W I PS?
W I PS   stands for Wireless  Intrusion  Prevention Systems
It  provides   security  cover to wireless infrastructure
Security     is the protection of Assets
How  ?
Lock
Watch
or Monitor
In   Information   Technology
Security       is the protection of Assets ^ Information
How  ?
… through the use of   T raining,  P rocesses  and  T echnology
Internet Firewall shields inside from outside Outside is insecure Network (LAN) is confined to wires Inside is secure Conventional LAN
Internet Wireless security holes bypass the firewall Network not confined to wires or the building anymore Firewall shields inside from outside Wireless LAN
RF Signal  can’t be contained within a physical boundary Hence,  spillage of RF signals  causes serious security threats…
Examples of WiFi  Security Threats Eavesdropping Unauthorized Access Wi-Phishing Honeypots External APs Key Cracking External Users Rogue AP  Misconfigured AP Firewall, Wired IPS Wireless DoS Ad hoc Connections
Why not just ban WiFi?
Simply having a “No WiFi” policy  does not make you immune to WiFi Threats
So, What can we do about it  ?
Lock and … … Monitor
How  ?
WPA/WPA2  to Lock Down WiFi Network  Eavesdropping Unauthorized Access Wi-Phishing Honeypots External APs Cracking External Users Rogue AP  Misconfigured AP Firewall, Wired IPS Wireless DoS WPA, WPA2 Ad hoc Connections
Misconfigured AP Adhoc connections Firewall Wired IPS SPAM URL filtering  WPA, WPA2 Rogue AP WIPS to cover  Wireless Infrastructure Eavesdropping Unauthorized Access Wi-Phishing Honeypots External APs Cracking External Users Wireless DoS
Wireless Intrusion Prevention System (WIPS) Detect WiFi misuse and attacks Block WiFi misuse and attacks Locate WiFi devices
Md Sohail Ahmad [email_address] Thank You! The Global Leader in  Wireless Security Solutions www.airtightnetworks.com

Wireless Intrusion Prevention Systems or WIPS

  • 1.
  • 2.
    W I PS stands for Wireless Intrusion Prevention Systems
  • 3.
    It provides security cover to wireless infrastructure
  • 4.
    Security is the protection of Assets
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
    In Information Technology
  • 10.
    Security is the protection of Assets ^ Information
  • 11.
  • 12.
    … through theuse of T raining, P rocesses and T echnology
  • 13.
    Internet Firewall shieldsinside from outside Outside is insecure Network (LAN) is confined to wires Inside is secure Conventional LAN
  • 14.
    Internet Wireless securityholes bypass the firewall Network not confined to wires or the building anymore Firewall shields inside from outside Wireless LAN
  • 15.
    RF Signal can’t be contained within a physical boundary Hence, spillage of RF signals causes serious security threats…
  • 16.
    Examples of WiFi Security Threats Eavesdropping Unauthorized Access Wi-Phishing Honeypots External APs Key Cracking External Users Rogue AP Misconfigured AP Firewall, Wired IPS Wireless DoS Ad hoc Connections
  • 17.
    Why not justban WiFi?
  • 18.
    Simply having a“No WiFi” policy does not make you immune to WiFi Threats
  • 19.
    So, What canwe do about it ?
  • 20.
    Lock and …… Monitor
  • 21.
  • 22.
    WPA/WPA2 toLock Down WiFi Network Eavesdropping Unauthorized Access Wi-Phishing Honeypots External APs Cracking External Users Rogue AP Misconfigured AP Firewall, Wired IPS Wireless DoS WPA, WPA2 Ad hoc Connections
  • 23.
    Misconfigured AP Adhocconnections Firewall Wired IPS SPAM URL filtering WPA, WPA2 Rogue AP WIPS to cover Wireless Infrastructure Eavesdropping Unauthorized Access Wi-Phishing Honeypots External APs Cracking External Users Wireless DoS
  • 24.
    Wireless Intrusion PreventionSystem (WIPS) Detect WiFi misuse and attacks Block WiFi misuse and attacks Locate WiFi devices
  • 25.
    Md Sohail Ahmad[email_address] Thank You! The Global Leader in Wireless Security Solutions www.airtightnetworks.com