Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Wireless Security Online, On-Demand

669 views

Published on

Traditionally, wireless security has been viewed as an “onsite” activity
that requires strategic long-term investment and consumes significant IT
administrative resources. Due to high upfront costs, small- and mediumsize
enterprises and those with limited wireless LAN deployment shy
away from wireless security leaving them exposed and liable.

Published in: Technology, Business
  • Be the first to comment

  • Be the first to like this

Wireless Security Online, On-Demand

  1. 1. AIRTIGHT NETWORKS WHITE PAPER Wireless Security Online, On-Demand Cost-effective, Customizable, Effortless, and Proactive Management of Your Wireless Threat Exposure A White Paper by AirTight Networks, Inc. 339 N. Bernardo Avenue, Suite 200, Mountain View, CA 94043 www.airtightnetworks.com © 2008 AirTight Networks, Inc. All rights reserved.
  2. 2. AIRTIGHT NETWORKS WHITE PAPER Wireless Security Online, On-Demand Executive summary Traditionally, wireless security has been viewed as an “onsite” activity that requires strategic long-term investment and consumes significant IT administrative resources. Due to high upfront costs, small- and medium- size enterprises and those with limited wireless LAN deployment shy away from wireless security leaving them exposed and liable. This whitepaper introduces a novel way for enabling on-demand wireless security that is affordable, effortless, and customizable. In this new architecture, wireless security is delivered over the Internet bringing a revolutionary change in how businesses manage their wireless threat exposure. Depending on their needs, businesses choose and pay only for the value they derive from this online wireless security service. Large wireless deployments at multiple sites worldwide and small, single WLAN deployments are served equally well. Even businesses with a “no WiFi” policy can avail this service to simply enforce their policy. AirTight Networks’ SpectraGuard Online (SGO) enables all these benefits, allowing you to manage your wireless threat exposure without leaving your desk. If you can browse the Web, you can be wireless-secure with SGO. © 2008 AirTight Networks, Inc. All rights reserved. 2
  3. 3. AIRTIGHT NETWORKS WHITE PAPER Wireless Security Online, On-Demand Wireless Security: The State of Affairs Adoption of appropriate wireless security measures is lagging far behind the escalating presence of wireless. Two main reasons for this lethargy are: lack of awareness and rigid solutions. Lack of awareness Businesses are unable to assess their susceptibility to wireless vulnerabilities and in turn fail to acknowledge the escalating risks. As a result, many do not have a formal wireless security policy in place, while some get a false sense of security by only encrypting over-the-air data or installing a wireless LAN behind a firewall. And malicious hackers are exploiting these security holes galore. Rigid solutions The threat perception and security requirements vary considerably across businesses depending on their volume of wireless usage (or dependency on wireless), their liability, and the cost. But, most contemporary solutions adopt an “all-or-nothing” approach, unable to meet these diverse needs. Small- and medium-size enterprises (SMEs) find the upfront cost of a full-fledged wireless intrusion prevention system (WIPS) too high and cannot take on the administrative responsibilities for onsite maintenance of equipment. Need of the hour To solve this two-headed problem, we need a solution that: Helps enterprises of all kinds and sizes to quickly assess their threat exposure; Guides them about and lets them choose from different types of remedial actions; Eases the burden of prohibitive costs making wireless security accessible to SMEs; and Eliminates the administration of third-party hardware and software onsite. Web-based Wireless Security Web-based wireless security architecture—a radical departure from the conventional “onsite” approach—leverages the Software as a Service (SaaS) model to offer wireless security online, on-demand. Customers do not buy equipment. Instead, plug-and-play wireless scanners monitor the airspace. The scanners automatically connect to a centralized server over a secure connection. The server is powered with an up-to-date vulnerability database and housed in a secure datacenter. Users access the wireless security portal via a Web browser; no special software is needed. © 2008 AirTight Networks, Inc. All rights reserved. 3
  4. 4. AIRTIGHT NETWORKS WHITE PAPER Wireless Security Online, On-Demand This innovative approach provides the following key benefits. 1. Zero-day attack protection The Web-based model eliminates the risk of obsolescence, providing zero-day attack protection. The central vulnerability database is continually updated making these changes instantly available to customers. 2. No more software upgrades The central server and vulnerability database offer the latest functionality every time users access the service, which means that customers no longer need to fix bugs and download patches or wait for the next product release. 3. No more hardware maintenance Businesses are relieved from buying and lugging expensive equipment onsite. Free from the headache of managing auxiliary infrastructure, businesses can focus on their core competence, and IT personnel can focus on their company’s daily operations rather than troubleshooting third-party software and equipment. 4. Pay-as-you-go By eliminating high upfront costs and facilitating IT cost-savings, wireless security is accessible to small- and medium-size enterprises that can afford paying for the service in easy, periodic installments. 5. Value-based, customizable service From the various features that comprise wireless vulnerability assessment and remediation, customers can subscribe to only those value propositions that benefit them. Further, customers can configure the application to customize the way it looks and behaves offering a unique user experience. 6. Anywhere, anytime access With the service available via any Web browser, users can monitor the wireless security posture of any of their facilities without leaving their desk or from anywhere else on the Internet; direct or VPN access to their corporate network is not needed. User access can of course be controlled by system administrators by defining different privileges. 7. Scalability The service provisioning is fully distributed and scalable. Multiple subscribers can simultaneously access their wireless security portal via identical instances hosted on multiple servers. © 2008 AirTight Networks, Inc. All rights reserved. 4
  5. 5. AIRTIGHT NETWORKS WHITE PAPER Wireless Security Online, On-Demand SpectraGuard Online™ AirTight Networks’ SpectraGuard Online (SGO) is the first and only product that delivers all the above benefits. SGO offers a monthly subscription-based wireless security auditing and vulnerability management service. It includes AirTight’s plug-and-play wireless scanners that are preconfigured and maintenance-free. Enterprises can scan their facilities world- wide unlimited number of times without leaving their desk. AirTight Networks’ patented location-based policy management makes this real easy. Figure 1. SpectraGuard Online Architecture SGO audits wireless vulnerabilities inside your network as well as those outside your premises that pose a threat. Customers can choose to subscribe to different levels of vulnerability assessment, regulatory compliance and remediation. The service enables: Airspace assessment—essentially the threat level of your environment; Vulnerability assessment by classifying your critical assets and gaining a “hacker’s eye view” of your network’s security posture; Compliance with legislative regulations (e.g., PCI, HIPAA, DoD, SOX, GLBA) from a wireless perspective for the various segments such as retail, finance, healthcare, and education; Location tracking of vulnerabilities or anomalous activities once they are detected; Guidance about manual remedial actions whenever possible; or Automated 24x7 wireless monitoring and protection. © 2008 AirTight Networks, Inc. All rights reserved. 5
  6. 6. AIRTIGHT NETWORKS WHITE PAPER Wireless Security Online, On-Demand The subscription can grow organically in both features and scope of scanning depending on customers’ needs and wireless threat perception. About AirTight Networks AirTight Networks is the industry standard for wireless vulnerability management and the only company that offers a flexible, end-to-end solution that gives customers visibility into their wireless security posture and a choice in how they manage it. AirTight’s SpectraGuard Enterprise provides a robust wireless intrusion prevention system (WIPS). Its SpectraGuard Online service is the world’s first on demand wireless vulnerability management service which provides a flexible approach to addressing wireless vulner- abilities with no capital investment. AirTight’s patented technology delivers the key elements of an effective WIPS to eliminate false alarms, block wireless threats immediately and automatically and locate wireless devices and events with pinpoint precision. AirTight’s customers include global retail, financial services, corporate, education and government organizations. AirTight Networks is a privately held company based in Mountain View, CA. For more information please visit www.airtightnetworks.com Wireless Vulnerability Management AirTight Networks, Inc. 339 N. Bernardo Avenue #200, Mountain View, CA 94043 T +1.877.424.7844 T 650.961.1111 F 650.961.1169 www.airtightnetworks.com info@airtightnetworks.com © 2008 AirTight Networks, Inc. All rights reserved. AirTight Networks and the AirTight Networks logo are trademarks, and AirTight and SpectraGuard are registered trademarks of AirTight Networks, Inc. All other trademarks mentioned herein are properties of their respective owners. Specifications are subject to change without notice.

×