
insecure
                                Insid...
Network not confined to wires
or the building anymore




  Internet




   Wireless security holes
   bypass the firewall
Wardriving
WEP Encryption


    WEP was meant to be
    “Wired Equivalent Privacy”




    WEP turned out to be
    “Worst Ever Priva...
WiFi Protected Access (WPA/WPA2)
Simply having “No WiFi” policy
                  does not
make your organization immune to WiFi Threats
319 million units shipped in 2008
                        Source: WiFi Alliance and In-Stat


     144
             23%


...
2010
All notebooks, ultra-mobile PCs will
have WiFi
Rogue AP is an unauthorized access point
connected to the wired enterprise network


Usually consumer
or home-grade APs


...
Inadvertent
               Deliberate




Malicious
Administrators lack transparency and control
Are your employees connecting
Is your sensitive data                             to neighboring WiFi networks?
leaking ove...
WLAN
 Infrastructure
     Attacks          Next Generation Threats and
                          Vulnerabilities Projectio...
Wireless intrusion prevention
       system (WIPS)
Automate your wireless security
with a WIPS

Gain visibility 24x7

Instantaneously detect and block wireless threats

Accu...
The Global Leader in Wireless Security
        and Compliance Solutions




www.airtightnetworks.com

kaustubh.phanse@airt...
Kaustubh Phanse - Wireless in the Enterprise: Security Risks, Challenges and the Solution - Interop Mumbai 2009
Kaustubh Phanse - Wireless in the Enterprise: Security Risks, Challenges and the Solution - Interop Mumbai 2009
Kaustubh Phanse - Wireless in the Enterprise: Security Risks, Challenges and the Solution - Interop Mumbai 2009
Kaustubh Phanse - Wireless in the Enterprise: Security Risks, Challenges and the Solution - Interop Mumbai 2009
Upcoming SlideShare
Loading in...5
×

Kaustubh Phanse - Wireless in the Enterprise: Security Risks, Challenges and the Solution - Interop Mumbai 2009

936

Published on

Unsecured WiFi provides an easy target for hit-and-run style attacks allowing hackers to cause severe damage while remaining invisible and undetected. In fact, recent incidents show a growing trend that unsecured WiFi is becoming a safe haven for cybercriminals. In this session, Dr Phanse will discuss the wireless threat landscape, the business risks, and how enterprises can best secure themselves against wireless vulnerabilities and attacks.

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
936
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
39
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "Kaustubh Phanse - Wireless in the Enterprise: Security Risks, Challenges and the Solution - Interop Mumbai 2009"

  1. 1. Wireless in the Enterprise: Security Risks, Challenges, and the Solution Kaustubh Phanse Wireless Architect, AirTight Networks
  2. 2. Convenience Efficiency Cost savings Opportunities
  3. 3. Everywhere
  4. 4. sed cen m nli s U ectru se Fi u ncy Sp Wi ue Freq
  5. 5. Off-the-shelf
  6. 6. Plug and play
  7. 7. “ Wireless is a wonderful thing, unless you are worried about security. – John Pescatore, Gartner ”
  8. 8. Enterprise LAN is confined to wires Outside is insecure Inside is secure Internet Firewall shields inside from outside
  9. 9. Network not confined to wires or the building anymore Internet Wireless security holes bypass the firewall
  10. 10. Wardriving
  11. 11. WEP Encryption WEP was meant to be “Wired Equivalent Privacy” WEP turned out to be “Worst Ever Privacy”
  12. 12. WiFi Protected Access (WPA/WPA2)
  13. 13. Simply having “No WiFi” policy does not make your organization immune to WiFi Threats
  14. 14. 319 million units shipped in 2008 Source: WiFi Alliance and In-Stat 144 23% 71 33% 56 48 52% 51% Notebooks, Portable Cellular phones Stationary Consumer ultra-mobile PCs Consumer electronics electronics
  15. 15. 2010 All notebooks, ultra-mobile PCs will have WiFi
  16. 16. Rogue AP is an unauthorized access point connected to the wired enterprise network Usually consumer or home-grade APs Deployed casually or maliciously
  17. 17. Inadvertent Deliberate Malicious
  18. 18. Administrators lack transparency and control
  19. 19. Are your employees connecting Is your sensitive data to neighboring WiFi networks? leaking over the air? Are Rogue APs attached to your enterprise network? Internet Firewall Are you having difficulty enforcing your security policies at multiple sites? Can someone across the street shutdown your WiFi network?
  20. 20. WLAN Infrastructure Attacks Next Generation Threats and Vulnerabilities Projection June 2009 Mobile and Wireless Device Endpoint Attacks
  21. 21. Wireless intrusion prevention system (WIPS)
  22. 22. Automate your wireless security with a WIPS Gain visibility 24x7 Instantaneously detect and block wireless threats Accurately locate wireless devices Regain and stay in control
  23. 23. The Global Leader in Wireless Security and Compliance Solutions www.airtightnetworks.com kaustubh.phanse@airtightnetworks.com
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×