SlideShare a Scribd company logo
The New Economics of Wi-Fi 
Wireless Broadband Alliance 
David King, CEO of AirTight Networks 
© 2014 AirTight Networks, Inc. All rights reserved. 1 
@AirTight
Find this presentation on SlideShare 
www.slideshare.net/airtight 
Get the link from 
@AirTight on Twitter
What’s Driving the Adoption Curve? 
© 2014 AirTight Networks, Inc. All rights reserved. 3
What’s Driving the Adoption Curve? 
• Plug ‘n Play 
experience 
• More data! 
• Privacy and 
security 
• Context – based 
services 
• High performance 
• Availability & 
reliability 
• Accelerate time to 
market 
• Reduce onboarding 
costs 
• Increase customer 
stickiness 
© 2014 AirTight Networks, Inc. All rights reserved. 4 
Technology 
Drivers 
• Cloud Wi-Fi 
• Hotspot 2.0 
• 802.11ac 
• Internet of 
Things 
Customer 
Expectations 
Service Provider 
Needs
Carrier Grade Secure Cloud Wi-Fi 
© 2014 AirTight Networks, Inc. All rights reserved. 5
Carrier Grade Secure Cloud Wi-Fi 
• Economies of scale 
• fully virtualized, controller-less cloud architecture 
• centralized management of thousands of APs 
• multi-tenancy and server clustering 
• Carrier grade availability & reliability 
• Drop-ship “ready” - rapid provisioning & low cost 
© 2014 AirTight Networks, Inc. All rights reserved. 6 
installation 
• NFV based management of APs
Carrier Grade Secure Cloud Wi-Fi 
• Economies of scale 
• fully virtualized, controller-less cloud architecture 
• centralized management of thousands of APs 
• multi-tenancy and server clustering 
• Carrier grade availability & reliability 
• Drop-ship “ready” - rapid provisioning & low cost 
© 2014 AirTight Networks, Inc. All rights reserved. 7 
installation 
• NFV based management of APs
Carrier-Grade Cloud Architecture 
Fault Fault Tolerance, Tolerance HA and Disaster Data Replication 
Recovery 
Guest Manager & 
Analytics Engine 
Compute & memory on VMware 
ESXi hypervisor + disc in EMC 
SAN 
“Super-tenant” 
Manager Instances 
“Multi-tenant “ 
Manager Instances 
Provisioning Resilient Service Discovery Layer 
© 2014 AirTight Networks, Inc. All rights reserved. 8 
Grafts 
Database Cluster 
Web 
Server 
s 
……… 
Analytics 
App
Monetization Thyself! 
If you don’t do it, who will?| 
Google Search I’m Feeling Lucky 
© 2014 AirTight Networks, Inc. All rights reserved. 9
Monetization Thyself! 
If you don’t do it, who will?| 
Amazon 
Apple 
Facebook 
Google 
Microsoft 
Netflix 
Yahoo! 
… 
Google Search I’m Feeling Lucky 
© 2014 AirTight Networks, Inc. All rights reserved. 10 
© 2014 AirTight Networks, Inc. All rights reserved.
Analytics for Business Intelligence 
 Intra-day or times of the day 
 Daily, weekly, monthly trends 
 Specific store or across selected stores 
 Raw data (to generate custom reports) 
What We Can Measure 
How We Can Report it 
© 2014 AirTight Networks, Inc. All rights reserved. 11 
Presence 
• Total Foot Traffic 
• Catchment Area 
Visitor Traffic 
• Dwell Time 
(or Visit Duration) 
Loyalty 
• Repeat Visitors 
• Visit Frequency 
• Visit Recency 
Engagement 
• Conversion and 
Bounce Rates 
• Social Wi-Fi 
Demographics 
• Social Wi-Fi Visitor 
Logs 
Wi-Fi Usage 
• Device Types 
• Data Traffic 
• Sesssion Duration
Security Problems Will Be More Pervasive! 
© 2014 AirTight Networks, Inc. All rights reserved. 12
Security Problems Will Be More Pervasive! 
© 2014 AirTight Networks, Inc. All rights reserved. 13
Security Problems Will Be More Pervasive! 
© 2014 AirTight Networks, Inc. All rights reserved. 14
Security Problems Will Be More Pervasive! 
© 2014 AirTight Networks, Inc. All rights reserved. 15
Wireless Intrusion Prevention System 
(WIPS) 
© 2014 AirTight Networks, Inc. All rights reserved. 16 
Automatic 
Device Classification 
No signatures required 
Reliable 
Threat Prevention 
Reliable 
Threat Prevention 
Accurate 
Location Tracking 
BYOD 
Policy Enforcement 
Automated 
Compliance Reporting 
IoT Ready
Wireless Intrusion Prevention System 
(WIPS) 
© 2014 AirTight Networks, Inc. All rights reserved. 17 
Automatic 
Device Classification 
No signatures required 
Reliable 
Threat Prevention 
Reliable 
Threat Prevention 
Accurate 
Location Tracking 
BYOD 
Policy Enforcement 
Automated 
Compliance Reporting 
IoT Ready
http://blog.airtightnetworks.com/ 
© 2014 AirTight Networks, Inc. All rights reserved. 18
http://www.slideshare.net/airtight 
© 2014 AirTight Networks, Inc. All rights reserved. 19
The New Economics of Wi-Fi 
Strong User Experience = Increased Customer Traction 
© 2014 AirTight Networks, Inc. All rights reserved. 20
The New Economics of Wi-Fi 
Strong User Experience = Increased Customer Traction 
Deployment 
• Rapid time-to-deployment 
• Economies of scale 
• Flexible business models 
• Custom branded guest Wi-Fi 
• Rich analytics & API for billing/management 
© 2014 AirTight Networks, Inc. All rights reserved. 21
The New Economics of Wi-Fi 
Strong User Experience = Increased Customer Traction 
Deployment 
• Rapid time-to-deployment 
• Economies of scale 
• Flexible business models 
• Custom branded guest Wi-Fi 
• Rich analytics & API for billing/management 
Trust 
• Out-of-the-box defense 
• Security compliance 
• Privacy protection 
• Rapid threat response 
© 2014 AirTight Networks, Inc. All rights reserved. 22
The New Economics of Wi-Fi 
Strong User Experience = Increased Customer Traction 
Deployment 
• Rapid time-to-deployment 
• Economies of scale 
• Flexible business models 
• Custom branded guest Wi-Fi 
• Rich analytics & API for billing/management 
Trust 
• Out-of-the-box defense 
• Security compliance 
• Privacy protection 
• Rapid threat response 
Engagement 
• Social Wi-Fi 
• Rich visitor analytics 
• High value offers 
• Context driven services 
© 2014 AirTight Networks, Inc. All rights reserved. 23
The New Economics of Wi-Fi 
Strong User Experience = Increased Customer Traction 
Deployment 
• Rapid time-to-deployment 
• Economies of scale 
• Flexible business models 
• Custom branded guest Wi-Fi 
• Rich analytics & API for billing/management 
Trust 
• Out-of-the-box defense 
• Security compliance 
• Privacy protection 
• Rapid threat response 
Trusted Relevant Experiences Engagement 
• Social Wi-Fi 
• Rich visitor analytics 
• High value offers 
• Context driven services 
© 2014 AirTight Networks, Inc. All rights reserved. 24
© 2014 AirTight Networks, Inc. All rights reserved. 25 
© 2014 AirTight Networks, Inc. All rights reserved. 
Thank You! 
www.airtightnetworks.com 
blog.airtightnetworks.com 
@AirTight 
www.slideshare.net/airtight

More Related Content

What's hot

How to Enhance Your Application Security Strategy with F5 on AWS
 How to Enhance Your Application Security Strategy with F5 on AWS How to Enhance Your Application Security Strategy with F5 on AWS
How to Enhance Your Application Security Strategy with F5 on AWSAmazon Web Services
 
Cisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMXCisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMXNetworkCollaborators
 
Cisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernellCisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernellNetworkCollaborators
 
Cisco Connect 2018 Indonesia - Cisco HyperFlex
Cisco Connect 2018 Indonesia - Cisco HyperFlexCisco Connect 2018 Indonesia - Cisco HyperFlex
Cisco Connect 2018 Indonesia - Cisco HyperFlexNetworkCollaborators
 
Why Your Customers Care About Compliance and You Should Too
Why Your Customers Care About Compliance and You Should TooWhy Your Customers Care About Compliance and You Should Too
Why Your Customers Care About Compliance and You Should TooAmazon Web Services
 
Cisco Connect 2018 Singapore - delivering intent for data center networking
Cisco Connect 2018 Singapore -   delivering intent for data center networkingCisco Connect 2018 Singapore -   delivering intent for data center networking
Cisco Connect 2018 Singapore - delivering intent for data center networkingNetworkCollaborators
 
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud WorldCisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud WorldNetworkCollaborators
 
Cisco Connect 2018 Singapore - Cisco Software Defined Access
Cisco Connect 2018 Singapore - Cisco Software Defined AccessCisco Connect 2018 Singapore - Cisco Software Defined Access
Cisco Connect 2018 Singapore - Cisco Software Defined AccessNetworkCollaborators
 
ThousandEyes Webinar - Clash of the Clouds
ThousandEyes Webinar - Clash of the CloudsThousandEyes Webinar - Clash of the Clouds
ThousandEyes Webinar - Clash of the CloudsThousandEyes
 
Be a Virtual Mobile Network for your M2M/IoT Devices, Martin Giess, EMnify
Be a Virtual Mobile Network for your M2M/IoT Devices, Martin Giess, EMnifyBe a Virtual Mobile Network for your M2M/IoT Devices, Martin Giess, EMnify
Be a Virtual Mobile Network for your M2M/IoT Devices, Martin Giess, EMnifyAlan Quayle
 
How Schneider Electric Assures Its Salesforce Lightning Migration with Thousa...
How Schneider Electric Assures Its Salesforce Lightning Migration with Thousa...How Schneider Electric Assures Its Salesforce Lightning Migration with Thousa...
How Schneider Electric Assures Its Salesforce Lightning Migration with Thousa...ThousandEyes
 
Cisco Connect 2018 Indonesia - Cisco cmx
Cisco Connect 2018 Indonesia - Cisco cmx Cisco Connect 2018 Indonesia - Cisco cmx
Cisco Connect 2018 Indonesia - Cisco cmx NetworkCollaborators
 
Squareway, a Secure Private 3G Network, Cyrille Manente, Vivaction
Squareway, a Secure Private 3G Network, Cyrille Manente, VivactionSquareway, a Secure Private 3G Network, Cyrille Manente, Vivaction
Squareway, a Secure Private 3G Network, Cyrille Manente, VivactionAlan Quayle
 
Big Data Intelligence - Or Katz, Akamai and Tsvika Klein, Akamai
Big Data Intelligence - Or Katz, Akamai and Tsvika Klein, AkamaiBig Data Intelligence - Or Katz, Akamai and Tsvika Klein, Akamai
Big Data Intelligence - Or Katz, Akamai and Tsvika Klein, AkamaiAkamai Technologies
 
Identiverse 2018 - Using Identity to Restore Freedom
Identiverse 2018 - Using Identity to Restore FreedomIdentiverse 2018 - Using Identity to Restore Freedom
Identiverse 2018 - Using Identity to Restore FreedomMatt Topper
 
Cisco at v mword 2015
Cisco at v mword 2015Cisco at v mword 2015
Cisco at v mword 2015ldangelo0772
 
Seven Criteria for Building an AWS Global Transit Network
Seven Criteria for Building an AWS Global Transit NetworkSeven Criteria for Building an AWS Global Transit Network
Seven Criteria for Building an AWS Global Transit NetworkKhash Nakhostin
 
AWS Summit Singapore - Best Practices for Cloud Security in the Cloud Adoptio...
AWS Summit Singapore - Best Practices for Cloud Security in the Cloud Adoptio...AWS Summit Singapore - Best Practices for Cloud Security in the Cloud Adoptio...
AWS Summit Singapore - Best Practices for Cloud Security in the Cloud Adoptio...Amazon Web Services
 
ThousandEyes Webinar: How to see and resolve office 365 performance challenges
ThousandEyes Webinar: How to see and resolve office 365 performance challengesThousandEyes Webinar: How to see and resolve office 365 performance challenges
ThousandEyes Webinar: How to see and resolve office 365 performance challengesThousandEyes
 

What's hot (20)

How to Enhance Your Application Security Strategy with F5 on AWS
 How to Enhance Your Application Security Strategy with F5 on AWS How to Enhance Your Application Security Strategy with F5 on AWS
How to Enhance Your Application Security Strategy with F5 on AWS
 
Cisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMXCisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMX
 
Cisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernellCisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernell
 
Cisco Connect 2018 Indonesia - Cisco HyperFlex
Cisco Connect 2018 Indonesia - Cisco HyperFlexCisco Connect 2018 Indonesia - Cisco HyperFlex
Cisco Connect 2018 Indonesia - Cisco HyperFlex
 
Why Your Customers Care About Compliance and You Should Too
Why Your Customers Care About Compliance and You Should TooWhy Your Customers Care About Compliance and You Should Too
Why Your Customers Care About Compliance and You Should Too
 
Cisco Connect 2018 Singapore - delivering intent for data center networking
Cisco Connect 2018 Singapore -   delivering intent for data center networkingCisco Connect 2018 Singapore -   delivering intent for data center networking
Cisco Connect 2018 Singapore - delivering intent for data center networking
 
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud WorldCisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
 
Cisco Connect 2018 Singapore - Cisco Software Defined Access
Cisco Connect 2018 Singapore - Cisco Software Defined AccessCisco Connect 2018 Singapore - Cisco Software Defined Access
Cisco Connect 2018 Singapore - Cisco Software Defined Access
 
ThousandEyes Webinar - Clash of the Clouds
ThousandEyes Webinar - Clash of the CloudsThousandEyes Webinar - Clash of the Clouds
ThousandEyes Webinar - Clash of the Clouds
 
Be a Virtual Mobile Network for your M2M/IoT Devices, Martin Giess, EMnify
Be a Virtual Mobile Network for your M2M/IoT Devices, Martin Giess, EMnifyBe a Virtual Mobile Network for your M2M/IoT Devices, Martin Giess, EMnify
Be a Virtual Mobile Network for your M2M/IoT Devices, Martin Giess, EMnify
 
Can I Trust the Cloud?
Can I Trust the Cloud?Can I Trust the Cloud?
Can I Trust the Cloud?
 
How Schneider Electric Assures Its Salesforce Lightning Migration with Thousa...
How Schneider Electric Assures Its Salesforce Lightning Migration with Thousa...How Schneider Electric Assures Its Salesforce Lightning Migration with Thousa...
How Schneider Electric Assures Its Salesforce Lightning Migration with Thousa...
 
Cisco Connect 2018 Indonesia - Cisco cmx
Cisco Connect 2018 Indonesia - Cisco cmx Cisco Connect 2018 Indonesia - Cisco cmx
Cisco Connect 2018 Indonesia - Cisco cmx
 
Squareway, a Secure Private 3G Network, Cyrille Manente, Vivaction
Squareway, a Secure Private 3G Network, Cyrille Manente, VivactionSquareway, a Secure Private 3G Network, Cyrille Manente, Vivaction
Squareway, a Secure Private 3G Network, Cyrille Manente, Vivaction
 
Big Data Intelligence - Or Katz, Akamai and Tsvika Klein, Akamai
Big Data Intelligence - Or Katz, Akamai and Tsvika Klein, AkamaiBig Data Intelligence - Or Katz, Akamai and Tsvika Klein, Akamai
Big Data Intelligence - Or Katz, Akamai and Tsvika Klein, Akamai
 
Identiverse 2018 - Using Identity to Restore Freedom
Identiverse 2018 - Using Identity to Restore FreedomIdentiverse 2018 - Using Identity to Restore Freedom
Identiverse 2018 - Using Identity to Restore Freedom
 
Cisco at v mword 2015
Cisco at v mword 2015Cisco at v mword 2015
Cisco at v mword 2015
 
Seven Criteria for Building an AWS Global Transit Network
Seven Criteria for Building an AWS Global Transit NetworkSeven Criteria for Building an AWS Global Transit Network
Seven Criteria for Building an AWS Global Transit Network
 
AWS Summit Singapore - Best Practices for Cloud Security in the Cloud Adoptio...
AWS Summit Singapore - Best Practices for Cloud Security in the Cloud Adoptio...AWS Summit Singapore - Best Practices for Cloud Security in the Cloud Adoptio...
AWS Summit Singapore - Best Practices for Cloud Security in the Cloud Adoptio...
 
ThousandEyes Webinar: How to see and resolve office 365 performance challenges
ThousandEyes Webinar: How to see and resolve office 365 performance challengesThousandEyes Webinar: How to see and resolve office 365 performance challenges
ThousandEyes Webinar: How to see and resolve office 365 performance challenges
 

Similar to The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carriers - by AirTight CEO David King

ENT305 Compliance and Cloud Security for Regulated Industries
ENT305 Compliance and Cloud Security for Regulated IndustriesENT305 Compliance and Cloud Security for Regulated Industries
ENT305 Compliance and Cloud Security for Regulated IndustriesAmazon Web Services
 
Webinar: Enable ServiceNow with Data Security, Visibility, and Compliance
Webinar: Enable ServiceNow with Data Security, Visibility, and ComplianceWebinar: Enable ServiceNow with Data Security, Visibility, and Compliance
Webinar: Enable ServiceNow with Data Security, Visibility, and ComplianceCipherCloud
 
Sam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload SecuritySam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload Securitycentralohioissa
 
Prevent threats With Analytics Driven Web Application Firewall
Prevent threats With Analytics Driven Web Application FirewallPrevent threats With Analytics Driven Web Application Firewall
Prevent threats With Analytics Driven Web Application FirewallAvi Networks
 
Visibility and Automation for Enhanced Security
Visibility and Automation for Enhanced SecurityVisibility and Automation for Enhanced Security
Visibility and Automation for Enhanced Securitypatmisasi
 
Cisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by MerakiCisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by MerakiRowell Dionicio
 
Trust in Mobile Computing
Trust in Mobile ComputingTrust in Mobile Computing
Trust in Mobile ComputingE Radar
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without BoundariesPing Identity
 
Intellectual Property Strategy: Challenges and Opportunities in the Cloud @ C...
Intellectual Property Strategy: Challenges and Opportunities in the Cloud @ C...Intellectual Property Strategy: Challenges and Opportunities in the Cloud @ C...
Intellectual Property Strategy: Challenges and Opportunities in the Cloud @ C...Foresight Valuation Group
 
Transform Government IT with VMware Cloud on AWS, an Integrated Hybrid Solution
 Transform Government IT with VMware Cloud on AWS, an Integrated Hybrid Solution Transform Government IT with VMware Cloud on AWS, an Integrated Hybrid Solution
Transform Government IT with VMware Cloud on AWS, an Integrated Hybrid SolutionAmazon Web Services
 
Cisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager NetworksCisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager NetworksNTS UK - Part of Capita
 
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01Sergiy Pitel
 
Leveraging The Power Of The Cloud For Your Business
Leveraging The Power Of The Cloud For Your BusinessLeveraging The Power Of The Cloud For Your Business
Leveraging The Power Of The Cloud For Your BusinessJoel Katz
 
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...Amazon Web Services
 
AWS Summit Auckland Platinum Sponsor presentation - Trend Micro
AWS Summit Auckland Platinum Sponsor presentation - Trend MicroAWS Summit Auckland Platinum Sponsor presentation - Trend Micro
AWS Summit Auckland Platinum Sponsor presentation - Trend MicroAmazon Web Services
 
Making Networks More Agile, Open, and Application Centric - Cisco Insights
Making Networks More Agile, Open, and Application Centric - Cisco InsightsMaking Networks More Agile, Open, and Application Centric - Cisco Insights
Making Networks More Agile, Open, and Application Centric - Cisco InsightsCisco Service Provider
 
Did Your Wi-Fi Performance Expire Before the Warranty Did? | Steps to Providi...
Did Your Wi-Fi Performance Expire Before the Warranty Did? | Steps to Providi...Did Your Wi-Fi Performance Expire Before the Warranty Did? | Steps to Providi...
Did Your Wi-Fi Performance Expire Before the Warranty Did? | Steps to Providi...Xirrus
 
Nieuwe onderwijs- en onderzoekstoepassingen door slimme wifi-netwerken - Roy ...
Nieuwe onderwijs- en onderzoekstoepassingen door slimme wifi-netwerken - Roy ...Nieuwe onderwijs- en onderzoekstoepassingen door slimme wifi-netwerken - Roy ...
Nieuwe onderwijs- en onderzoekstoepassingen door slimme wifi-netwerken - Roy ...SURFnet
 
Generational shiftsRedefining Customer Experience And The Way To Insure
Generational shiftsRedefining Customer Experience And The Way To InsureGenerational shiftsRedefining Customer Experience And The Way To Insure
Generational shiftsRedefining Customer Experience And The Way To InsureAmazon Web Services
 

Similar to The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carriers - by AirTight CEO David King (20)

ENT305 Compliance and Cloud Security for Regulated Industries
ENT305 Compliance and Cloud Security for Regulated IndustriesENT305 Compliance and Cloud Security for Regulated Industries
ENT305 Compliance and Cloud Security for Regulated Industries
 
Webinar: Enable ServiceNow with Data Security, Visibility, and Compliance
Webinar: Enable ServiceNow with Data Security, Visibility, and ComplianceWebinar: Enable ServiceNow with Data Security, Visibility, and Compliance
Webinar: Enable ServiceNow with Data Security, Visibility, and Compliance
 
Sam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload SecuritySam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload Security
 
Prevent threats With Analytics Driven Web Application Firewall
Prevent threats With Analytics Driven Web Application FirewallPrevent threats With Analytics Driven Web Application Firewall
Prevent threats With Analytics Driven Web Application Firewall
 
Visibility and Automation for Enhanced Security
Visibility and Automation for Enhanced SecurityVisibility and Automation for Enhanced Security
Visibility and Automation for Enhanced Security
 
Cisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by MerakiCisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by Meraki
 
Trust in Mobile Computing
Trust in Mobile ComputingTrust in Mobile Computing
Trust in Mobile Computing
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without Boundaries
 
Intellectual Property Strategy: Challenges and Opportunities in the Cloud @ C...
Intellectual Property Strategy: Challenges and Opportunities in the Cloud @ C...Intellectual Property Strategy: Challenges and Opportunities in the Cloud @ C...
Intellectual Property Strategy: Challenges and Opportunities in the Cloud @ C...
 
Transform Government IT with VMware Cloud on AWS, an Integrated Hybrid Solution
 Transform Government IT with VMware Cloud on AWS, an Integrated Hybrid Solution Transform Government IT with VMware Cloud on AWS, an Integrated Hybrid Solution
Transform Government IT with VMware Cloud on AWS, an Integrated Hybrid Solution
 
Cisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager NetworksCisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager Networks
 
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
 
Leveraging The Power Of The Cloud For Your Business
Leveraging The Power Of The Cloud For Your BusinessLeveraging The Power Of The Cloud For Your Business
Leveraging The Power Of The Cloud For Your Business
 
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
 
AWS Summit Auckland Platinum Sponsor presentation - Trend Micro
AWS Summit Auckland Platinum Sponsor presentation - Trend MicroAWS Summit Auckland Platinum Sponsor presentation - Trend Micro
AWS Summit Auckland Platinum Sponsor presentation - Trend Micro
 
Making Networks More Agile, Open, and Application Centric - Cisco Insights
Making Networks More Agile, Open, and Application Centric - Cisco InsightsMaking Networks More Agile, Open, and Application Centric - Cisco Insights
Making Networks More Agile, Open, and Application Centric - Cisco Insights
 
Netpluz corp presentation 2020
Netpluz corp presentation 2020Netpluz corp presentation 2020
Netpluz corp presentation 2020
 
Did Your Wi-Fi Performance Expire Before the Warranty Did? | Steps to Providi...
Did Your Wi-Fi Performance Expire Before the Warranty Did? | Steps to Providi...Did Your Wi-Fi Performance Expire Before the Warranty Did? | Steps to Providi...
Did Your Wi-Fi Performance Expire Before the Warranty Did? | Steps to Providi...
 
Nieuwe onderwijs- en onderzoekstoepassingen door slimme wifi-netwerken - Roy ...
Nieuwe onderwijs- en onderzoekstoepassingen door slimme wifi-netwerken - Roy ...Nieuwe onderwijs- en onderzoekstoepassingen door slimme wifi-netwerken - Roy ...
Nieuwe onderwijs- en onderzoekstoepassingen door slimme wifi-netwerken - Roy ...
 
Generational shiftsRedefining Customer Experience And The Way To Insure
Generational shiftsRedefining Customer Experience And The Way To InsureGenerational shiftsRedefining Customer Experience And The Way To Insure
Generational shiftsRedefining Customer Experience And The Way To Insure
 

More from AirTight Networks

iBeacon Reality Check _ Essential Considerations for an iBeacon Deployment
iBeacon Reality Check  _ Essential Considerations for an iBeacon DeploymentiBeacon Reality Check  _ Essential Considerations for an iBeacon Deployment
iBeacon Reality Check _ Essential Considerations for an iBeacon DeploymentAirTight Networks
 
WLPC: Staying on Top of Security and Spectrum Rules in WIPS Deployments by He...
WLPC: Staying on Top of Security and Spectrum Rules in WIPS Deployments by He...WLPC: Staying on Top of Security and Spectrum Rules in WIPS Deployments by He...
WLPC: Staying on Top of Security and Spectrum Rules in WIPS Deployments by He...AirTight Networks
 
The Impact of IoT on Enterprise Wi-Fi by AirTight Networks via Slideshare
The Impact of IoT on Enterprise Wi-Fi by AirTight Networks via SlideshareThe Impact of IoT on Enterprise Wi-Fi by AirTight Networks via Slideshare
The Impact of IoT on Enterprise Wi-Fi by AirTight Networks via SlideshareAirTight Networks
 
Marriott Fined 600K by FCC for Blocking Guests Wi-Fi
Marriott Fined 600K by FCC for Blocking Guests Wi-FiMarriott Fined 600K by FCC for Blocking Guests Wi-Fi
Marriott Fined 600K by FCC for Blocking Guests Wi-FiAirTight Networks
 
WizShark : Wi-Fi Troubleshooting Made Easy - CWNP Conference 2014
WizShark :  Wi-Fi Troubleshooting Made Easy - CWNP Conference 2014WizShark :  Wi-Fi Troubleshooting Made Easy - CWNP Conference 2014
WizShark : Wi-Fi Troubleshooting Made Easy - CWNP Conference 2014AirTight Networks
 
SMAC - Presentation from RetailWeek Technology Summit, Sept 23
SMAC - Presentation from RetailWeek Technology Summit, Sept 23SMAC - Presentation from RetailWeek Technology Summit, Sept 23
SMAC - Presentation from RetailWeek Technology Summit, Sept 23AirTight Networks
 
SMAC _ Can It Maximise Staff and Customer Engagement? RWTS
SMAC _ Can It Maximise Staff and Customer Engagement?  RWTSSMAC _ Can It Maximise Staff and Customer Engagement?  RWTS
SMAC _ Can It Maximise Staff and Customer Engagement? RWTSAirTight Networks
 

More from AirTight Networks (9)

iBeacon Reality Check _ Essential Considerations for an iBeacon Deployment
iBeacon Reality Check  _ Essential Considerations for an iBeacon DeploymentiBeacon Reality Check  _ Essential Considerations for an iBeacon Deployment
iBeacon Reality Check _ Essential Considerations for an iBeacon Deployment
 
WLPC: Staying on Top of Security and Spectrum Rules in WIPS Deployments by He...
WLPC: Staying on Top of Security and Spectrum Rules in WIPS Deployments by He...WLPC: Staying on Top of Security and Spectrum Rules in WIPS Deployments by He...
WLPC: Staying on Top of Security and Spectrum Rules in WIPS Deployments by He...
 
The Impact of IoT on Enterprise Wi-Fi by AirTight Networks via Slideshare
The Impact of IoT on Enterprise Wi-Fi by AirTight Networks via SlideshareThe Impact of IoT on Enterprise Wi-Fi by AirTight Networks via Slideshare
The Impact of IoT on Enterprise Wi-Fi by AirTight Networks via Slideshare
 
Marriott Fined 600K by FCC for Blocking Guests Wi-Fi
Marriott Fined 600K by FCC for Blocking Guests Wi-FiMarriott Fined 600K by FCC for Blocking Guests Wi-Fi
Marriott Fined 600K by FCC for Blocking Guests Wi-Fi
 
WizShark : Wi-Fi Troubleshooting Made Easy - CWNP Conference 2014
WizShark :  Wi-Fi Troubleshooting Made Easy - CWNP Conference 2014WizShark :  Wi-Fi Troubleshooting Made Easy - CWNP Conference 2014
WizShark : Wi-Fi Troubleshooting Made Easy - CWNP Conference 2014
 
Appi fi
Appi fiAppi fi
Appi fi
 
SMAC - Presentation from RetailWeek Technology Summit, Sept 23
SMAC - Presentation from RetailWeek Technology Summit, Sept 23SMAC - Presentation from RetailWeek Technology Summit, Sept 23
SMAC - Presentation from RetailWeek Technology Summit, Sept 23
 
SMAC _ Can It Maximise Staff and Customer Engagement? RWTS
SMAC _ Can It Maximise Staff and Customer Engagement?  RWTSSMAC _ Can It Maximise Staff and Customer Engagement?  RWTS
SMAC _ Can It Maximise Staff and Customer Engagement? RWTS
 
Cafe Latte
Cafe LatteCafe Latte
Cafe Latte
 

Recently uploaded

Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyJohn Staveley
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka DoktorováCzechDreamin
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Julian Hyde
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityScyllaDB
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...CzechDreamin
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...CzechDreamin
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesThousandEyes
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupCatarinaPereira64715
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Product School
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekCzechDreamin
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxAbida Shariff
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeCzechDreamin
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIES VE
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxDavid Michel
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...Sri Ambati
 

Recently uploaded (20)

Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 

The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carriers - by AirTight CEO David King

  • 1. The New Economics of Wi-Fi Wireless Broadband Alliance David King, CEO of AirTight Networks © 2014 AirTight Networks, Inc. All rights reserved. 1 @AirTight
  • 2. Find this presentation on SlideShare www.slideshare.net/airtight Get the link from @AirTight on Twitter
  • 3. What’s Driving the Adoption Curve? © 2014 AirTight Networks, Inc. All rights reserved. 3
  • 4. What’s Driving the Adoption Curve? • Plug ‘n Play experience • More data! • Privacy and security • Context – based services • High performance • Availability & reliability • Accelerate time to market • Reduce onboarding costs • Increase customer stickiness © 2014 AirTight Networks, Inc. All rights reserved. 4 Technology Drivers • Cloud Wi-Fi • Hotspot 2.0 • 802.11ac • Internet of Things Customer Expectations Service Provider Needs
  • 5. Carrier Grade Secure Cloud Wi-Fi © 2014 AirTight Networks, Inc. All rights reserved. 5
  • 6. Carrier Grade Secure Cloud Wi-Fi • Economies of scale • fully virtualized, controller-less cloud architecture • centralized management of thousands of APs • multi-tenancy and server clustering • Carrier grade availability & reliability • Drop-ship “ready” - rapid provisioning & low cost © 2014 AirTight Networks, Inc. All rights reserved. 6 installation • NFV based management of APs
  • 7. Carrier Grade Secure Cloud Wi-Fi • Economies of scale • fully virtualized, controller-less cloud architecture • centralized management of thousands of APs • multi-tenancy and server clustering • Carrier grade availability & reliability • Drop-ship “ready” - rapid provisioning & low cost © 2014 AirTight Networks, Inc. All rights reserved. 7 installation • NFV based management of APs
  • 8. Carrier-Grade Cloud Architecture Fault Fault Tolerance, Tolerance HA and Disaster Data Replication Recovery Guest Manager & Analytics Engine Compute & memory on VMware ESXi hypervisor + disc in EMC SAN “Super-tenant” Manager Instances “Multi-tenant “ Manager Instances Provisioning Resilient Service Discovery Layer © 2014 AirTight Networks, Inc. All rights reserved. 8 Grafts Database Cluster Web Server s ……… Analytics App
  • 9. Monetization Thyself! If you don’t do it, who will?| Google Search I’m Feeling Lucky © 2014 AirTight Networks, Inc. All rights reserved. 9
  • 10. Monetization Thyself! If you don’t do it, who will?| Amazon Apple Facebook Google Microsoft Netflix Yahoo! … Google Search I’m Feeling Lucky © 2014 AirTight Networks, Inc. All rights reserved. 10 © 2014 AirTight Networks, Inc. All rights reserved.
  • 11. Analytics for Business Intelligence  Intra-day or times of the day  Daily, weekly, monthly trends  Specific store or across selected stores  Raw data (to generate custom reports) What We Can Measure How We Can Report it © 2014 AirTight Networks, Inc. All rights reserved. 11 Presence • Total Foot Traffic • Catchment Area Visitor Traffic • Dwell Time (or Visit Duration) Loyalty • Repeat Visitors • Visit Frequency • Visit Recency Engagement • Conversion and Bounce Rates • Social Wi-Fi Demographics • Social Wi-Fi Visitor Logs Wi-Fi Usage • Device Types • Data Traffic • Sesssion Duration
  • 12. Security Problems Will Be More Pervasive! © 2014 AirTight Networks, Inc. All rights reserved. 12
  • 13. Security Problems Will Be More Pervasive! © 2014 AirTight Networks, Inc. All rights reserved. 13
  • 14. Security Problems Will Be More Pervasive! © 2014 AirTight Networks, Inc. All rights reserved. 14
  • 15. Security Problems Will Be More Pervasive! © 2014 AirTight Networks, Inc. All rights reserved. 15
  • 16. Wireless Intrusion Prevention System (WIPS) © 2014 AirTight Networks, Inc. All rights reserved. 16 Automatic Device Classification No signatures required Reliable Threat Prevention Reliable Threat Prevention Accurate Location Tracking BYOD Policy Enforcement Automated Compliance Reporting IoT Ready
  • 17. Wireless Intrusion Prevention System (WIPS) © 2014 AirTight Networks, Inc. All rights reserved. 17 Automatic Device Classification No signatures required Reliable Threat Prevention Reliable Threat Prevention Accurate Location Tracking BYOD Policy Enforcement Automated Compliance Reporting IoT Ready
  • 18. http://blog.airtightnetworks.com/ © 2014 AirTight Networks, Inc. All rights reserved. 18
  • 19. http://www.slideshare.net/airtight © 2014 AirTight Networks, Inc. All rights reserved. 19
  • 20. The New Economics of Wi-Fi Strong User Experience = Increased Customer Traction © 2014 AirTight Networks, Inc. All rights reserved. 20
  • 21. The New Economics of Wi-Fi Strong User Experience = Increased Customer Traction Deployment • Rapid time-to-deployment • Economies of scale • Flexible business models • Custom branded guest Wi-Fi • Rich analytics & API for billing/management © 2014 AirTight Networks, Inc. All rights reserved. 21
  • 22. The New Economics of Wi-Fi Strong User Experience = Increased Customer Traction Deployment • Rapid time-to-deployment • Economies of scale • Flexible business models • Custom branded guest Wi-Fi • Rich analytics & API for billing/management Trust • Out-of-the-box defense • Security compliance • Privacy protection • Rapid threat response © 2014 AirTight Networks, Inc. All rights reserved. 22
  • 23. The New Economics of Wi-Fi Strong User Experience = Increased Customer Traction Deployment • Rapid time-to-deployment • Economies of scale • Flexible business models • Custom branded guest Wi-Fi • Rich analytics & API for billing/management Trust • Out-of-the-box defense • Security compliance • Privacy protection • Rapid threat response Engagement • Social Wi-Fi • Rich visitor analytics • High value offers • Context driven services © 2014 AirTight Networks, Inc. All rights reserved. 23
  • 24. The New Economics of Wi-Fi Strong User Experience = Increased Customer Traction Deployment • Rapid time-to-deployment • Economies of scale • Flexible business models • Custom branded guest Wi-Fi • Rich analytics & API for billing/management Trust • Out-of-the-box defense • Security compliance • Privacy protection • Rapid threat response Trusted Relevant Experiences Engagement • Social Wi-Fi • Rich visitor analytics • High value offers • Context driven services © 2014 AirTight Networks, Inc. All rights reserved. 24
  • 25. © 2014 AirTight Networks, Inc. All rights reserved. 25 © 2014 AirTight Networks, Inc. All rights reserved. Thank You! www.airtightnetworks.com blog.airtightnetworks.com @AirTight www.slideshare.net/airtight

Editor's Notes

  1. We’ll focus on what is disrupting the Wi-Fi space today and how carriers can take advantage of the inflection points happening in the industry, such as cloud, HotSpot 2.0, 802.11ac and IoT. We will cover how Wi-Fi can address key concerns of carriers as they face smaller margins, higher customer acquisition cost and lack of loyalty. We will address how to use Wi-Fi to: Reduce the cost of onboarding and supporting new customers Provide context-driven engagement Deliver relevant offerings driven by context-based analytics – based on location, social profiles, loyalty
  2. We’ll focus on what is disrupting the Wi-Fi space today and how carriers can take advantage of the inflection points happening in the industry, such as cloud, HotSpot 2.0, 802.11ac and IoT. We will cover how Wi-Fi can address key concerns of carriers as they face smaller margins, higher customer acquisition cost and lack of loyalty. We will address how to use Wi-Fi to: Reduce the cost of onboarding and supporting new customers Provide context-driven engagement Deliver relevant offerings driven by context-based analytics – based on location, social profiles, loyalty
  3. Controller-less architecture Single pane of glass for hundreds of thousands of APs Latest technology for data maintenance fault tolerance, disaster recovery, storage, databases Multi-tenancy and server clustering Economies of scale of cloud computing Economies of incremental addition of backend resource to cater to growing network Software defined network management
  4. Controller-less architecture Single pane of glass for hundreds of thousands of APs Latest technology for data maintenance fault tolerance, disaster recovery, storage, databases Multi-tenancy and server clustering Economies of scale of cloud computing Economies of incremental addition of backend resource to cater to growing network Software defined network management
  5. Controller-less architecture Single pane of glass for hundreds of thousands of APs Latest technology for data maintenance fault tolerance, disaster recovery, storage, databases Multi-tenancy and server clustering Economies of scale of cloud computing Economies of incremental addition of backend resource to cater to growing network Software defined network management
  6. Call to action here is to "Monetize Thyself"! If you don’t, any number of these vendors show above will monetize you instead.   Reference Google - Ruckus rumored deal on GigaOm about them providing free WiFi access to restaurants etc… – see link below. The threat becomes an opportunity - would you rather monetize your brand, or would you like Google to do it for you? ·         Google has their search engine; they are launching a driverless car; they want to own the home (Nest); they have over 1B products on Google Express, and are rumored to be launching their own retail store; NOW they want to own the traffic in public venues. ·         The technology is here now & cost effective and simple to use - you can monetize it today and we can do it in an integrated Access point at all you can eat prices.   http://gigaom.com/2014/05/22/google-is-working-with-ruckus-wireless-to-build-a-wi-fi-network-in-the-cloud/
  7. Call to action here is to "Monetize Thyself"! If you don’t, any number of these vendors show above will monetize you instead.   Reference Google - Ruckus rumored deal on GigaOm about them providing free WiFi access to restaurants etc… – see link below. The threat becomes an opportunity - would you rather monetize your brand, or would you like Google to do it for you? ·         Google has their search engine; they are launching a driverless car; they want to own the home (Nest); they have over 1B products on Google Express, and are rumored to be launching their own retail store; NOW they want to own the traffic in public venues. ·         The technology is here now & cost effective and simple to use - you can monetize it today and we can do it in an integrated Access point at all you can eat prices.   http://gigaom.com/2014/05/22/google-is-working-with-ruckus-wireless-to-build-a-wi-fi-network-in-the-cloud/
  8. Highest value in the industry Optimal price/performance ratio with full functionality on 802.11af power. No PoE+ required. The only true WIPS for 802.11ac Fully automated intrusion prevention using patented behavioral analysis rather than unreliable signature files. The only WIPS capable of working with 802.11ac and IoT devices. All the benefits of AirTight Wi-Fi Includes built in WIPS and mesh, cloud-managed Wi-Fi, Mojo Studio applications and services suite, Social Wi-Fi with BrandBuilder for customized guest Wi-Fi, presence analytics, WizShark visual troubleshooting and much more ------------------------------------------------ System Scalability: Device & Cloud Raised monitoring capacity to 2000 “active“ devices “per AP/Sensor” Operation Scalability: Alert Flood Avoidance, Zero Day Protection, Minimal Human Intervention Foundation of protection oriented (not signature & alert oriented) security paradigm Device Diversity: Nuanced implementations Depth & breadth of detection/prevention techniques New Attack Vectors: Use of protocol behavior in a manner not hitherto seen Depends on nature of new discoveries
  9. Highest value in the industry Optimal price/performance ratio with full functionality on 802.11af power. No PoE+ required. The only true WIPS for 802.11ac Fully automated intrusion prevention using patented behavioral analysis rather than unreliable signature files. The only WIPS capable of working with 802.11ac and IoT devices. All the benefits of AirTight Wi-Fi Includes built in WIPS and mesh, cloud-managed Wi-Fi, Mojo Studio applications and services suite, Social Wi-Fi with BrandBuilder for customized guest Wi-Fi, presence analytics, WizShark visual troubleshooting and much more ------------------------------------------------ System Scalability: Device & Cloud Raised monitoring capacity to 2000 “active“ devices “per AP/Sensor” Operation Scalability: Alert Flood Avoidance, Zero Day Protection, Minimal Human Intervention Foundation of protection oriented (not signature & alert oriented) security paradigm Device Diversity: Nuanced implementations Depth & breadth of detection/prevention techniques New Attack Vectors: Use of protocol behavior in a manner not hitherto seen Depends on nature of new discoveries