IMPLEMENTING ENTERPRISE WIRELESS SECURITY
POLICY IN THE “BRING YOUR OWN DEVICE” ERA
David King
Chairman & CEO
©2012AirTigh...
Typical enterprise wireless security template
1. Secure enterprise WLAN
• Authenticate users
• Encrypt over-the-air data
2...
Featured case study
BYOD
Adapted from: Presentation by Billy Crowley and Kaustubh Phanse, RSA Europe 2010
Lesson #1: What does not work?
“Unapproved Wi-Fi devices
not allowed” policy without
enforcement
67 M
95 M
140 M
2010
Smartphones
2011
Smartphones
2011
Smartphones
+ Tablets
Source: Gartner
25%
61%
14%
38%
49%
10%
3%
AirTight Networks’ BYOD Survey Results
Source: 316 respondents, April 2012
How pervasive do you...
Lesson #2: WPA2/802.1x cannot stop BYOD
Lesson #3: Wireless security is more about managing
the “unmanaged”
AirTight Networks’ BYOD Survey Results
11%
20%
69%
16%
34%
50%
Do you see an increasing trend
of employees bringing Rogue ...
Lesson #4: Need an automated way to pinpoint the
needle in the haystack
What are your choices?
• Mobile device management ...
MDM ≠ Network Security
What is the incentive to install MDM
agents on personal devices?
Scope limited to “managed” devices...
NAC ≠ Wireless Security
Cannot block Rogue APs, Soft Rogues,
Mobile Wi-Fi Hotspots
Scope limited to BYOD on “managed” WLAN...
Wireless intrusion prevention system (WIPS) provides
24/7 visibility and protection
AirTight’s patented automatic device classification
and WIPS policy enforcement
With this in place, your network is protec...
AirTight’s patented WIPS engine provides most
comprehensive protection from BYOD
Authorized
APs
STOP
Authorized
ClientsUse...
Lesson #5: Not all WIPS are created equal
Consult third-party experts and see for yourself
“…AirTight's methodology for cl...
Visit Us !
www.airtightnetworks.com
The only WIPS solution rated
Strong Positive by Gartner
BYOD-proof Secure Wi-Fi
Manage...
IMPLEMENTING ENTERPRISE WIRELESS SECURITY
POLICY IN THE “BRING YOUR OWN DEVICE” ERA
David King
Chairman & CEO
©2012AirTigh...
Implementing Enterprise Wireless Security Policy in the BYOD Era
Upcoming SlideShare
Loading in...5
×

Implementing Enterprise Wireless Security Policy in the BYOD Era

969

Published on

BYOD opens your network to new risks and vulnerabilities. Tools to understand what is happening in your network, combined with the necessary actions to prevent misuse become a real MUST HAVE.
Kappa Data is proud to announce its cooperation with Airtight Networks, one of Juniper Networks Technology Partners, today one of the only companies in the world that can definitively stop unapproved smartphones and tablets bypassing your security.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
969
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
45
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Implementing Enterprise Wireless Security Policy in the BYOD Era

  1. 1. IMPLEMENTING ENTERPRISE WIRELESS SECURITY POLICY IN THE “BRING YOUR OWN DEVICE” ERA David King Chairman & CEO ©2012AirTightNetworks.Allrightsreserved.
  2. 2. Typical enterprise wireless security template 1. Secure enterprise WLAN • Authenticate users • Encrypt over-the-air data 2. Isolate Guest Wi-Fi 3. Wi-Fi endpoints • Secure remote enterprise access 4. Secure the enterprise airspace from unmanaged Wi-Fi 5. Manage risks from Bring Your Own Device (BYOD)
  3. 3. Featured case study BYOD Adapted from: Presentation by Billy Crowley and Kaustubh Phanse, RSA Europe 2010
  4. 4. Lesson #1: What does not work? “Unapproved Wi-Fi devices not allowed” policy without enforcement
  5. 5. 67 M 95 M 140 M 2010 Smartphones 2011 Smartphones 2011 Smartphones + Tablets Source: Gartner
  6. 6. 25% 61% 14% 38% 49% 10% 3% AirTight Networks’ BYOD Survey Results Source: 316 respondents, April 2012 How pervasive do you think is the use of personal smart devices in your enterprise? How do you view the BYOD trend for your enterprise?
  7. 7. Lesson #2: WPA2/802.1x cannot stop BYOD
  8. 8. Lesson #3: Wireless security is more about managing the “unmanaged”
  9. 9. AirTight Networks’ BYOD Survey Results 11% 20% 69% 16% 34% 50% Do you see an increasing trend of employees bringing Rogue Wi-Fi APs? Are you concerned about employees using mobile hotspots to bypass corporate policies? Source: 316 respondents, April 2012
  10. 10. Lesson #4: Need an automated way to pinpoint the needle in the haystack What are your choices? • Mobile device management (MDM) • Network access control (NAC) • Wireless intrusion prevention system (WIPS)
  11. 11. MDM ≠ Network Security What is the incentive to install MDM agents on personal devices? Scope limited to “managed” devices that run MDM agent No visibility into Rogue APs, Soft Rogues, Mobile Wi-Fi Hotspots
  12. 12. NAC ≠ Wireless Security Cannot block Rogue APs, Soft Rogues, Mobile Wi-Fi Hotspots Scope limited to BYOD on “managed” WLAN Suffers from “blind spots” – unauthorized Wi-Fi devices connecting via authorized devices
  13. 13. Wireless intrusion prevention system (WIPS) provides 24/7 visibility and protection
  14. 14. AirTight’s patented automatic device classification and WIPS policy enforcement With this in place, your network is protected from all types of wireless threats, vulnerabilities and attack tools! External APs Rogue APs (On Network) Authorized APs AP Classification STOP Client ClassificationPolicyMis-config GO STOP IGNORE DoS External Clients Authorized Clients Rogue Clients AUTOMATICALLY DETECT AND BLOCK RED PATHS!
  15. 15. AirTight’s patented WIPS engine provides most comprehensive protection from BYOD Authorized APs STOP Authorized ClientsUsers Block unapproved devices! GO External APs Mobile Hotspots STOP
  16. 16. Lesson #5: Not all WIPS are created equal Consult third-party experts and see for yourself “…AirTight's methodology for classifying events avoids false alarms when identifying rogues.” “AirTight is appropriate for buyers that are looking for an easy-to-deploy solution with minimal training/skill…” “AirTight's drop-in SaaS package is affordable and was well-timed to PCI law fortifications that became important in 2009.” First and only!
  17. 17. Visit Us ! www.airtightnetworks.com The only WIPS solution rated Strong Positive by Gartner BYOD-proof Secure Wi-Fi Managed from the Cloud © 2012 AirTight Networks. All rights reserved.
  18. 18. IMPLEMENTING ENTERPRISE WIRELESS SECURITY POLICY IN THE “BRING YOUR OWN DEVICE” ERA David King Chairman & CEO ©2012AirTightNetworks.Allrightsreserved.
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×