wireless security online, on-demand
TRANSCRIPT
A I R T I G H T N E T W O R K S W H I T E P A P E R
© 2008 AirTight Networks, Inc. All rights reserved.
Wireless Security Online, On-Demand Cost-effective, Customizable, Effortless, and Proactive Management of Your Wireless Threat Exposure
A White Paper by AirTight Networks, Inc.
339 N. Bernardo Avenue, Suite 200, Mountain View, CA 94043
www.airtightnetworks.com
© 2008 AirTight Networks, Inc. All rights reserved.
A I R T I G H T N E T W O R K S W H I T E P A P E R
© 2008 AirTight Networks, Inc. All rights reserved. 2
Wireless Security Online, On-Demand
Executive summary
Traditionally, wireless security has been viewed as an “onsite” activity
that requires strategic long-term investment and consumes significant IT
administrative resources. Due to high upfront costs, small- and medium-
size enterprises and those with limited wireless LAN deployment shy
away from wireless security leaving them exposed and liable.
This whitepaper introduces a novel way for enabling on-demand wireless security that
is affordable, effortless, and customizable. In this new architecture, wireless security is
delivered over the Internet bringing a revolutionary change in how businesses manage
their wireless threat exposure. Depending on their needs, businesses choose and pay
only for the value they derive from this online wireless security service. Large wireless
deployments at multiple sites worldwide and small, single WLAN deployments are
served equally well. Even businesses with a “no WiFi” policy can avail this service to
simply enforce their policy.
AirTight Networks’ SpectraGuard Online (SGO) enables all these benefits, allowing you to
manage your wireless threat exposure without leaving your desk. If you can browse the
Web, you can be wireless-secure with SGO.
A I R T I G H T N E T W O R K S W H I T E P A P E R
© 2008 AirTight Networks, Inc. All rights reserved. 3
Wireless Security: The State of AffairsAdoption of appropriate wireless security measures is lagging far behind the escalating
presence of wireless. Two main reasons for this lethargy are: lack of awareness and
rigid solutions.
Lack of awareness
Businesses are unable to assess their susceptibility to wireless vulnerabilities and in turn
fail to acknowledge the escalating risks. As a result, many do not have a formal wireless
security policy in place, while some get a false sense of security by only encrypting
over-the-air data or installing a wireless LAN behind a firewall. And malicious hackers
are exploiting these security holes galore.
Rigid solutions
The threat perception and security requirements vary considerably across businesses
depending on their volume of wireless usage (or dependency on wireless), their liability,
and the cost. But, most contemporary solutions adopt an “all-or-nothing” approach,
unable to meet these diverse needs. Small- and medium-size enterprises (SMEs) find the
upfront cost of a full-fledged wireless intrusion prevention system (WIPS) too high and
cannot take on the administrative responsibilities for onsite maintenance of equipment.
Need of the hour
To solve this two-headed problem, we need a solution that:
Helps enterprises of all kinds and sizes to quickly assess their threat exposure;
Guides them about and lets them choose from different types of remedial actions;
Eases the burden of prohibitive costs making wireless security accessible to SMEs; and
Eliminates the administration of third-party hardware and software onsite.
Web-based Wireless Security Web-based wireless security architecture—a radical departure from the conventional
“onsite” approach—leverages the Software as a Service (SaaS) model to offer wireless
security online, on-demand. Customers do not buy equipment. Instead, plug-and-play
wireless scanners monitor the airspace. The scanners automatically connect to a centralized
server over a secure connection. The server is powered with an up-to-date vulnerability
database and housed in a secure datacenter. Users access the wireless security portal via
a Web browser; no special software is needed.
Wireless Security Online, On-Demand
A I R T I G H T N E T W O R K S W H I T E P A P E R
© 2008 AirTight Networks, Inc. All rights reserved. 4
This innovative approach provides the following key benefits.
Zero-day attack protection1. The Web-based model eliminates the risk of obsolescence, providing zero-day attack protection. The central vulnerability database is continually updated making these changes instantly available to customers.
No more software upgrades2. The central server and vulnerability database offer the latest functionality every time users access the service, which means that customers no longer need to fix bugs and download patches or wait for the next product release.
No more hardware maintenance3. Businesses are relieved from buying and lugging expensive equipment onsite. Free from the headache of managing auxiliary infrastructure, businesses can focus on their core competence, and IT personnel can focus on their company’s daily operations rather than troubleshooting third-party software and equipment.
Pay-as-you-go4. By eliminating high upfront costs and facilitating IT cost-savings, wireless security is accessible to small- and medium-size enterprises that can afford paying for the service in easy, periodic installments.
Value-based, customizable service5. From the various features that comprise wireless vulnerability assessment and remediation, customers can subscribe to only those value propositions that benefit them. Further, customers can configure the application to customize the way it looks and behaves offering a unique user experience.
Anywhere, anytime access6. With the service available via any Web browser, users can monitor the wireless security posture of any of their facilities without leaving their desk or from anywhere else on the Internet; direct or VPN access to their corporate network is not needed. User access can of course be controlled by system administrators by defining different privileges.
Scalability7. The service provisioning is fully distributed and scalable. Multiple subscribers can simultaneously access their wireless security portal via identical instances hosted on multiple servers.
Wireless Security Online, On-Demand
A I R T I G H T N E T W O R K S W H I T E P A P E R
© 2008 AirTight Networks, Inc. All rights reserved. 5
SpectraGuard Online™AirTight Networks’ SpectraGuard Online (SGO) is the first and only product that delivers
all the above benefits. SGO offers a monthly subscription-based wireless security auditing
and vulnerability management service. It includes AirTight’s plug-and-play wireless scanners
that are preconfigured and maintenance-free. Enterprises can scan their facilities world-
wide unlimited number of times without leaving their desk. AirTight Networks’ patented
location-based policy management makes this real easy.
SGO audits wireless vulnerabilities inside your network as well as those outside your
premises that pose a threat. Customers can choose to subscribe to different levels of
vulnerability assessment, regulatory compliance and remediation. The service enables:
Airspace assessment—essentially the threat level of your environment;
Vulnerability assessment by classifying your critical assets and gaining a “hacker’s eye view” of your network’s security posture;
Compliance with legislative regulations (e.g., PCI, HIPAA, DoD, SOX, GLBA) from a wireless perspective for the various segments such as retail, finance, healthcare, and education;
Location tracking of vulnerabilities or anomalous activities once they are detected;
Guidance about manual remedial actions whenever possible; or
Automated 24x7 wireless monitoring and protection.
Figure 1. SpectraGuard Online Architecture
Wireless Security Online, On-Demand
A I R T I G H T N E T W O R K S W H I T E P A P E R
Wireless Vulnerability Management
AirTight Networks, Inc. 339 N. Bernardo Avenue #200, Mountain View, CA 94043 T +1.877.424.7844 T 650.961.1111 F 650.961.1169 www.airtightnetworks.com [email protected]
© 2008 AirTight Networks, Inc. All rights reserved. AirTight Networks and the AirTight Networks logo are trademarks, and AirTight and SpectraGuard are registered trademarks of AirTight Networks, Inc. All other trademarks mentioned herein are properties of their respective owners. Specifications are subject to change without notice.
Wireless Security Online, On-Demand
The subscription can grow organically in both features and scope of scanning
depending on customers’ needs and wireless threat perception.
About AirTight NetworksAirTight Networks is the industry standard for wireless vulnerability management
and the only company that offers a flexible, end-to-end solution that gives customers
visibility into their wireless security posture and a choice in how they manage it. AirTight’s
SpectraGuard Enterprise provides a robust wireless intrusion prevention system (WIPS).
Its SpectraGuard Online service is the world’s first on demand wireless vulnerability
management service which provides a flexible approach to addressing wireless vulner-
abilities with no capital investment. AirTight’s patented technology delivers the key
elements of an effective WIPS to eliminate false alarms, block wireless threats immediately
and automatically and locate wireless devices and events with pinpoint precision. AirTight’s
customers include global retail, financial services, corporate, education and government
organizations. AirTight Networks is a privately held company based in Mountain View, CA.
For more information please visit www.airtightnetworks.com