Wi-Fi security solutions provider AirTight Networks, Inc. sat down with Carl Ford, a TechZone360 columnist and partner at CrossFire Media, to discuss security concerns with Wi-Fi usage as well as the company's strategy within and beyond the enterprise market. The interview was part of TMC's On the Road series in San Jose, CA.
Pravin Bhagwat, co-founder & CTO of AirTight, said the company's main focus is to ensure customers who use Wi-Fi do so in a secure fashion. He added that there are ways that Wi-Fi networks may be compromised beyond the imagination of most end uses, and it's the job of AirTight to protect all end customers in a wide variety of scenarios. "Because, after all, it's an invisible medium," said Bhagwat.
The company realizes that Wi-Fi is becoming an extremely crowded market, particularly with the growth of residential usage. With the number of enabled devices seeking access points on the rise, the typical user is surrounded by signals from neighboring buildings. Administrators now have to worry if their users are on the proper network or on someone else's, as well as exposing their own networks to outside usage.
AirTight believes companies need a security monitor to scan all channels to ensure they are secure. Even companies that do not allow Wi-Fi on their campuses can benefit from AirTight to ensure access points have not been enabled through outside devices brought onto campus. The key issue, according to Bhagwat, is that wireless is a shared medium and there will always be a mix of traffic from all directions. Alarms and monitoring need to be coordinated with that traffic, to avoid a large number of false alarms.
"You only need to raise an alarm when activity is directly coupled to your network," said Bhagwat. "So, if you have a system which starts spewing up alarms just because it detects some activity, you're going to be seeing a large number of false alarms." AirTight works by capturing packets at Layer 2 and analyzing whether the traffic scheme is potentially in violation of a company's security policy. If so, the solution can automatically block those connections via technology embedded in their products.
AirTight's typical customers include enterprise and campus environments, as well as some government contracts. The company is looking to go beyond enterprise and high-security facilities to address additional markets like telecoms and service providers, which have a compelling need for this type of security. Service providers are continuously pressured to offer Wi-Fi access at a large number of distributed sites, and these sites need to be centrally managed and monitored to ensure proper security is being met.
"We are ready from a technology standpoint to support that scale and the cost," said Bhagwat.
Want to learn more about the latest in communications and technology? Then be sure to attend ITEXPO West 2011, taking place Sept. 13-15, 2011, in Austin, Texas. ITEXPO offers an educational program to help corporate decision makers select the right IP-based voice, video, fax and unified communications solutions to improve their operations. It's also where service providers learn how to profitably roll out the services their subscribers are clamoring for – and where resellers can learn about new growth opportunities. To register, click here.
TechZone360 Contributing Editor
Antivirus software is not enough. Apex Technology Services used its decades of IT and cybersecurity
experience to create budget-friendly network security packages every company needs.
Please take a moment to fill out your information so we can contact you directly regarding your request.
Most IT support teams are tasked with day-to-day troubleshooting. This ranges from fixing machines and networks to physically maintaining them by chan…
In the wake of high-profile security threats, companies and governments are increasingly turning to open-source software as one of the ways to avoid s…
Technology has transformed how humans perceive and do things. One of the sectors that technology has dramatically improved is the online gaming sector…
In Oracle Food and Beverage's report, 70% of attendees would prefer to have service jobs replaced by digital solutions in the future.
Phishing is commonly used by cyber criminals, as an attack that exploits an organization's last line of cyber defense - the employees