SlideShare a Scribd company logo
1 of 15
Challenges of Next Generation
                    Wi-Fi Hotspots

                                                                Airegis
                                                       www.airegis.com




© 2012. Airegis Private Limited, All Rights Reserved
The Need


 Demand for Mobile Internet
 Access is Growing !

 Key Driving Force
 • High adoption of wireless enabled
   gadgets (smartphone, tablets,
   netbooks etc.)
 • People need internet access 24x7
   to meet personal and professional
   requirement




© 2012. Airegis Pvt. Ltd. All Rights Reserved
What Wi-Fi Users Want

  • Very good wireless coverage
         – Smartphone/Tablets have short range compared
           to laptop

  • Seamless access and roaming
         – Every user now carries two or more Wi-Fi enabled
           device
         – Users expect seamless Wi-Fi roaming just like their
           2G/3G data connection
         – Setup once, access across all locations

  • Better Internet bandwidth

  • Security is someone else’s headache
         – Users do not understand security risks
         – Wi-Fi misuse can do brand erosion for service providers

© 2012. Airegis Pvt. Ltd. All Rights Reserved
Wi-Fi Hotspot Deployment-Traditional
                                                    Your Wi-Fi Hotspot
                                                      Infrastructure




                                                                                                Internet

                                                Network Switch      Access Controller



Users              Access Points


                                                                              User’s validity check
                                                                                   done here


© 2012. Airegis Pvt. Ltd. All Rights Reserved
Myth About Web Page based User
Authentication
                             Username/Password == Secure Wi-Fi Service




                                                          Login portal does not
                                                          provide data protection
                                                          or privacy to Wi-Fi users


                                                          Only helps service
                                                          providers prevent
                                                          unauthorized access to
                                                          Wi-Fi internet service.




© 2012. Airegis Pvt. Ltd. All Rights Reserved
Why do we need Secure Wi-Fi
 Access?

                                                Data exchanged in an Open Wi-Fi Hotspot

               A Laptop User                                                              Wireless AP/Router
                                                Who protects your private and
     Firewall and Anti-Virus
     protects your private and                  confidential data when they are
     confidential data here!                    transmitted in the air?


     Threats and Implications of Wi-Fi Hotspot Insecurity
     Threat 1: Passive snooping
     Implication: Loss of private/confidential data transmitted in plain text.

     Threat 2: Evil Twin/MiTM Attack
     Implication: Loss of private/confidential data, business secrets, emails,
     IMs, impersonation even if SSL based applications are used.


© 2012. Airegis Pvt. Ltd. All Rights Reserved
Problems of today’s Wi-Fi hotspots

                                                  1
                                                Security
• Majority of Wi-Fi hotspots use Open
  configuration.
        • User’s data is not encrypted.
        • No privacy or data protection to users.

• Web based user authentication can
  be bypassed.
        • Information freely available on the net.




© 2012. Airegis Pvt. Ltd. All Rights Reserved
Problems of today’s Wi-Fi hotspots


                                                                2
                                                          Scalability
                                                Anybody can connect to open Wi-Fi network.

                                                Today’s users use always ON device such as
                                                smartphone, iPads, tablets etc.

                                                If they connect to Wi-Fi, they remain connected to
                                                the network, even if validity expires.
                                                This quickly saturates wireless network and
                                                degrades performance. New users suffer.




© 2012. Airegis Pvt. Ltd. All Rights Reserved
Problems of today’s Wi-Fi hotspots

                                                                  3
                                                              Usability
                                                Today’s user use apps centric devices such as tablets,
                                                iPads, smartphone etc.

                                                Open Wi-Fi authentication requires user to go through
                                                browser based user authentication.

                                                A lot of users unaware of web based authentication
                                                could not browse. They simply drop-off. Their device
                                                remains connected.

                                                Browser based user authentication increases network
                                                congestion and makes internet access inconvenient.




© 2012. Airegis Pvt. Ltd. All Rights Reserved
We Solve All-Security, Scalability,
Usability
                                                                                         Existing Features
                                 Privacy and
                                     Data
                                 Protection
                                                                               Security-User’s Privacy and Data
                                                                                Protection

                                                                               Central/Remote Management
               Central
                               AirSpot/
                                                Multi-tenant
             Management
                           AiregisCloud                                        Multi-Sites Management

                                                                               Multiple Wireless Network Management

                                 Multi-H/w                                     Co-existence with existing Wi-Fi service
                                 Platform
                                  Support

                                                                               IEEE 802.11n Compliant Wi-Fi-150/300
                                                                                Mbps
                           Encrypted Communication
     Access Point                                         Laptop               Customization/Branding Option
In Airegis powered Wi-Fi hotspots,        No custom software or apps is
all communications are encrypted          required on client device. No
at radio level using Airegis              advance configuration is required
proprietary protocol.                     for accessing hotspot.



© 2012. Airegis Pvt. Ltd. All Rights Reserved
Airegis Secure Wi-Fi Access
                                                           Your Wi-Fi Hotspot
                                                             Infrastructure




                                                                                                  Access
                                                                                                  Control
                                                                                                 on Cloud
                                                                    Network Switch



Users                                           Access Points


                                                                      Different password for each and every
                                                                      guest with validity and auto-expiry
                  User’s validity check
                                                                      Less infrastructure overhead for Wi-Fi
                       done here
                                                                      Hotspot deployment
                                                                      Cost competitive

© 2012. Airegis Pvt. Ltd. All Rights Reserved
Key Benefits- End User

    1 Privacy and Data Protection
          Data exchanged between user device and network is
          always encrypted. No software install needed on client.
          Privacy of users & data protection is always guaranteed.


    2 Smart Connectivity
          Airegis intelligent Wi-Fi system automatically does user
          authentication the moment user connects to Wi-Fi.
          Smartphone/Tablet users get uninterrupted internet access.



    3 Seamless Access
          User session does not expire. Users get 24x7 connectivity
          and auto-roaming.




© 2012. Airegis Pvt. Ltd. All Rights Reserved
Key Benefits- Service Provider


    1        Security at Infrastructure Level
             IT Admin are assured of no un-authorized access.


            Improved Infrastructure Scalability
    2
            Network is always freed from unwanted mobile
            devices.


    3 Marketing Advantage
           Secure Wi-Fi can be used by providers as key
           competitive differentiation and brand building.




© 2012. Airegis Pvt. Ltd. All Rights Reserved
Our Solution, Your Choice


                                                                 AiregisCloud™




                      AirSpot™                                        AiregisCloud™
          Locally Hosted, Locally Managed                    Cloud Hosted, Remotely Managed


                                       Put our product to the test,
                                    Contact us for a free trial today!




© 2012. Airegis Pvt. Ltd. All Rights Reserved
Contact Us Now



Contact                      About Airegis
5thFloor, 10 Jumps Premise   Airegis, by virtue of its innovative products and solutions, helps businesses, wireless ISPs
Gaikwad Villa                and operators reap the benefits of true business potential of Wi-Fi Hotspot networks by
Sanewadi, Aundh              enabling them to offer secure and value added Wi-Fi service.
Pune, Maharashtra (INDIA)
Email: contact@airegis.com   Most Wi-Fi hotspots in the world are insecure and users of these networks are exposed to a
sales@airegis.com            wide array of security problems. Airegis products can be deployed to offer Wi-Fi security as
www.airegis.com              a value added service to garner the trust of visitors and impact the bottom line of business
                             by converting them into wireless hotspot users.




                                  © 2012. Airegis Pvt. Ltd. All Rights Reserved

More Related Content

What's hot

Realtime Framework Webinar - Channels and Security
Realtime Framework Webinar - Channels and SecurityRealtime Framework Webinar - Channels and Security
Realtime Framework Webinar - Channels and SecurityRealtime
 
Wi fi presentation
Wi fi presentationWi fi presentation
Wi fi presentationAbhishek Das
 
Mdc Brochure
Mdc BrochureMdc Brochure
Mdc Brochuremartgroot
 
Widgets –what’s that all about then?
Widgets –what’s that all about then?Widgets –what’s that all about then?
Widgets –what’s that all about then?Nathalie Magniez
 
Simply Connected Solution Brief
Simply Connected Solution BriefSimply Connected Solution Brief
Simply Connected Solution BriefJuniper Networks
 
Wi fi and its application
Wi fi and its applicationWi fi and its application
Wi fi and its applicationwongtanping
 
WiFi; It's Not Just Connectivity
WiFi; It's Not Just ConnectivityWiFi; It's Not Just Connectivity
WiFi; It's Not Just ConnectivityWestbase.io
 
Wi fi presentation
Wi fi presentationWi fi presentation
Wi fi presentationdayansaji
 
How wifi has improved your life?
How wifi has improved your life?How wifi has improved your life?
How wifi has improved your life?Madhav Dhamija
 
Ruckus EDU brochere
Ruckus EDU brochereRuckus EDU brochere
Ruckus EDU brochereDan Roth
 
BYOD - Protecting Your School
BYOD - Protecting Your SchoolBYOD - Protecting Your School
BYOD - Protecting Your SchoolSophos
 

What's hot (16)

Realtime Framework Webinar - Channels and Security
Realtime Framework Webinar - Channels and SecurityRealtime Framework Webinar - Channels and Security
Realtime Framework Webinar - Channels and Security
 
Wi-Fi
Wi-FiWi-Fi
Wi-Fi
 
Wi fi presentation
Wi fi presentationWi fi presentation
Wi fi presentation
 
Mdc Brochure
Mdc BrochureMdc Brochure
Mdc Brochure
 
Widgets –what’s that all about then?
Widgets –what’s that all about then?Widgets –what’s that all about then?
Widgets –what’s that all about then?
 
Wi-fi
Wi-fiWi-fi
Wi-fi
 
Simply Connected Solution Brief
Simply Connected Solution BriefSimply Connected Solution Brief
Simply Connected Solution Brief
 
972003
972003972003
972003
 
Wi fi and its application
Wi fi and its applicationWi fi and its application
Wi fi and its application
 
WiFi; It's Not Just Connectivity
WiFi; It's Not Just ConnectivityWiFi; It's Not Just Connectivity
WiFi; It's Not Just Connectivity
 
Wi fi presentation
Wi fi presentationWi fi presentation
Wi fi presentation
 
How wifi has improved your life?
How wifi has improved your life?How wifi has improved your life?
How wifi has improved your life?
 
Ruckus EDU brochere
Ruckus EDU brochereRuckus EDU brochere
Ruckus EDU brochere
 
Webinos Project
Webinos ProjectWebinos Project
Webinos Project
 
ICC Networking Value Proposition
ICC Networking Value PropositionICC Networking Value Proposition
ICC Networking Value Proposition
 
BYOD - Protecting Your School
BYOD - Protecting Your SchoolBYOD - Protecting Your School
BYOD - Protecting Your School
 

Similar to Challenges of today's wi fi hotspots and airegis solution

Beyond BYOD: Uncompromised Experience for Any Workspace
Beyond BYOD: Uncompromised Experience for Any WorkspaceBeyond BYOD: Uncompromised Experience for Any Workspace
Beyond BYOD: Uncompromised Experience for Any WorkspaceCisco Mobility
 
Bo d customer_presentation-q2-2012
Bo d customer_presentation-q2-2012Bo d customer_presentation-q2-2012
Bo d customer_presentation-q2-2012davesurreal
 
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USIBM Danmark
 
White Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic WorkforceWhite Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic WorkforceCourtland Smith
 
IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...
IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...
IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...AIP Foundation
 
offload
 offload offload
offloadxingbei
 
Education webinar april 2012
Education webinar april 2012Education webinar april 2012
Education webinar april 2012Infoblox
 
Did Your Wi-Fi Performance Expire Before the Warranty Did? | Steps to Providi...
Did Your Wi-Fi Performance Expire Before the Warranty Did? | Steps to Providi...Did Your Wi-Fi Performance Expire Before the Warranty Did? | Steps to Providi...
Did Your Wi-Fi Performance Expire Before the Warranty Did? | Steps to Providi...Xirrus
 
Top 5 wi fi security threats
Top 5 wi fi security threatsTop 5 wi fi security threats
Top 5 wi fi security threatsgruzabb
 
Wi fi Technilogy
Wi fi TechnilogyWi fi Technilogy
Wi fi Technilogythasnim1304
 
Express Data - BYOD
Express Data - BYODExpress Data - BYOD
Express Data - BYODGen-i
 
Express Data - BYOD
Express Data - BYODExpress Data - BYOD
Express Data - BYODGen-i
 
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCloudIDSummit
 
Cyberoam Net Genie Brief Ppt 4.0
Cyberoam Net Genie   Brief Ppt 4.0Cyberoam Net Genie   Brief Ppt 4.0
Cyberoam Net Genie Brief Ppt 4.0ambarish_pawar
 
Taking Wi-Fi Beyond Offload
Taking Wi-Fi Beyond OffloadTaking Wi-Fi Beyond Offload
Taking Wi-Fi Beyond OffloadVideoBeet.TV
 
Cidway Banking 02 2011
Cidway Banking 02 2011Cidway Banking 02 2011
Cidway Banking 02 2011lfilliat
 

Similar to Challenges of today's wi fi hotspots and airegis solution (20)

Beyond BYOD: Uncompromised Experience for Any Workspace
Beyond BYOD: Uncompromised Experience for Any WorkspaceBeyond BYOD: Uncompromised Experience for Any Workspace
Beyond BYOD: Uncompromised Experience for Any Workspace
 
Bo d customer_presentation-q2-2012
Bo d customer_presentation-q2-2012Bo d customer_presentation-q2-2012
Bo d customer_presentation-q2-2012
 
Wi Fi
Wi FiWi Fi
Wi Fi
 
Beyond BYOD
Beyond BYODBeyond BYOD
Beyond BYOD
 
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
 
White Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic WorkforceWhite Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic Workforce
 
IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...
IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...
IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...
 
offload
 offload offload
offload
 
Education webinar april 2012
Education webinar april 2012Education webinar april 2012
Education webinar april 2012
 
Did Your Wi-Fi Performance Expire Before the Warranty Did? | Steps to Providi...
Did Your Wi-Fi Performance Expire Before the Warranty Did? | Steps to Providi...Did Your Wi-Fi Performance Expire Before the Warranty Did? | Steps to Providi...
Did Your Wi-Fi Performance Expire Before the Warranty Did? | Steps to Providi...
 
Top 5 wi fi security threats
Top 5 wi fi security threatsTop 5 wi fi security threats
Top 5 wi fi security threats
 
Wi fi Technilogy
Wi fi TechnilogyWi fi Technilogy
Wi fi Technilogy
 
Express Data - BYOD
Express Data - BYODExpress Data - BYOD
Express Data - BYOD
 
Express Data - BYOD
Express Data - BYODExpress Data - BYOD
Express Data - BYOD
 
wi-fi.pptx
wi-fi.pptxwi-fi.pptx
wi-fi.pptx
 
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
 
Juniper sa-sslvpn
Juniper sa-sslvpnJuniper sa-sslvpn
Juniper sa-sslvpn
 
Cyberoam Net Genie Brief Ppt 4.0
Cyberoam Net Genie   Brief Ppt 4.0Cyberoam Net Genie   Brief Ppt 4.0
Cyberoam Net Genie Brief Ppt 4.0
 
Taking Wi-Fi Beyond Offload
Taking Wi-Fi Beyond OffloadTaking Wi-Fi Beyond Offload
Taking Wi-Fi Beyond Offload
 
Cidway Banking 02 2011
Cidway Banking 02 2011Cidway Banking 02 2011
Cidway Banking 02 2011
 

Recently uploaded

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 

Recently uploaded (20)

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 

Challenges of today's wi fi hotspots and airegis solution

  • 1. Challenges of Next Generation Wi-Fi Hotspots Airegis www.airegis.com © 2012. Airegis Private Limited, All Rights Reserved
  • 2. The Need Demand for Mobile Internet Access is Growing ! Key Driving Force • High adoption of wireless enabled gadgets (smartphone, tablets, netbooks etc.) • People need internet access 24x7 to meet personal and professional requirement © 2012. Airegis Pvt. Ltd. All Rights Reserved
  • 3. What Wi-Fi Users Want • Very good wireless coverage – Smartphone/Tablets have short range compared to laptop • Seamless access and roaming – Every user now carries two or more Wi-Fi enabled device – Users expect seamless Wi-Fi roaming just like their 2G/3G data connection – Setup once, access across all locations • Better Internet bandwidth • Security is someone else’s headache – Users do not understand security risks – Wi-Fi misuse can do brand erosion for service providers © 2012. Airegis Pvt. Ltd. All Rights Reserved
  • 4. Wi-Fi Hotspot Deployment-Traditional Your Wi-Fi Hotspot Infrastructure Internet Network Switch Access Controller Users Access Points User’s validity check done here © 2012. Airegis Pvt. Ltd. All Rights Reserved
  • 5. Myth About Web Page based User Authentication Username/Password == Secure Wi-Fi Service Login portal does not provide data protection or privacy to Wi-Fi users Only helps service providers prevent unauthorized access to Wi-Fi internet service. © 2012. Airegis Pvt. Ltd. All Rights Reserved
  • 6. Why do we need Secure Wi-Fi Access? Data exchanged in an Open Wi-Fi Hotspot A Laptop User Wireless AP/Router Who protects your private and Firewall and Anti-Virus protects your private and confidential data when they are confidential data here! transmitted in the air? Threats and Implications of Wi-Fi Hotspot Insecurity Threat 1: Passive snooping Implication: Loss of private/confidential data transmitted in plain text. Threat 2: Evil Twin/MiTM Attack Implication: Loss of private/confidential data, business secrets, emails, IMs, impersonation even if SSL based applications are used. © 2012. Airegis Pvt. Ltd. All Rights Reserved
  • 7. Problems of today’s Wi-Fi hotspots 1 Security • Majority of Wi-Fi hotspots use Open configuration. • User’s data is not encrypted. • No privacy or data protection to users. • Web based user authentication can be bypassed. • Information freely available on the net. © 2012. Airegis Pvt. Ltd. All Rights Reserved
  • 8. Problems of today’s Wi-Fi hotspots 2 Scalability Anybody can connect to open Wi-Fi network. Today’s users use always ON device such as smartphone, iPads, tablets etc. If they connect to Wi-Fi, they remain connected to the network, even if validity expires. This quickly saturates wireless network and degrades performance. New users suffer. © 2012. Airegis Pvt. Ltd. All Rights Reserved
  • 9. Problems of today’s Wi-Fi hotspots 3 Usability Today’s user use apps centric devices such as tablets, iPads, smartphone etc. Open Wi-Fi authentication requires user to go through browser based user authentication. A lot of users unaware of web based authentication could not browse. They simply drop-off. Their device remains connected. Browser based user authentication increases network congestion and makes internet access inconvenient. © 2012. Airegis Pvt. Ltd. All Rights Reserved
  • 10. We Solve All-Security, Scalability, Usability Existing Features Privacy and Data Protection  Security-User’s Privacy and Data Protection  Central/Remote Management Central AirSpot/ Multi-tenant Management AiregisCloud  Multi-Sites Management  Multiple Wireless Network Management Multi-H/w  Co-existence with existing Wi-Fi service Platform Support  IEEE 802.11n Compliant Wi-Fi-150/300 Mbps Encrypted Communication Access Point Laptop  Customization/Branding Option In Airegis powered Wi-Fi hotspots, No custom software or apps is all communications are encrypted required on client device. No at radio level using Airegis advance configuration is required proprietary protocol. for accessing hotspot. © 2012. Airegis Pvt. Ltd. All Rights Reserved
  • 11. Airegis Secure Wi-Fi Access Your Wi-Fi Hotspot Infrastructure Access Control on Cloud Network Switch Users Access Points Different password for each and every guest with validity and auto-expiry User’s validity check Less infrastructure overhead for Wi-Fi done here Hotspot deployment Cost competitive © 2012. Airegis Pvt. Ltd. All Rights Reserved
  • 12. Key Benefits- End User 1 Privacy and Data Protection Data exchanged between user device and network is always encrypted. No software install needed on client. Privacy of users & data protection is always guaranteed. 2 Smart Connectivity Airegis intelligent Wi-Fi system automatically does user authentication the moment user connects to Wi-Fi. Smartphone/Tablet users get uninterrupted internet access. 3 Seamless Access User session does not expire. Users get 24x7 connectivity and auto-roaming. © 2012. Airegis Pvt. Ltd. All Rights Reserved
  • 13. Key Benefits- Service Provider 1 Security at Infrastructure Level IT Admin are assured of no un-authorized access. Improved Infrastructure Scalability 2 Network is always freed from unwanted mobile devices. 3 Marketing Advantage Secure Wi-Fi can be used by providers as key competitive differentiation and brand building. © 2012. Airegis Pvt. Ltd. All Rights Reserved
  • 14. Our Solution, Your Choice AiregisCloud™ AirSpot™ AiregisCloud™ Locally Hosted, Locally Managed Cloud Hosted, Remotely Managed Put our product to the test, Contact us for a free trial today! © 2012. Airegis Pvt. Ltd. All Rights Reserved
  • 15. Contact Us Now Contact About Airegis 5thFloor, 10 Jumps Premise Airegis, by virtue of its innovative products and solutions, helps businesses, wireless ISPs Gaikwad Villa and operators reap the benefits of true business potential of Wi-Fi Hotspot networks by Sanewadi, Aundh enabling them to offer secure and value added Wi-Fi service. Pune, Maharashtra (INDIA) Email: contact@airegis.com Most Wi-Fi hotspots in the world are insecure and users of these networks are exposed to a sales@airegis.com wide array of security problems. Airegis products can be deployed to offer Wi-Fi security as www.airegis.com a value added service to garner the trust of visitors and impact the bottom line of business by converting them into wireless hotspot users. © 2012. Airegis Pvt. Ltd. All Rights Reserved