SlideShare a Scribd company logo
Secure Wi-Fi & Analytics

           Drive Revenue, Protect Data,
           & Automate PCI Compliance

                 Dwight Agriel
             @AirTight Networks
youtu.be/Ju60zZgNLJE

© 2013 AirTight Networks, Inc. All rights reserved.   2
So retailers are getting increasingly social!




               © 2013 AirTight Networks, Inc. All rights reserved.   3
© 2013 AirTight Networks, Inc. All rights reserved.   4
Distributed Wi-Fi Challenges

•   Large scale of operation
•   Geographically distributed
•   Security/compliance concerns
•   Cost sensitivity
•   Thin IT staff




                        © 2013 AirTight Networks, Inc. All rights reserved.   5
Gartner Top Predictions for 2012: Control Slips Away, Daryl Plummer, March 2012



               © 2013 AirTight Networks, Inc. All rights reserved.                6
© 2012 AirTight Networks, Inc. All rights reserved.   7
Efficient, Controllerless, Cloud Architecture




               © 2013 AirTight Networks, Inc. All rights reserved.   8
AirTight Cloud Managed Wi-Fi Devices




               C50 AP                                           C10 WIPS Sensor
     C60 AP                              C55 AP

              © 2013 AirTight Networks, Inc. All rights reserved.                 9
AirTight C60 AP




© 2013 AirTight Networks, Inc. All rights reserved.     10
Enhance the Guest Experience




             © 2013 AirTight Networks, Inc. All rights reserved.   11
Guest Analytics (Big Data)

Wi-Fi Analytics for Business
        Intelligence
                                         Get closer to your customers!
                                           •    Insight into guest behavior
                                           •    Identify repeat visitors
                                           •    Offer in-store promotions
                                           •    Increase loyalty




                          © 2013 AirTight Networks, Inc. All rights reserved.   12
Eliminate the PCI Guesswork




             © 2013 AirTight Networks, Inc. All rights reserved.   13
Retail




Dining




Hospitality


              © 2013 AirTight Networks, Inc. All rights reserved.   14
Increase Customer Engagement
 BUSINESS DRIVERS
 Pinkcard customer loyalty program and mobile app
 Improve customer experience
 Increase in repeat customer visits


 SUCCESS FOR PINKBERRY
 Success of the Pinkcard program beyond expectations
 Swift rollout of secure Wi-Fi across 170+ stores worldwide
 No need to add any IT staff
 Built-in automated security simplified PCI compliance


Exceeded 3 month adoption goal in first month!



 © 2013 AirTight Networks, Inc. All rights reserved.           15
Lower Costs, Reduce IT Support Load
 BUSINESS DRIVERS
Lower cost and reduce support burden of Wi-Fi
Reliable, secure in-store Wi-Fi for guests

SUCCESS FOR NOODLES
“3-in-1” Wi-Fi solution delivers signification cost savings
4 person IT support team can manage 300+ restaurants
Built-in wireless IPS and reporting automates PCI compliance




                          © 2013 AirTight Networks, Inc. All rights reserved.   16
Improve Employee Productivity
 BUSINESS DRIVERS
Reliable, secure in-store Wi-Fi to improve employee work experience
Maintain Level-1 PCI compliance

SUCCESS FOR GARDEN FRESH
Store managers and district officers can work from anywhere in the store
Automated wireless security across 130 distributed locations
Built-in wireless security and reporting simplified PCI compliance




                          © 2013 AirTight Networks, Inc. All rights reserved.   17
Automate PCI Compliance
 BUSINESS DRIVERS
Maintain Level-1 PCI compliance
Reduce the cost of wireless security audits across 500+ stores

SUCCESS FOR VITAMIN SHOPPE
Eliminated the high deployment costs of dedicated security solution
Store managers installed the “plug and play” equipment
Automated wireless PCI reporting across 500 distributed locations
Wi-Fi platform for future applications




                           © 2013 AirTight Networks, Inc. All rights reserved.   18
© 2013 AirTight Networks, Inc. All rights reserved.   19
More Information

           www.airtightnetworks.com

           www.twitter.com/AirTight

           http://blog.airtightnetworks.com

           www.youtube.com/airtightnetworks

           www.linkedin.com/company/airtight-networks

           www.facebook.com/AirTightNetworks



             © 2013 AirTight Networks, Inc. All rights reserved.   20
@AirTight #Retail Motion
Infographic




     http://www.youtube.com/watch?v=Ju60zZgNLJE&feature=youtu.be

                   © 2012 AirTight Networks, Inc. All rights reserved.   21

More Related Content

What's hot

Extreme Networks Retail Guest Analytics Solution
Extreme Networks Retail Guest Analytics SolutionExtreme Networks Retail Guest Analytics Solution
Extreme Networks Retail Guest Analytics Solution
Extreme Networks
 
NFC Tags: The Need for Frictionless Trust
NFC Tags: The Need for Frictionless TrustNFC Tags: The Need for Frictionless Trust
NFC Tags: The Need for Frictionless Trust
NFC Forum
 
ICPDAS - IIoT solution
ICPDAS - IIoT solutionICPDAS - IIoT solution
ICPDAS - IIoT solution
ICPDAS
 
Cisco presentatie 25 juni 2014
Cisco presentatie 25 juni 2014Cisco presentatie 25 juni 2014
Cisco presentatie 25 juni 2014
Claudia Sträter
 
Record-Breaking Wi-Fi Usage at Super Bowl LI
Record-Breaking Wi-Fi Usage at Super Bowl LIRecord-Breaking Wi-Fi Usage at Super Bowl LI
Record-Breaking Wi-Fi Usage at Super Bowl LI
Extreme Networks
 
IoTMeetupGuildford#11: Intelligent IoT - Paul Marshall - Eseye Intelligently ...
IoTMeetupGuildford#11: Intelligent IoT - Paul Marshall - Eseye Intelligently ...IoTMeetupGuildford#11: Intelligent IoT - Paul Marshall - Eseye Intelligently ...
IoTMeetupGuildford#11: Intelligent IoT - Paul Marshall - Eseye Intelligently ...
MicheleNati
 
Over 1800 Units of Access Points Installed In Various Environments Since 2013
Over 1800 Units of Access Points Installed In Various Environments Since 2013Over 1800 Units of Access Points Installed In Various Environments Since 2013
Over 1800 Units of Access Points Installed In Various Environments Since 2013
ROOTS Communications Pte Ltd
 
SafeCamz Surveillance VSaaS Presentation
SafeCamz Surveillance VSaaS PresentationSafeCamz Surveillance VSaaS Presentation
SafeCamz Surveillance VSaaS Presentation
SafeCamz
 
Cisco Connect 2018 Philippines - An innovation journey to a smarter network
Cisco Connect 2018 Philippines - An innovation journey to a smarter networkCisco Connect 2018 Philippines - An innovation journey to a smarter network
Cisco Connect 2018 Philippines - An innovation journey to a smarter network
NetworkCollaborators
 
Cisco Connect 2018 Philippines - software-defined access-a transformational ...
 Cisco Connect 2018 Philippines - software-defined access-a transformational ... Cisco Connect 2018 Philippines - software-defined access-a transformational ...
Cisco Connect 2018 Philippines - software-defined access-a transformational ...
NetworkCollaborators
 
Eseye
Eseye Eseye
Eseye
Terry Bonnar
 
Cisco Connect 2018 Indonesia - Cisco cmx
Cisco Connect 2018 Indonesia - Cisco cmx Cisco Connect 2018 Indonesia - Cisco cmx
Cisco Connect 2018 Indonesia - Cisco cmx
NetworkCollaborators
 
Cisco Connect 2018 Indonesia - Cisco HyperFlex
Cisco Connect 2018 Indonesia - Cisco HyperFlexCisco Connect 2018 Indonesia - Cisco HyperFlex
Cisco Connect 2018 Indonesia - Cisco HyperFlex
NetworkCollaborators
 
Extreme Networks and Avaya IP Networking Strategy
Extreme Networks and Avaya IP Networking StrategyExtreme Networks and Avaya IP Networking Strategy
Extreme Networks and Avaya IP Networking Strategy
Extreme Networks
 
Extreme Secure Automated Smart Factory
Extreme Secure Automated Smart FactoryExtreme Secure Automated Smart Factory
Extreme Secure Automated Smart Factory
Extreme Networks
 
From API Description to Developer Site: The hard part is working with people
From API Description to Developer Site: The hard part is working with peopleFrom API Description to Developer Site: The hard part is working with people
From API Description to Developer Site: The hard part is working with people
Anya Stettler
 
Our Company Presentation
Our Company PresentationOur Company Presentation
Our Company Presentation
Inextrix Technologies Pvt Ltd
 
Hazardous & Challenging Wi-Fi Deployments
Hazardous & Challenging Wi-Fi DeploymentsHazardous & Challenging Wi-Fi Deployments
Hazardous & Challenging Wi-Fi Deployments
Extreme Networks
 

What's hot (20)

Extreme Networks Retail Guest Analytics Solution
Extreme Networks Retail Guest Analytics SolutionExtreme Networks Retail Guest Analytics Solution
Extreme Networks Retail Guest Analytics Solution
 
Getiss 16x9
Getiss 16x9Getiss 16x9
Getiss 16x9
 
NFC Tags: The Need for Frictionless Trust
NFC Tags: The Need for Frictionless TrustNFC Tags: The Need for Frictionless Trust
NFC Tags: The Need for Frictionless Trust
 
ICPDAS - IIoT solution
ICPDAS - IIoT solutionICPDAS - IIoT solution
ICPDAS - IIoT solution
 
Cisco presentatie 25 juni 2014
Cisco presentatie 25 juni 2014Cisco presentatie 25 juni 2014
Cisco presentatie 25 juni 2014
 
Record-Breaking Wi-Fi Usage at Super Bowl LI
Record-Breaking Wi-Fi Usage at Super Bowl LIRecord-Breaking Wi-Fi Usage at Super Bowl LI
Record-Breaking Wi-Fi Usage at Super Bowl LI
 
IoTMeetupGuildford#11: Intelligent IoT - Paul Marshall - Eseye Intelligently ...
IoTMeetupGuildford#11: Intelligent IoT - Paul Marshall - Eseye Intelligently ...IoTMeetupGuildford#11: Intelligent IoT - Paul Marshall - Eseye Intelligently ...
IoTMeetupGuildford#11: Intelligent IoT - Paul Marshall - Eseye Intelligently ...
 
Over 1800 Units of Access Points Installed In Various Environments Since 2013
Over 1800 Units of Access Points Installed In Various Environments Since 2013Over 1800 Units of Access Points Installed In Various Environments Since 2013
Over 1800 Units of Access Points Installed In Various Environments Since 2013
 
SafeCamz Surveillance VSaaS Presentation
SafeCamz Surveillance VSaaS PresentationSafeCamz Surveillance VSaaS Presentation
SafeCamz Surveillance VSaaS Presentation
 
Cisco Connect 2018 Philippines - An innovation journey to a smarter network
Cisco Connect 2018 Philippines - An innovation journey to a smarter networkCisco Connect 2018 Philippines - An innovation journey to a smarter network
Cisco Connect 2018 Philippines - An innovation journey to a smarter network
 
Cisco Connect 2018 Philippines - software-defined access-a transformational ...
 Cisco Connect 2018 Philippines - software-defined access-a transformational ... Cisco Connect 2018 Philippines - software-defined access-a transformational ...
Cisco Connect 2018 Philippines - software-defined access-a transformational ...
 
Eseye
Eseye Eseye
Eseye
 
Cisco Connect 2018 Indonesia - Cisco cmx
Cisco Connect 2018 Indonesia - Cisco cmx Cisco Connect 2018 Indonesia - Cisco cmx
Cisco Connect 2018 Indonesia - Cisco cmx
 
Cisco Connect 2018 Indonesia - Cisco HyperFlex
Cisco Connect 2018 Indonesia - Cisco HyperFlexCisco Connect 2018 Indonesia - Cisco HyperFlex
Cisco Connect 2018 Indonesia - Cisco HyperFlex
 
Extreme Networks and Avaya IP Networking Strategy
Extreme Networks and Avaya IP Networking StrategyExtreme Networks and Avaya IP Networking Strategy
Extreme Networks and Avaya IP Networking Strategy
 
Extreme Secure Automated Smart Factory
Extreme Secure Automated Smart FactoryExtreme Secure Automated Smart Factory
Extreme Secure Automated Smart Factory
 
From API Description to Developer Site: The hard part is working with people
From API Description to Developer Site: The hard part is working with peopleFrom API Description to Developer Site: The hard part is working with people
From API Description to Developer Site: The hard part is working with people
 
NOD
NODNOD
NOD
 
Our Company Presentation
Our Company PresentationOur Company Presentation
Our Company Presentation
 
Hazardous & Challenging Wi-Fi Deployments
Hazardous & Challenging Wi-Fi DeploymentsHazardous & Challenging Wi-Fi Deployments
Hazardous & Challenging Wi-Fi Deployments
 

Similar to Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @AirTight Secure Wi-Fi and Analytics

SMAC - Presentation from RetailWeek Technology Summit, Sept 23
SMAC - Presentation from RetailWeek Technology Summit, Sept 23SMAC - Presentation from RetailWeek Technology Summit, Sept 23
SMAC - Presentation from RetailWeek Technology Summit, Sept 23AirTight Networks
 
AirTight Corporate Presentation _ July2013
AirTight Corporate Presentation _ July2013AirTight Corporate Presentation _ July2013
AirTight Corporate Presentation _ July2013
AirTight Networks, Inc.
 
SMAC _ Can It Maximise Staff and Customer Engagement? RWTS
SMAC _ Can It Maximise Staff and Customer Engagement?  RWTSSMAC _ Can It Maximise Staff and Customer Engagement?  RWTS
SMAC _ Can It Maximise Staff and Customer Engagement? RWTS
AirTight Networks
 
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
AirTight Networks
 
Outage analysis: BGP Routing Errors Ripple Across the Internet
Outage analysis: BGP Routing Errors Ripple Across the InternetOutage analysis: BGP Routing Errors Ripple Across the Internet
Outage analysis: BGP Routing Errors Ripple Across the Internet
ThousandEyes
 
AWS 預測性維護與智慧物聯應用
AWS 預測性維護與智慧物聯應用AWS 預測性維護與智慧物聯應用
AWS 預測性維護與智慧物聯應用Amazon Web Services
 
DEVNET-1138 Smart Cloud Services for Smart Things with Xively
DEVNET-1138	Smart Cloud Services for Smart Things with XivelyDEVNET-1138	Smart Cloud Services for Smart Things with Xively
DEVNET-1138 Smart Cloud Services for Smart Things with Xively
Cisco DevNet
 
Thousand Eyes FMD.pptx
Thousand Eyes FMD.pptxThousand Eyes FMD.pptx
Thousand Eyes FMD.pptx
AnandYadav542909
 
The Path to BYOD in Financial Enterprise
The Path to BYOD in Financial EnterpriseThe Path to BYOD in Financial Enterprise
The Path to BYOD in Financial Enterprise
Jason Boud
 
Partner Setup Guide_v2.8
Partner Setup Guide_v2.8Partner Setup Guide_v2.8
Partner Setup Guide_v2.8Eliot E. Green
 
Visibility and Automation for Enhanced Security
Visibility and Automation for Enhanced SecurityVisibility and Automation for Enhanced Security
Visibility and Automation for Enhanced Security
patmisasi
 
Augview Gita Presentation 2015
Augview Gita Presentation 2015 Augview Gita Presentation 2015
Augview Gita Presentation 2015 Geo AR Games
 
Airheads main conference slideshare v1.0
Airheads main conference slideshare v1.0Airheads main conference slideshare v1.0
Airheads main conference slideshare v1.0Jason Boud
 
Datacenter and cloud - corporate presentation
Datacenter and cloud - corporate presentationDatacenter and cloud - corporate presentation
Datacenter and cloud - corporate presentation
Bipin-Singh
 
Broad Sky Networks - In-vehicle presentation w Cradlepoint
Broad Sky Networks - In-vehicle presentation w CradlepointBroad Sky Networks - In-vehicle presentation w Cradlepoint
Broad Sky Networks - In-vehicle presentation w Cradlepoint
Maureen Donovan
 
Unlocking the ROI and Long-Term Benefits of SD-WAN
Unlocking the ROI and Long-Term Benefits of SD-WANUnlocking the ROI and Long-Term Benefits of SD-WAN
Unlocking the ROI and Long-Term Benefits of SD-WAN
Enterprise Management Associates
 
Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)
Rafael Maranon
 
IoT13: Etherios showcase
IoT13: Etherios showcaseIoT13: Etherios showcase
IoT13: Etherios showcase
Business of Software Conference
 
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
ForgeRock
 
AWS Summit Singapore 2019 | Transformation in the Enterprise
AWS Summit Singapore 2019 | Transformation in the EnterpriseAWS Summit Singapore 2019 | Transformation in the Enterprise
AWS Summit Singapore 2019 | Transformation in the Enterprise
AWS Summits
 

Similar to Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @AirTight Secure Wi-Fi and Analytics (20)

SMAC - Presentation from RetailWeek Technology Summit, Sept 23
SMAC - Presentation from RetailWeek Technology Summit, Sept 23SMAC - Presentation from RetailWeek Technology Summit, Sept 23
SMAC - Presentation from RetailWeek Technology Summit, Sept 23
 
AirTight Corporate Presentation _ July2013
AirTight Corporate Presentation _ July2013AirTight Corporate Presentation _ July2013
AirTight Corporate Presentation _ July2013
 
SMAC _ Can It Maximise Staff and Customer Engagement? RWTS
SMAC _ Can It Maximise Staff and Customer Engagement?  RWTSSMAC _ Can It Maximise Staff and Customer Engagement?  RWTS
SMAC _ Can It Maximise Staff and Customer Engagement? RWTS
 
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
 
Outage analysis: BGP Routing Errors Ripple Across the Internet
Outage analysis: BGP Routing Errors Ripple Across the InternetOutage analysis: BGP Routing Errors Ripple Across the Internet
Outage analysis: BGP Routing Errors Ripple Across the Internet
 
AWS 預測性維護與智慧物聯應用
AWS 預測性維護與智慧物聯應用AWS 預測性維護與智慧物聯應用
AWS 預測性維護與智慧物聯應用
 
DEVNET-1138 Smart Cloud Services for Smart Things with Xively
DEVNET-1138	Smart Cloud Services for Smart Things with XivelyDEVNET-1138	Smart Cloud Services for Smart Things with Xively
DEVNET-1138 Smart Cloud Services for Smart Things with Xively
 
Thousand Eyes FMD.pptx
Thousand Eyes FMD.pptxThousand Eyes FMD.pptx
Thousand Eyes FMD.pptx
 
The Path to BYOD in Financial Enterprise
The Path to BYOD in Financial EnterpriseThe Path to BYOD in Financial Enterprise
The Path to BYOD in Financial Enterprise
 
Partner Setup Guide_v2.8
Partner Setup Guide_v2.8Partner Setup Guide_v2.8
Partner Setup Guide_v2.8
 
Visibility and Automation for Enhanced Security
Visibility and Automation for Enhanced SecurityVisibility and Automation for Enhanced Security
Visibility and Automation for Enhanced Security
 
Augview Gita Presentation 2015
Augview Gita Presentation 2015 Augview Gita Presentation 2015
Augview Gita Presentation 2015
 
Airheads main conference slideshare v1.0
Airheads main conference slideshare v1.0Airheads main conference slideshare v1.0
Airheads main conference slideshare v1.0
 
Datacenter and cloud - corporate presentation
Datacenter and cloud - corporate presentationDatacenter and cloud - corporate presentation
Datacenter and cloud - corporate presentation
 
Broad Sky Networks - In-vehicle presentation w Cradlepoint
Broad Sky Networks - In-vehicle presentation w CradlepointBroad Sky Networks - In-vehicle presentation w Cradlepoint
Broad Sky Networks - In-vehicle presentation w Cradlepoint
 
Unlocking the ROI and Long-Term Benefits of SD-WAN
Unlocking the ROI and Long-Term Benefits of SD-WANUnlocking the ROI and Long-Term Benefits of SD-WAN
Unlocking the ROI and Long-Term Benefits of SD-WAN
 
Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)
 
IoT13: Etherios showcase
IoT13: Etherios showcaseIoT13: Etherios showcase
IoT13: Etherios showcase
 
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
 
AWS Summit Singapore 2019 | Transformation in the Enterprise
AWS Summit Singapore 2019 | Transformation in the EnterpriseAWS Summit Singapore 2019 | Transformation in the Enterprise
AWS Summit Singapore 2019 | Transformation in the Enterprise
 

More from AirTight Networks

Is 11ac Right for Your Network?
Is 11ac Right for Your Network?Is 11ac Right for Your Network?
Is 11ac Right for Your Network?
AirTight Networks
 
Air tight 11ac webinar series session 2 - 11ac feature deep dive - june 2014
Air tight 11ac webinar series   session 2 - 11ac feature deep dive - june 2014Air tight 11ac webinar series   session 2 - 11ac feature deep dive - june 2014
Air tight 11ac webinar series session 2 - 11ac feature deep dive - june 2014
AirTight Networks
 
Wi-Fi Offload Summit - Monetise Thyself
Wi-Fi Offload Summit - Monetise ThyselfWi-Fi Offload Summit - Monetise Thyself
Wi-Fi Offload Summit - Monetise ThyselfAirTight Networks
 
AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014
AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014
AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014
AirTight Networks
 
Restaurant Wi-Fi Primer: Retail Analytics and Social Integration
Restaurant Wi-Fi Primer: Retail Analytics and Social Integration Restaurant Wi-Fi Primer: Retail Analytics and Social Integration
Restaurant Wi-Fi Primer: Retail Analytics and Social Integration
AirTight Networks
 
AirTight Networks Evolution - Cloud & MSP
AirTight Networks Evolution - Cloud & MSPAirTight Networks Evolution - Cloud & MSP
AirTight Networks Evolution - Cloud & MSP
AirTight Networks
 
AirTight Networks WIPS at Wireless Field Day 6 WFD6
AirTight Networks WIPS at Wireless Field Day 6 WFD6AirTight Networks WIPS at Wireless Field Day 6 WFD6
AirTight Networks WIPS at Wireless Field Day 6 WFD6
AirTight Networks
 
AirTight social wifi solution brief
AirTight social wifi solution briefAirTight social wifi solution brief
AirTight social wifi solution brief
AirTight Networks
 
Considerations for a secure enterprise wlan data connectors 2013
Considerations for a secure enterprise wlan   data connectors 2013Considerations for a secure enterprise wlan   data connectors 2013
Considerations for a secure enterprise wlan data connectors 2013
AirTight Networks
 
Survey on the Impact of BYOD on Enterprise Security
Survey on the Impact of BYOD on Enterprise SecuritySurvey on the Impact of BYOD on Enterprise Security
Survey on the Impact of BYOD on Enterprise Security
AirTight Networks
 
AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...
AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...
AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...
AirTight Networks
 
Non WiFi interference combat guide 1
Non WiFi interference combat guide 1Non WiFi interference combat guide 1
Non WiFi interference combat guide 1
AirTight Networks
 
WPA2 Hole196 Vulnerability FAQs
WPA2 Hole196 Vulnerability FAQsWPA2 Hole196 Vulnerability FAQs
WPA2 Hole196 Vulnerability FAQs
AirTight Networks
 
WPA2 Hole196 Vulnerability: Exploits and Remediation Strategies
WPA2 Hole196 Vulnerability: Exploits and Remediation StrategiesWPA2 Hole196 Vulnerability: Exploits and Remediation Strategies
WPA2 Hole196 Vulnerability: Exploits and Remediation Strategies
AirTight Networks
 
Conquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the EnterpriseConquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the Enterprise
AirTight Networks
 
Windows 7 - A New Wireless Risk to the Enterprise
Windows 7 - A New Wireless Risk to the EnterpriseWindows 7 - A New Wireless Risk to the Enterprise
Windows 7 - A New Wireless Risk to the Enterprise
AirTight Networks
 
802.11w Tutorial
802.11w Tutorial802.11w Tutorial
802.11w Tutorial
AirTight Networks
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and Solutions
AirTight Networks
 
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And CountermeasuresSkyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
AirTight Networks
 
Retail Stores and Wireless Security—Recommendations
Retail Stores and Wireless Security—RecommendationsRetail Stores and Wireless Security—Recommendations
Retail Stores and Wireless Security—Recommendations
AirTight Networks
 

More from AirTight Networks (20)

Is 11ac Right for Your Network?
Is 11ac Right for Your Network?Is 11ac Right for Your Network?
Is 11ac Right for Your Network?
 
Air tight 11ac webinar series session 2 - 11ac feature deep dive - june 2014
Air tight 11ac webinar series   session 2 - 11ac feature deep dive - june 2014Air tight 11ac webinar series   session 2 - 11ac feature deep dive - june 2014
Air tight 11ac webinar series session 2 - 11ac feature deep dive - june 2014
 
Wi-Fi Offload Summit - Monetise Thyself
Wi-Fi Offload Summit - Monetise ThyselfWi-Fi Offload Summit - Monetise Thyself
Wi-Fi Offload Summit - Monetise Thyself
 
AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014
AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014
AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014
 
Restaurant Wi-Fi Primer: Retail Analytics and Social Integration
Restaurant Wi-Fi Primer: Retail Analytics and Social Integration Restaurant Wi-Fi Primer: Retail Analytics and Social Integration
Restaurant Wi-Fi Primer: Retail Analytics and Social Integration
 
AirTight Networks Evolution - Cloud & MSP
AirTight Networks Evolution - Cloud & MSPAirTight Networks Evolution - Cloud & MSP
AirTight Networks Evolution - Cloud & MSP
 
AirTight Networks WIPS at Wireless Field Day 6 WFD6
AirTight Networks WIPS at Wireless Field Day 6 WFD6AirTight Networks WIPS at Wireless Field Day 6 WFD6
AirTight Networks WIPS at Wireless Field Day 6 WFD6
 
AirTight social wifi solution brief
AirTight social wifi solution briefAirTight social wifi solution brief
AirTight social wifi solution brief
 
Considerations for a secure enterprise wlan data connectors 2013
Considerations for a secure enterprise wlan   data connectors 2013Considerations for a secure enterprise wlan   data connectors 2013
Considerations for a secure enterprise wlan data connectors 2013
 
Survey on the Impact of BYOD on Enterprise Security
Survey on the Impact of BYOD on Enterprise SecuritySurvey on the Impact of BYOD on Enterprise Security
Survey on the Impact of BYOD on Enterprise Security
 
AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...
AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...
AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...
 
Non WiFi interference combat guide 1
Non WiFi interference combat guide 1Non WiFi interference combat guide 1
Non WiFi interference combat guide 1
 
WPA2 Hole196 Vulnerability FAQs
WPA2 Hole196 Vulnerability FAQsWPA2 Hole196 Vulnerability FAQs
WPA2 Hole196 Vulnerability FAQs
 
WPA2 Hole196 Vulnerability: Exploits and Remediation Strategies
WPA2 Hole196 Vulnerability: Exploits and Remediation StrategiesWPA2 Hole196 Vulnerability: Exploits and Remediation Strategies
WPA2 Hole196 Vulnerability: Exploits and Remediation Strategies
 
Conquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the EnterpriseConquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the Enterprise
 
Windows 7 - A New Wireless Risk to the Enterprise
Windows 7 - A New Wireless Risk to the EnterpriseWindows 7 - A New Wireless Risk to the Enterprise
Windows 7 - A New Wireless Risk to the Enterprise
 
802.11w Tutorial
802.11w Tutorial802.11w Tutorial
802.11w Tutorial
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and Solutions
 
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And CountermeasuresSkyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
 
Retail Stores and Wireless Security—Recommendations
Retail Stores and Wireless Security—RecommendationsRetail Stores and Wireless Security—Recommendations
Retail Stores and Wireless Security—Recommendations
 

Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @AirTight Secure Wi-Fi and Analytics

  • 1. Secure Wi-Fi & Analytics Drive Revenue, Protect Data, & Automate PCI Compliance Dwight Agriel @AirTight Networks
  • 2. youtu.be/Ju60zZgNLJE © 2013 AirTight Networks, Inc. All rights reserved. 2
  • 3. So retailers are getting increasingly social! © 2013 AirTight Networks, Inc. All rights reserved. 3
  • 4. © 2013 AirTight Networks, Inc. All rights reserved. 4
  • 5. Distributed Wi-Fi Challenges • Large scale of operation • Geographically distributed • Security/compliance concerns • Cost sensitivity • Thin IT staff © 2013 AirTight Networks, Inc. All rights reserved. 5
  • 6. Gartner Top Predictions for 2012: Control Slips Away, Daryl Plummer, March 2012 © 2013 AirTight Networks, Inc. All rights reserved. 6
  • 7. © 2012 AirTight Networks, Inc. All rights reserved. 7
  • 8. Efficient, Controllerless, Cloud Architecture © 2013 AirTight Networks, Inc. All rights reserved. 8
  • 9. AirTight Cloud Managed Wi-Fi Devices C50 AP C10 WIPS Sensor C60 AP C55 AP © 2013 AirTight Networks, Inc. All rights reserved. 9
  • 10. AirTight C60 AP © 2013 AirTight Networks, Inc. All rights reserved. 10
  • 11. Enhance the Guest Experience © 2013 AirTight Networks, Inc. All rights reserved. 11
  • 12. Guest Analytics (Big Data) Wi-Fi Analytics for Business Intelligence Get closer to your customers! • Insight into guest behavior • Identify repeat visitors • Offer in-store promotions • Increase loyalty © 2013 AirTight Networks, Inc. All rights reserved. 12
  • 13. Eliminate the PCI Guesswork © 2013 AirTight Networks, Inc. All rights reserved. 13
  • 14. Retail Dining Hospitality © 2013 AirTight Networks, Inc. All rights reserved. 14
  • 15. Increase Customer Engagement BUSINESS DRIVERS Pinkcard customer loyalty program and mobile app Improve customer experience Increase in repeat customer visits SUCCESS FOR PINKBERRY Success of the Pinkcard program beyond expectations Swift rollout of secure Wi-Fi across 170+ stores worldwide No need to add any IT staff Built-in automated security simplified PCI compliance Exceeded 3 month adoption goal in first month! © 2013 AirTight Networks, Inc. All rights reserved. 15
  • 16. Lower Costs, Reduce IT Support Load BUSINESS DRIVERS Lower cost and reduce support burden of Wi-Fi Reliable, secure in-store Wi-Fi for guests SUCCESS FOR NOODLES “3-in-1” Wi-Fi solution delivers signification cost savings 4 person IT support team can manage 300+ restaurants Built-in wireless IPS and reporting automates PCI compliance © 2013 AirTight Networks, Inc. All rights reserved. 16
  • 17. Improve Employee Productivity BUSINESS DRIVERS Reliable, secure in-store Wi-Fi to improve employee work experience Maintain Level-1 PCI compliance SUCCESS FOR GARDEN FRESH Store managers and district officers can work from anywhere in the store Automated wireless security across 130 distributed locations Built-in wireless security and reporting simplified PCI compliance © 2013 AirTight Networks, Inc. All rights reserved. 17
  • 18. Automate PCI Compliance BUSINESS DRIVERS Maintain Level-1 PCI compliance Reduce the cost of wireless security audits across 500+ stores SUCCESS FOR VITAMIN SHOPPE Eliminated the high deployment costs of dedicated security solution Store managers installed the “plug and play” equipment Automated wireless PCI reporting across 500 distributed locations Wi-Fi platform for future applications © 2013 AirTight Networks, Inc. All rights reserved. 18
  • 19. © 2013 AirTight Networks, Inc. All rights reserved. 19
  • 20. More Information www.airtightnetworks.com www.twitter.com/AirTight http://blog.airtightnetworks.com www.youtube.com/airtightnetworks www.linkedin.com/company/airtight-networks www.facebook.com/AirTightNetworks © 2013 AirTight Networks, Inc. All rights reserved. 20
  • 21. @AirTight #Retail Motion Infographic http://www.youtube.com/watch?v=Ju60zZgNLJE&feature=youtu.be © 2012 AirTight Networks, Inc. All rights reserved. 21

Editor's Notes

  1. Arial 32 pts