SlideShare a Scribd company logo
© 2013 AirTight Networks, Inc. All rights reserved.
AirTight Networks
The Global Leader in Secure Cloud Wi-Fi
© 2013 AirTight Networks, Inc. All rights reserved. 2
2002-20032000-2001 2004-2005
Encryption
Authentication
Wireless intrusion
detection
AirTight Networks
Wireless IDS circa 2004
© 2013 AirTight Networks, Inc. All rights reserved. 3
AirTight Growth Story
2005
World’s first
WIPS - fully
automated
2008
World’s first
cloud based
WIPS &
802.11n WIPS
2007
Widely
recognized as
WIPS leader
Social Wi-Fi
and Analytics
Super-Tenant
Cloud
Wi-Fi access
and concurrent
24/7 WIPS in
one platform
2012
2006
2011
Largest cloud-
managed Wi-Fi
deployment
2010
2009
Most affordable
and efficient
wireless PCI
solution
Wireless
Intrusion
Prevention
29 patents granted
9 patents pending
2013
© 2013 AirTight Networks, Inc. All rights reserved.
Trusted by Thousands of Customers Worldwide
4
Government TransportationTelco Manufacturing Technology
HealthcareRetailServicesFinancial Hospitality
© 2013 AirTight Networks, Inc. All rights reserved.
Yum! Brands: Hungry for Wi-Fi
AirTight Wi-Fi being rolled out across 17,000+ locations
across North America
© 2013 AirTight Networks, Inc. All rights reserved.
Growing AirTight Wi-Fi Customer Base
6
© 2013 AirTight Networks, Inc. All rights reserved.
AirTight Sales/Distribution Expansion
7
Americas EMEA APAC
Access IT
Accuvant
ACR
Cadre
Fishnet
FutureCom
Insight
IPC
M&K
Presidio
Transparent Technoogy
Telus
Vandis
Verizon Business
Virtual Graffiti
…
A fast growing base of 1000+ channel partners and MSPs
Aditinet
B-Able
Comguard
Computerlinks
Data Equipment
e92Plus
Head Technology
iSecure
IT Way
Kappa Data
New Edge
Secure Data
Selcoms
Synetix
VADition
…
ASL
Bright Nexus
Dataworld
Dimension Data
Docutek
Energy One
Fortress
HPKom
Hyundai HDS
LG U-Plus
Marubeni
Muhan
mForce
NetOne
Netpolean
Observatory Crest
Quantum
Samsung S1
SKC&C
SoftBank
Synergy
Teamsun
Toshiba TTSS
uFinite
Uninet
Viet Distribution
Wavelink
…
Global MSPs: AT&T, Dell, Earthlink, Hughes, IBM, ISS, …
© 2013 AirTight Networks, Inc. All rights reserved.
AirTight Cloud – Salient Features
8
Built-in High Availability
& Fault-Tolerance
SAS70 Type II Certified
Data Centers
Drop-Ship, Plug-n-Play
Deployment
Location-based
Administration
Massively Scalable, Multi-Tenant
Elastic Cloud Architecture
Single Console
Centralized Management
© 2013 AirTight Networks, Inc. All rights reserved.
Industry’s Largest Global Cloud Footprint
9
Massively scalable, multi-tenant, fault-tolerant cloud architecture
serving over 25,000 customer sites
© 2013 AirTight Networks, Inc. All rights reserved.
Undisputed Global Leader in Wireless Security
10
Rated at the top in all six Gartner MarketScope reports on WLAN IPS
US DoD Approved
© 2013 AirTight Networks, Inc. All rights reserved.
Wireless Intrusion Prevention System (WIPS)
11
Automatic
Device Classification
Comprehensive
Threat Coverage
Reliable
Threat Prevention
Accurate
Location Tracking
BYOD
Policy Enforcement
Automated
Compliance Reporting
© 2013 AirTight Networks, Inc. All rights reserved.
AirTight Wi-Fi – Salient Features
12
High Speed 802.11n Access
with Built-in WIPS
Guest Wi-Fi with Analytics
and Social Media Integration
Intelligent Edge, Controller-
less, Fault Tolerant Architecture
Multiple SSIDs and VLANs
per AP
Content
Filtering, Firewall, QoS, BYOD
Controls per SSID
Software-Defined
Band Unlocked Radios
2.4 GHZ
5 GHZ
Wi-Fi
Wi-Fi with
background WIPS
Dedicated WIPS
© 2013 AirTight Networks, Inc. All rights reserved.
The AirTight Advantage
13
© 2013 AirTight Networks, Inc. All rights reserved.
AirTight Social Wi-Fi and Analytics
14
© 2013 AirTight Networks, Inc. All rights reserved.
Empowering Guest Wi-Fi with Social Media
15
Engage your customers and turn
them into loyal promoters
© 2013 AirTight Networks, Inc. All rights reserved.
AirTight Social Wi-Fi™ Workflow
16
1. Custom branded captive portal 2. Customers turn loyal promoters 3. Engage your customers
© 2013 AirTight Networks, Inc. All rights reserved.
AirTight Analytics for Business Intelligence
17
 Presence Analytics
• Total Foot Traffic
• Catchment Area Visitor Traffic
• Dwell Time (or Visit Duration)
 Loyalty Analytics
• Repeat Visitors
• Visit Frequency
• Visit Recency
 Engagement Analytics
• Conversion and Bounce Rates
• Social Wi-Fi Demographics
• Social Wi-Fi Visitor Logs
 Wi-Fi Usage Analytics
• Device Types
• Data Traffic
• Session Duration
 Intra-day or times of the day
 Daily, weekly, monthly trends
 Specific store or across selected stores
 Raw data (to generate custom reports)
How We Can Report
What We Can Measure
© 2013 AirTight Networks, Inc. All rights reserved.
Social Analytics for Opt-in Customers
18
© 2013 AirTight Networks, Inc. All rights reserved.
Identity Analytics for Opt-in Customers
19
© 2013 AirTight Networks, Inc. All rights reserved.
Sample Presence Analytics
20
No.ofvisitorsNo.ofvisitors
Dwell Time
Total Foot Traffic
© 2013 AirTight Networks, Inc. All rights reserved.
Sample Presence Analytics
21
!"
#!"
$!!"
$#!"
%!!"
%#!"
&"'()*+(,-./"
&01*2)!$#33#"
&45*2)!%367$"
&48*2)!!9:%7"
&4;*2)!%3<73"
&=4*2)!%:<%%"
&>?*2)!!%96:"
&@A*2)!%!<$!"
&?@*2)!%3#!3"
&?;*2)!!$:$3"
&5B*2)!%36#6"
&5C*2)!!%769"
!"#$%&'()'*%+,-%.'
/( -01( 234 ,.%'5 ,36,'7.%&.'899': ; &'<='3'9>': ; &'<=?'
6( D ","$$( D "
$$( D ","$ED "
$ED ",": ED "
: ED ","6ED "
6ED ","$$ED "
$$ED ","6( D "
! "
#! "
$! ! "
$#! "
%! ! "
%#! "
!"#$%&'()'*%+,-%.'
/( -01( 234 ,.%'5 ,36,'7 .%&.'899': ; &'<='3'9>': ; &'<=?'
&5B*2)!%36#6"
&5C*2)!!%769"
/( -01( 234 ,.%'5 ,36,'7 .%&.'899': ; &'<='3'9>': ; &'<=?'
6( D ","$$( D "
$$( D ","$ED "
$ED ",": ED "
: ED ","6ED "
6ED ","$$ED "
$$ED ","6( D "
Unique Visitors by Location
Distribution of No. of Visits
© 2013 AirTight Networks, Inc. All rights reserved.
AirTight APs/Sensors
22
AT-C10
DoD approved WIPS Sensor
 Common Criteria
 FIPS 140-2
 DISA APL
AT-C55
Dual band dual radio 2x2
 AP + background scanning
 Dedicated WIPS sensor
AT-C50
Dual band single radio 2x3
 AP + background scanning
 Dedicated WIPS sensor
AT-C60
Dual band dual radio 3x3
 AP + background scanning
 Dedicated WIPS sensor
 Concurrent AP + Dedicated
WIPS
© 2013 AirTight Networks, Inc. All rights reserved.
AT-C60: Industry’s Most Flexible Wi-Fi Platform
23
 Software-defined, band-unlocked radios
– an industry first
 Concurrent Wi-Fi access and 24/7 WIPS
– an industry first
© 2013 AirTight Networks, Inc. All rights reserved.
AirTight Deployment Choices
24
Public Cloud
Private Cloud
VMware
Appliance
 Zero Capex
 Bundled
 Capex
Deployment Pricing
No feature based licensing!
No user based licensing!
AT-C10 AT-C50
AT-C60
Platforms
AT-C55
© 2013 AirTight Networks, Inc. All rights reserved.
Thank You!
25
Cloud Managed Secure Wi-Fi Solutions
www.airtightnetworks.com
info@airtightnetworks.com
@AirTight
+1 877 424 7844

More Related Content

What's hot

Internet of everything
Internet of everything Internet of everything
Internet of everything
Jayesh Pai
 
Xirrus - The Best Wi-Fi on the Planet
Xirrus - The Best Wi-Fi on the PlanetXirrus - The Best Wi-Fi on the Planet
Xirrus - The Best Wi-Fi on the Planet
Xirrus
 
Cisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance ÜrünleriCisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance Ürünleri
cem lale
 
Звиад Кардава. Интернет вещей - модное слово или реальность? РИФ-Воронеж 2016
Звиад Кардава. Интернет вещей - модное слово или реальность? РИФ-Воронеж 2016Звиад Кардава. Интернет вещей - модное слово или реальность? РИФ-Воронеж 2016
Звиад Кардава. Интернет вещей - модное слово или реальность? РИФ-Воронеж 2016
РИФ-Воронеж
 
BYOD Transforming the Enterprise
BYOD Transforming the EnterpriseBYOD Transforming the Enterprise
BYOD Transforming the Enterprise
Cisco Canada
 
Enterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without CompromiseEnterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without Compromise
Robb Boyd
 
AirTight Networks Evolution - Cloud & MSP
AirTight Networks Evolution - Cloud & MSPAirTight Networks Evolution - Cloud & MSP
AirTight Networks Evolution - Cloud & MSP
AirTight Networks
 
Beginners: Fixed Wireless Access (FWA)
Beginners: Fixed Wireless Access (FWA)Beginners: Fixed Wireless Access (FWA)
Beginners: Fixed Wireless Access (FWA)
3G4G
 
6G Training Course Part 3: 6G Use Cases & Applications
6G Training Course Part 3: 6G Use Cases & Applications6G Training Course Part 3: 6G Use Cases & Applications
6G Training Course Part 3: 6G Use Cases & Applications
3G4G
 
Conférence ARBOR ACSS 2018
Conférence ARBOR ACSS 2018Conférence ARBOR ACSS 2018
Conférence ARBOR ACSS 2018
African Cyber Security Summit
 
Securing Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
Securing Smart Cities with Blockchain-enabled Zero Trust CybersecuitySecuring Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
Securing Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
Block Armour
 
Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...
Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...
Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...
Xirrus
 
Cisco connect winnipeg 2018 introducing the network intuitive
Cisco connect winnipeg 2018   introducing the network intuitiveCisco connect winnipeg 2018   introducing the network intuitive
Cisco connect winnipeg 2018 introducing the network intuitive
Cisco Canada
 
Mavenir: Evolution of Real-Time Machine Learning (RRML) in Core Network Secur...
Mavenir: Evolution of Real-Time Machine Learning (RRML) in Core Network Secur...Mavenir: Evolution of Real-Time Machine Learning (RRML) in Core Network Secur...
Mavenir: Evolution of Real-Time Machine Learning (RRML) in Core Network Secur...
Mavenir
 
Open source IoT
Open source IoTOpen source IoT
Open source IoT
IoT613
 
Opinion: Would 5G NSA undergo Sunset?
Opinion: Would 5G NSA undergo Sunset?Opinion: Would 5G NSA undergo Sunset?
Opinion: Would 5G NSA undergo Sunset?
3G4G
 
Prakash Padariya - IoT Cyber Warfare
Prakash Padariya - IoT Cyber WarfarePrakash Padariya - IoT Cyber Warfare
Prakash Padariya - IoT Cyber Warfare
PrakashPadariya1
 
Air Tight Airport Wi Fi Scan Analysis
Air Tight Airport Wi Fi Scan AnalysisAir Tight Airport Wi Fi Scan Analysis
Air Tight Airport Wi Fi Scan Analysis
AirTight Networks
 
Safety reliability and security lessons from defense for IoT
Safety reliability and security lessons from defense for IoTSafety reliability and security lessons from defense for IoT
Safety reliability and security lessons from defense for IoT
IoT613
 
Decoding the IoT Ecosystem
Decoding the IoT EcosystemDecoding the IoT Ecosystem
Decoding the IoT Ecosystem
Marc Nader
 

What's hot (20)

Internet of everything
Internet of everything Internet of everything
Internet of everything
 
Xirrus - The Best Wi-Fi on the Planet
Xirrus - The Best Wi-Fi on the PlanetXirrus - The Best Wi-Fi on the Planet
Xirrus - The Best Wi-Fi on the Planet
 
Cisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance ÜrünleriCisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance Ürünleri
 
Звиад Кардава. Интернет вещей - модное слово или реальность? РИФ-Воронеж 2016
Звиад Кардава. Интернет вещей - модное слово или реальность? РИФ-Воронеж 2016Звиад Кардава. Интернет вещей - модное слово или реальность? РИФ-Воронеж 2016
Звиад Кардава. Интернет вещей - модное слово или реальность? РИФ-Воронеж 2016
 
BYOD Transforming the Enterprise
BYOD Transforming the EnterpriseBYOD Transforming the Enterprise
BYOD Transforming the Enterprise
 
Enterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without CompromiseEnterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without Compromise
 
AirTight Networks Evolution - Cloud & MSP
AirTight Networks Evolution - Cloud & MSPAirTight Networks Evolution - Cloud & MSP
AirTight Networks Evolution - Cloud & MSP
 
Beginners: Fixed Wireless Access (FWA)
Beginners: Fixed Wireless Access (FWA)Beginners: Fixed Wireless Access (FWA)
Beginners: Fixed Wireless Access (FWA)
 
6G Training Course Part 3: 6G Use Cases & Applications
6G Training Course Part 3: 6G Use Cases & Applications6G Training Course Part 3: 6G Use Cases & Applications
6G Training Course Part 3: 6G Use Cases & Applications
 
Conférence ARBOR ACSS 2018
Conférence ARBOR ACSS 2018Conférence ARBOR ACSS 2018
Conférence ARBOR ACSS 2018
 
Securing Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
Securing Smart Cities with Blockchain-enabled Zero Trust CybersecuitySecuring Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
Securing Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
 
Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...
Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...
Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...
 
Cisco connect winnipeg 2018 introducing the network intuitive
Cisco connect winnipeg 2018   introducing the network intuitiveCisco connect winnipeg 2018   introducing the network intuitive
Cisco connect winnipeg 2018 introducing the network intuitive
 
Mavenir: Evolution of Real-Time Machine Learning (RRML) in Core Network Secur...
Mavenir: Evolution of Real-Time Machine Learning (RRML) in Core Network Secur...Mavenir: Evolution of Real-Time Machine Learning (RRML) in Core Network Secur...
Mavenir: Evolution of Real-Time Machine Learning (RRML) in Core Network Secur...
 
Open source IoT
Open source IoTOpen source IoT
Open source IoT
 
Opinion: Would 5G NSA undergo Sunset?
Opinion: Would 5G NSA undergo Sunset?Opinion: Would 5G NSA undergo Sunset?
Opinion: Would 5G NSA undergo Sunset?
 
Prakash Padariya - IoT Cyber Warfare
Prakash Padariya - IoT Cyber WarfarePrakash Padariya - IoT Cyber Warfare
Prakash Padariya - IoT Cyber Warfare
 
Air Tight Airport Wi Fi Scan Analysis
Air Tight Airport Wi Fi Scan AnalysisAir Tight Airport Wi Fi Scan Analysis
Air Tight Airport Wi Fi Scan Analysis
 
Safety reliability and security lessons from defense for IoT
Safety reliability and security lessons from defense for IoTSafety reliability and security lessons from defense for IoT
Safety reliability and security lessons from defense for IoT
 
Decoding the IoT Ecosystem
Decoding the IoT EcosystemDecoding the IoT Ecosystem
Decoding the IoT Ecosystem
 

Similar to AirTight Corporate Presentation _ July2013

Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
AirTight Networks
 
Top 5 wi fi security threats
Top 5 wi fi security threatsTop 5 wi fi security threats
Top 5 wi fi security threatsgruzabb
 
Appi fi
Appi fiAppi fi
1. How will the IoT help your business - cisco
1. How will the IoT help your business - cisco1. How will the IoT help your business - cisco
1. How will the IoT help your business - cisco
MITEF México
 
Securing the edge with AWS IoT services - FND330 - AWS re:Inforce 2019
Securing the edge with AWS IoT services - FND330 - AWS re:Inforce 2019 Securing the edge with AWS IoT services - FND330 - AWS re:Inforce 2019
Securing the edge with AWS IoT services - FND330 - AWS re:Inforce 2019
Amazon Web Services
 
Lorna Slott ATT new frontier
Lorna Slott ATT new frontierLorna Slott ATT new frontier
Lorna Slott ATT new frontier
Sharpe_Smith
 
Did Your Wi-Fi Performance Expire Before the Warranty Did? | Steps to Providi...
Did Your Wi-Fi Performance Expire Before the Warranty Did? | Steps to Providi...Did Your Wi-Fi Performance Expire Before the Warranty Did? | Steps to Providi...
Did Your Wi-Fi Performance Expire Before the Warranty Did? | Steps to Providi...
Xirrus
 
Cloud managed secure wi fi
Cloud managed secure wi fiCloud managed secure wi fi
Cloud managed secure wi figruzabb
 
Internet of Cars, Andreas Mai, Cisco Systems
Internet of Cars, Andreas Mai, Cisco SystemsInternet of Cars, Andreas Mai, Cisco Systems
Internet of Cars, Andreas Mai, Cisco Systems
Andreas Mai
 
Snowflake Data Science and AI/ML at Scale
Snowflake Data Science and AI/ML at ScaleSnowflake Data Science and AI/ML at Scale
Snowflake Data Science and AI/ML at Scale
Adam Doyle
 
Firewall Webinar
Firewall WebinarFirewall Webinar
Firewall Webinar
AT&T
 
What is ThousandEyes Webinar
What is ThousandEyes WebinarWhat is ThousandEyes Webinar
What is ThousandEyes Webinar
ThousandEyes
 
802.11ac 5th gen_channel_presentation
802.11ac 5th gen_channel_presentation802.11ac 5th gen_channel_presentation
802.11ac 5th gen_channel_presentation
Advantec Distribution
 
Introducing MSite Mobile for Lenel (Feb14)
Introducing MSite Mobile for Lenel (Feb14)Introducing MSite Mobile for Lenel (Feb14)
Introducing MSite Mobile for Lenel (Feb14)
Human Recognition Systems
 
Next gen 80211ac_overview
Next gen 80211ac_overviewNext gen 80211ac_overview
Next gen 80211ac_overview
Advantec Distribution
 
Leadership Session: AWS IoT (IOT218-L) - AWS re:Invent 2018
Leadership Session: AWS IoT (IOT218-L) - AWS re:Invent 2018Leadership Session: AWS IoT (IOT218-L) - AWS re:Invent 2018
Leadership Session: AWS IoT (IOT218-L) - AWS re:Invent 2018
Amazon Web Services
 
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security FrameworkThe Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
Real-Time Innovations (RTI)
 
Top 5 predictions webinar
Top 5 predictions webinarTop 5 predictions webinar
Top 5 predictions webinar
Zscaler
 
The Four Horsemen of Mobile Security
The Four Horsemen of Mobile SecurityThe Four Horsemen of Mobile Security
The Four Horsemen of Mobile Security
Skycure
 

Similar to AirTight Corporate Presentation _ July2013 (20)

Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
 
Top 5 wi fi security threats
Top 5 wi fi security threatsTop 5 wi fi security threats
Top 5 wi fi security threats
 
Appi fi
Appi fiAppi fi
Appi fi
 
1. How will the IoT help your business - cisco
1. How will the IoT help your business - cisco1. How will the IoT help your business - cisco
1. How will the IoT help your business - cisco
 
Securing the edge with AWS IoT services - FND330 - AWS re:Inforce 2019
Securing the edge with AWS IoT services - FND330 - AWS re:Inforce 2019 Securing the edge with AWS IoT services - FND330 - AWS re:Inforce 2019
Securing the edge with AWS IoT services - FND330 - AWS re:Inforce 2019
 
Lorna Slott ATT new frontier
Lorna Slott ATT new frontierLorna Slott ATT new frontier
Lorna Slott ATT new frontier
 
Did Your Wi-Fi Performance Expire Before the Warranty Did? | Steps to Providi...
Did Your Wi-Fi Performance Expire Before the Warranty Did? | Steps to Providi...Did Your Wi-Fi Performance Expire Before the Warranty Did? | Steps to Providi...
Did Your Wi-Fi Performance Expire Before the Warranty Did? | Steps to Providi...
 
Cloud managed secure wi fi
Cloud managed secure wi fiCloud managed secure wi fi
Cloud managed secure wi fi
 
Internet of Cars, Andreas Mai, Cisco Systems
Internet of Cars, Andreas Mai, Cisco SystemsInternet of Cars, Andreas Mai, Cisco Systems
Internet of Cars, Andreas Mai, Cisco Systems
 
Snowflake Data Science and AI/ML at Scale
Snowflake Data Science and AI/ML at ScaleSnowflake Data Science and AI/ML at Scale
Snowflake Data Science and AI/ML at Scale
 
Firewall Webinar
Firewall WebinarFirewall Webinar
Firewall Webinar
 
What is ThousandEyes Webinar
What is ThousandEyes WebinarWhat is ThousandEyes Webinar
What is ThousandEyes Webinar
 
802.11ac 5th gen_channel_presentation
802.11ac 5th gen_channel_presentation802.11ac 5th gen_channel_presentation
802.11ac 5th gen_channel_presentation
 
Introducing MSite Mobile for Lenel (Feb14)
Introducing MSite Mobile for Lenel (Feb14)Introducing MSite Mobile for Lenel (Feb14)
Introducing MSite Mobile for Lenel (Feb14)
 
Next gen 80211ac_overview
Next gen 80211ac_overviewNext gen 80211ac_overview
Next gen 80211ac_overview
 
AirTight Networks - Wireless Security 2011
AirTight Networks - Wireless Security 2011AirTight Networks - Wireless Security 2011
AirTight Networks - Wireless Security 2011
 
Leadership Session: AWS IoT (IOT218-L) - AWS re:Invent 2018
Leadership Session: AWS IoT (IOT218-L) - AWS re:Invent 2018Leadership Session: AWS IoT (IOT218-L) - AWS re:Invent 2018
Leadership Session: AWS IoT (IOT218-L) - AWS re:Invent 2018
 
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security FrameworkThe Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
 
Top 5 predictions webinar
Top 5 predictions webinarTop 5 predictions webinar
Top 5 predictions webinar
 
The Four Horsemen of Mobile Security
The Four Horsemen of Mobile SecurityThe Four Horsemen of Mobile Security
The Four Horsemen of Mobile Security
 

Recently uploaded

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 

Recently uploaded (20)

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 

AirTight Corporate Presentation _ July2013

  • 1. © 2013 AirTight Networks, Inc. All rights reserved. AirTight Networks The Global Leader in Secure Cloud Wi-Fi
  • 2. © 2013 AirTight Networks, Inc. All rights reserved. 2 2002-20032000-2001 2004-2005 Encryption Authentication Wireless intrusion detection AirTight Networks Wireless IDS circa 2004
  • 3. © 2013 AirTight Networks, Inc. All rights reserved. 3 AirTight Growth Story 2005 World’s first WIPS - fully automated 2008 World’s first cloud based WIPS & 802.11n WIPS 2007 Widely recognized as WIPS leader Social Wi-Fi and Analytics Super-Tenant Cloud Wi-Fi access and concurrent 24/7 WIPS in one platform 2012 2006 2011 Largest cloud- managed Wi-Fi deployment 2010 2009 Most affordable and efficient wireless PCI solution Wireless Intrusion Prevention 29 patents granted 9 patents pending 2013
  • 4. © 2013 AirTight Networks, Inc. All rights reserved. Trusted by Thousands of Customers Worldwide 4 Government TransportationTelco Manufacturing Technology HealthcareRetailServicesFinancial Hospitality
  • 5. © 2013 AirTight Networks, Inc. All rights reserved. Yum! Brands: Hungry for Wi-Fi AirTight Wi-Fi being rolled out across 17,000+ locations across North America
  • 6. © 2013 AirTight Networks, Inc. All rights reserved. Growing AirTight Wi-Fi Customer Base 6
  • 7. © 2013 AirTight Networks, Inc. All rights reserved. AirTight Sales/Distribution Expansion 7 Americas EMEA APAC Access IT Accuvant ACR Cadre Fishnet FutureCom Insight IPC M&K Presidio Transparent Technoogy Telus Vandis Verizon Business Virtual Graffiti … A fast growing base of 1000+ channel partners and MSPs Aditinet B-Able Comguard Computerlinks Data Equipment e92Plus Head Technology iSecure IT Way Kappa Data New Edge Secure Data Selcoms Synetix VADition … ASL Bright Nexus Dataworld Dimension Data Docutek Energy One Fortress HPKom Hyundai HDS LG U-Plus Marubeni Muhan mForce NetOne Netpolean Observatory Crest Quantum Samsung S1 SKC&C SoftBank Synergy Teamsun Toshiba TTSS uFinite Uninet Viet Distribution Wavelink … Global MSPs: AT&T, Dell, Earthlink, Hughes, IBM, ISS, …
  • 8. © 2013 AirTight Networks, Inc. All rights reserved. AirTight Cloud – Salient Features 8 Built-in High Availability & Fault-Tolerance SAS70 Type II Certified Data Centers Drop-Ship, Plug-n-Play Deployment Location-based Administration Massively Scalable, Multi-Tenant Elastic Cloud Architecture Single Console Centralized Management
  • 9. © 2013 AirTight Networks, Inc. All rights reserved. Industry’s Largest Global Cloud Footprint 9 Massively scalable, multi-tenant, fault-tolerant cloud architecture serving over 25,000 customer sites
  • 10. © 2013 AirTight Networks, Inc. All rights reserved. Undisputed Global Leader in Wireless Security 10 Rated at the top in all six Gartner MarketScope reports on WLAN IPS US DoD Approved
  • 11. © 2013 AirTight Networks, Inc. All rights reserved. Wireless Intrusion Prevention System (WIPS) 11 Automatic Device Classification Comprehensive Threat Coverage Reliable Threat Prevention Accurate Location Tracking BYOD Policy Enforcement Automated Compliance Reporting
  • 12. © 2013 AirTight Networks, Inc. All rights reserved. AirTight Wi-Fi – Salient Features 12 High Speed 802.11n Access with Built-in WIPS Guest Wi-Fi with Analytics and Social Media Integration Intelligent Edge, Controller- less, Fault Tolerant Architecture Multiple SSIDs and VLANs per AP Content Filtering, Firewall, QoS, BYOD Controls per SSID Software-Defined Band Unlocked Radios 2.4 GHZ 5 GHZ Wi-Fi Wi-Fi with background WIPS Dedicated WIPS
  • 13. © 2013 AirTight Networks, Inc. All rights reserved. The AirTight Advantage 13
  • 14. © 2013 AirTight Networks, Inc. All rights reserved. AirTight Social Wi-Fi and Analytics 14
  • 15. © 2013 AirTight Networks, Inc. All rights reserved. Empowering Guest Wi-Fi with Social Media 15 Engage your customers and turn them into loyal promoters
  • 16. © 2013 AirTight Networks, Inc. All rights reserved. AirTight Social Wi-Fi™ Workflow 16 1. Custom branded captive portal 2. Customers turn loyal promoters 3. Engage your customers
  • 17. © 2013 AirTight Networks, Inc. All rights reserved. AirTight Analytics for Business Intelligence 17  Presence Analytics • Total Foot Traffic • Catchment Area Visitor Traffic • Dwell Time (or Visit Duration)  Loyalty Analytics • Repeat Visitors • Visit Frequency • Visit Recency  Engagement Analytics • Conversion and Bounce Rates • Social Wi-Fi Demographics • Social Wi-Fi Visitor Logs  Wi-Fi Usage Analytics • Device Types • Data Traffic • Session Duration  Intra-day or times of the day  Daily, weekly, monthly trends  Specific store or across selected stores  Raw data (to generate custom reports) How We Can Report What We Can Measure
  • 18. © 2013 AirTight Networks, Inc. All rights reserved. Social Analytics for Opt-in Customers 18
  • 19. © 2013 AirTight Networks, Inc. All rights reserved. Identity Analytics for Opt-in Customers 19
  • 20. © 2013 AirTight Networks, Inc. All rights reserved. Sample Presence Analytics 20 No.ofvisitorsNo.ofvisitors Dwell Time Total Foot Traffic
  • 21. © 2013 AirTight Networks, Inc. All rights reserved. Sample Presence Analytics 21 !" #!" $!!" $#!" %!!" %#!" &"'()*+(,-./" &01*2)!$#33#" &45*2)!%367$" &48*2)!!9:%7" &4;*2)!%3<73" &=4*2)!%:<%%" &>?*2)!!%96:" &@A*2)!%!<$!" &?@*2)!%3#!3" &?;*2)!!$:$3" &5B*2)!%36#6" &5C*2)!!%769" !"#$%&'()'*%+,-%.' /( -01( 234 ,.%'5 ,36,'7.%&.'899': ; &'<='3'9>': ; &'<=?' 6( D ","$$( D " $$( D ","$ED " $ED ",": ED " : ED ","6ED " 6ED ","$$ED " $$ED ","6( D " ! " #! " $! ! " $#! " %! ! " %#! " !"#$%&'()'*%+,-%.' /( -01( 234 ,.%'5 ,36,'7 .%&.'899': ; &'<='3'9>': ; &'<=?' &5B*2)!%36#6" &5C*2)!!%769" /( -01( 234 ,.%'5 ,36,'7 .%&.'899': ; &'<='3'9>': ; &'<=?' 6( D ","$$( D " $$( D ","$ED " $ED ",": ED " : ED ","6ED " 6ED ","$$ED " $$ED ","6( D " Unique Visitors by Location Distribution of No. of Visits
  • 22. © 2013 AirTight Networks, Inc. All rights reserved. AirTight APs/Sensors 22 AT-C10 DoD approved WIPS Sensor  Common Criteria  FIPS 140-2  DISA APL AT-C55 Dual band dual radio 2x2  AP + background scanning  Dedicated WIPS sensor AT-C50 Dual band single radio 2x3  AP + background scanning  Dedicated WIPS sensor AT-C60 Dual band dual radio 3x3  AP + background scanning  Dedicated WIPS sensor  Concurrent AP + Dedicated WIPS
  • 23. © 2013 AirTight Networks, Inc. All rights reserved. AT-C60: Industry’s Most Flexible Wi-Fi Platform 23  Software-defined, band-unlocked radios – an industry first  Concurrent Wi-Fi access and 24/7 WIPS – an industry first
  • 24. © 2013 AirTight Networks, Inc. All rights reserved. AirTight Deployment Choices 24 Public Cloud Private Cloud VMware Appliance  Zero Capex  Bundled  Capex Deployment Pricing No feature based licensing! No user based licensing! AT-C10 AT-C50 AT-C60 Platforms AT-C55
  • 25. © 2013 AirTight Networks, Inc. All rights reserved. Thank You! 25 Cloud Managed Secure Wi-Fi Solutions www.airtightnetworks.com info@airtightnetworks.com @AirTight +1 877 424 7844