AirTight Networks

Displaying 1-19 of 19 results

  • Webcasts // Jan 2010

    Windows 7 - A New Wireless Security Risk to the Enterprise

    There was a New Wireless Security Risk to the Enterprise edition of windows when it was launched in November 2009, and not many have written about this issue, or how vulnerable the issue is. This webcast discusses the application which has the capability to turn the employees' Wi-Fi enabled corporate...

    Provided By AirTight Networks

  • Webcasts // Jan 2010

    Wireless Security: The Easiest PCI Investment to Justify

    As there is development in technology there is simultaneous growth of various risks that are connected to the industry. This webcast offers the attendee information regarding the Wireless Security, and many more things that are related to this issue. The webcast is presented by John Kindervag who is the Senior...

    Provided By AirTight Networks

  • Webcasts // Jan 2010

    Conquering the Minefield of Soft Rogue APs in Enterprise Networks

    A soft Access Point (AP)is a device such as a laptop or other wireless enabled device which performs traffic forwarding between its wireless interface and some other interface which is in turn connected to a secure network. The major advantage of using the soft AP is that this can show...

    Provided By AirTight Networks

  • Webcasts // Oct 2009

    Preparing for a Wireless Audit for PCI DSS Compliance

    Whether or not wireless is deployed in the cardholder data environment, every organization subject to PCI has a minimum set of wireless security requirements. Preparing the organization to comply with the PCI DSS Wireless Requirements does not have to be a daunting task. The presenters of this webcast will demystify...

    Provided By AirTight Networks

  • Webcasts // Sep 2009

    Skyjacking a Cisco WLAN Access Point: Attack Analysis and Countermeasures

    This webcast will deconstruct the skyjacking vulnerability - explaining why the vulnerability occurs in Cisco WLANs, which Cisco access points are affected, how skyjacking can be exploited to launch potent attacks, and what are the best practices to proactively protect the enterprise network against such zero-day vulnerabilities and attacks.

    Provided By AirTight Networks

  • Webcasts // Jul 2009

    How the PCI Wireless Guidelines Apply to You

    PCI Council Wireless SIG published wireless guidelines for PCI DSS. PCI Security Standards Council has acknowledged that wireless is a clear and present danger to network security and those who collect, store or transmit card holder data must take steps to assure that it is secure, whether or not wireless...

    Provided By AirTight Networks

  • White Papers // Jul 2009

    Walk Around Wireless Security Audits - The End Is Near!

    This paper describes a new hosted service architecture offered by AirTight Networks that enables effortless, automated wireless security audits from anywhere on the Internet, anytime. No more "Walk Arounds." Plug-and-play wireless scanners onsite scan round-the-clock without human intervention, and securely communicate with a central server hosted on the Internet in...

    Provided By AirTight Networks

  • White Papers // Jul 2009

    Don't Let Wireless Detour Your PCI Compliance: Understanding the PCI DSS Wireless Requirements

    The Payment Card Industry Security Standards Council (PCI SSC) has published a PCI DSS Wireless Guideline which acknowledges that wireless is a clear and present danger to network security and those who collect, store or transmit card holder data must take steps to assure that it is secure, whether or...

    Provided By AirTight Networks

  • White Papers // May 2009

    Complying With DoT Regulation on Secure Use of WiFi: Less in Letter, More in Spirit

    The Department of Telecommunications (DoT), Government of India, recently published a regulation (dated February 23, 2009) outlining the procedure for secure use of WiFi. All Internet Service Providers (ISPs) - serving leased line subscribers, home users, and WiFi hotspots in public places - have four months to comply. The DoT...

    Provided By AirTight Networks

  • Webcasts // Apr 2009

    Case Study Webinar? How to Secure Your Cisco WLAN Today

    This webcast will give attendees a real life case study of how one organization avoided pitfalls while expanding and remediating it's Cisco WLAN and achieved the best performance and robust and accurate wireless security for mission critical applications it was running over wireless.

    Provided By AirTight Networks

  • White Papers // Feb 2009

    New Avatars of Honeypot Attacks on WiFi Networks

    WiFi has become mainstream technology in offices, homes and public places. While WiFi infrastructure has proliferated over the years, WiFi security awareness lags behind. Honeypot (Evil Twin) is one of the many security threats that WiFi infrastructure and clients face today. Moreover, due to discoveries of several new 802.11 vulnerabilities...

    Provided By AirTight Networks

  • White Papers // Feb 2009

    Wireless Vulnerability Management: What It Means for Your Enterprise

    A Wireless Intrusion Prevention System (WIPS) is the prevalent approach for mitigating wireless security threats. However, businesses cannot always justify the cost of buying a full-fledged WIPS solution. Some consider the limited WIPS functionality in-built in certain WLAN infrastructure as sufficient. For others that do not own a WLAN, a...

    Provided By AirTight Networks

  • White Papers // Feb 2009

    802.11n the Good, the Bad, and the Ugly: Will You Be Ready?

    802.11n is poised to become the de facto wireless LAN technology in the near future. Four key factors that underpin successful 802.11n execution are: a sound migration strategy, RF planning, up-to-date wireless security, and performance monitoring. Understanding these aspects will help businesses avoid expensive mistakes and reap maximum benefits from...

    Provided By AirTight Networks

  • White Papers // Feb 2009

    Wireless Security Online, On-Demand: Cost-Effective, Customizable, Effortless, and Proactive Management of Your Wireless Threat Exposure

    This paper introduces a novel way for enabling on-demand wireless security that is affordable, effortless, and customizable. In this new architecture, wireless security is delivered over the Internet bringing a revolutionary change in how businesses manage their wireless threat exposure. Depending on their needs, businesses choose and pay only for...

    Provided By AirTight Networks

  • Webcasts // Jan 2009

    Understanding Wi-Fi Security Vulnerabilities and Ways of Mitigating Them

    This webcast discusses on important Wi-Fi security issues and the solutions available to address them. Enterprises which need to secure their networks from Wi-Fi threats in order to protect their information assets, prevent unauthorized use of their network, enforce no-Wi-Fi zones, and meet regulatory compliance for themselves and their clients...

    Provided By AirTight Networks

  • Webcasts // Jan 2009

    Effective Strategies for Evaluating Your WLAN Security

    This webcast offers a practical guide for selecting a WLAN security solution. The presenter explains the prevalent methods for wireless access point detection and classification.

    Provided By AirTight Networks

  • Webcasts // Jan 2009

    Gartner Analyst, John Pescatore, Discusses Wireless Security as SaaS

    With the proliferation of wireless technology throughout the enterprise, multi-dimensional attacks combined with a lack of wireless expertise can challenge even the most experienced IT staff. Security conscious organizations are faced with 3 key wireless security requirements: protect the business from unauthorized users, safeguard sensitive data, and meet evolving compliance...

    Provided By AirTight Networks

  • Webcasts // Jan 2009

    PCI DSS and the Wireless Connection: Pay Attention - TJX Was No Accident!

    There's a New Sherriff in Town and He's Getting Tough on Wireless Security. His name is the PCI DSS 1.2 and wireless security has finally been recognized as an important component of protecting the network and the WLAN.

    Provided By AirTight Networks

  • Webcasts // Jan 2009

    Case Study Webinar - How to Secure Your Cisco WLAN Today

    This webcast shows how to secure Cisco WLAN. The attendee will learn about the Effective pre-deployment planning including predictive RF planning, RF site survey, etc. The presenter gives key best practices to follow for securing WLAN.

    Provided By AirTight Networks

  • White Papers // Feb 2009

    Wireless Vulnerability Management: What It Means for Your Enterprise

    A Wireless Intrusion Prevention System (WIPS) is the prevalent approach for mitigating wireless security threats. However, businesses cannot always justify the cost of buying a full-fledged WIPS solution. Some consider the limited WIPS functionality in-built in certain WLAN infrastructure as sufficient. For others that do not own a WLAN, a...

    Provided By AirTight Networks

  • Webcasts // Sep 2009

    Skyjacking a Cisco WLAN Access Point: Attack Analysis and Countermeasures

    This webcast will deconstruct the skyjacking vulnerability - explaining why the vulnerability occurs in Cisco WLANs, which Cisco access points are affected, how skyjacking can be exploited to launch potent attacks, and what are the best practices to proactively protect the enterprise network against such zero-day vulnerabilities and attacks.

    Provided By AirTight Networks

  • Webcasts // Jul 2009

    How the PCI Wireless Guidelines Apply to You

    PCI Council Wireless SIG published wireless guidelines for PCI DSS. PCI Security Standards Council has acknowledged that wireless is a clear and present danger to network security and those who collect, store or transmit card holder data must take steps to assure that it is secure, whether or not wireless...

    Provided By AirTight Networks

  • Webcasts // Jan 2009

    Understanding Wi-Fi Security Vulnerabilities and Ways of Mitigating Them

    This webcast discusses on important Wi-Fi security issues and the solutions available to address them. Enterprises which need to secure their networks from Wi-Fi threats in order to protect their information assets, prevent unauthorized use of their network, enforce no-Wi-Fi zones, and meet regulatory compliance for themselves and their clients...

    Provided By AirTight Networks

  • Webcasts // Jan 2009

    Effective Strategies for Evaluating Your WLAN Security

    This webcast offers a practical guide for selecting a WLAN security solution. The presenter explains the prevalent methods for wireless access point detection and classification.

    Provided By AirTight Networks

  • Webcasts // Jan 2009

    Gartner Analyst, John Pescatore, Discusses Wireless Security as SaaS

    With the proliferation of wireless technology throughout the enterprise, multi-dimensional attacks combined with a lack of wireless expertise can challenge even the most experienced IT staff. Security conscious organizations are faced with 3 key wireless security requirements: protect the business from unauthorized users, safeguard sensitive data, and meet evolving compliance...

    Provided By AirTight Networks

  • Webcasts // Apr 2009

    Case Study Webinar? How to Secure Your Cisco WLAN Today

    This webcast will give attendees a real life case study of how one organization avoided pitfalls while expanding and remediating it's Cisco WLAN and achieved the best performance and robust and accurate wireless security for mission critical applications it was running over wireless.

    Provided By AirTight Networks

  • Webcasts // Jan 2009

    PCI DSS and the Wireless Connection: Pay Attention - TJX Was No Accident!

    There's a New Sherriff in Town and He's Getting Tough on Wireless Security. His name is the PCI DSS 1.2 and wireless security has finally been recognized as an important component of protecting the network and the WLAN.

    Provided By AirTight Networks

  • White Papers // Feb 2009

    802.11n the Good, the Bad, and the Ugly: Will You Be Ready?

    802.11n is poised to become the de facto wireless LAN technology in the near future. Four key factors that underpin successful 802.11n execution are: a sound migration strategy, RF planning, up-to-date wireless security, and performance monitoring. Understanding these aspects will help businesses avoid expensive mistakes and reap maximum benefits from...

    Provided By AirTight Networks

  • White Papers // Feb 2009

    Wireless Security Online, On-Demand: Cost-Effective, Customizable, Effortless, and Proactive Management of Your Wireless Threat Exposure

    This paper introduces a novel way for enabling on-demand wireless security that is affordable, effortless, and customizable. In this new architecture, wireless security is delivered over the Internet bringing a revolutionary change in how businesses manage their wireless threat exposure. Depending on their needs, businesses choose and pay only for...

    Provided By AirTight Networks

  • White Papers // Jul 2009

    Walk Around Wireless Security Audits - The End Is Near!

    This paper describes a new hosted service architecture offered by AirTight Networks that enables effortless, automated wireless security audits from anywhere on the Internet, anytime. No more "Walk Arounds." Plug-and-play wireless scanners onsite scan round-the-clock without human intervention, and securely communicate with a central server hosted on the Internet in...

    Provided By AirTight Networks

  • White Papers // Jul 2009

    Don't Let Wireless Detour Your PCI Compliance: Understanding the PCI DSS Wireless Requirements

    The Payment Card Industry Security Standards Council (PCI SSC) has published a PCI DSS Wireless Guideline which acknowledges that wireless is a clear and present danger to network security and those who collect, store or transmit card holder data must take steps to assure that it is secure, whether or...

    Provided By AirTight Networks

  • Webcasts // Oct 2009

    Preparing for a Wireless Audit for PCI DSS Compliance

    Whether or not wireless is deployed in the cardholder data environment, every organization subject to PCI has a minimum set of wireless security requirements. Preparing the organization to comply with the PCI DSS Wireless Requirements does not have to be a daunting task. The presenters of this webcast will demystify...

    Provided By AirTight Networks

  • Webcasts // Jan 2009

    Case Study Webinar - How to Secure Your Cisco WLAN Today

    This webcast shows how to secure Cisco WLAN. The attendee will learn about the Effective pre-deployment planning including predictive RF planning, RF site survey, etc. The presenter gives key best practices to follow for securing WLAN.

    Provided By AirTight Networks

  • Webcasts // Jan 2010

    Windows 7 - A New Wireless Security Risk to the Enterprise

    There was a New Wireless Security Risk to the Enterprise edition of windows when it was launched in November 2009, and not many have written about this issue, or how vulnerable the issue is. This webcast discusses the application which has the capability to turn the employees' Wi-Fi enabled corporate...

    Provided By AirTight Networks

  • Webcasts // Jan 2010

    Wireless Security: The Easiest PCI Investment to Justify

    As there is development in technology there is simultaneous growth of various risks that are connected to the industry. This webcast offers the attendee information regarding the Wireless Security, and many more things that are related to this issue. The webcast is presented by John Kindervag who is the Senior...

    Provided By AirTight Networks

  • Webcasts // Jan 2010

    Conquering the Minefield of Soft Rogue APs in Enterprise Networks

    A soft Access Point (AP)is a device such as a laptop or other wireless enabled device which performs traffic forwarding between its wireless interface and some other interface which is in turn connected to a secure network. The major advantage of using the soft AP is that this can show...

    Provided By AirTight Networks

  • White Papers // May 2009

    Complying With DoT Regulation on Secure Use of WiFi: Less in Letter, More in Spirit

    The Department of Telecommunications (DoT), Government of India, recently published a regulation (dated February 23, 2009) outlining the procedure for secure use of WiFi. All Internet Service Providers (ISPs) - serving leased line subscribers, home users, and WiFi hotspots in public places - have four months to comply. The DoT...

    Provided By AirTight Networks

  • White Papers // Feb 2009

    New Avatars of Honeypot Attacks on WiFi Networks

    WiFi has become mainstream technology in offices, homes and public places. While WiFi infrastructure has proliferated over the years, WiFi security awareness lags behind. Honeypot (Evil Twin) is one of the many security threats that WiFi infrastructure and clients face today. Moreover, due to discoveries of several new 802.11 vulnerabilities...

    Provided By AirTight Networks