We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
supports HTML5 video
Published byKenny Sharratt
Modified over 3 years ago
Digilogix Next Generation Secure Wi-Fi Hotspot Solution www. digilogixDigilogix Next Generation Secure Wi-Fi Hotspot Solution Confidential - Do not distribute © Digilogix Technologies Pvt. Ltd. All Rights Reserved
Wi-Fi Hotspot Deployment-TraditionalYour Wi-Fi Hotspot Infrastructure Access Points Network Switch Access Controller Internet User’s validity check done here Users Unencrypted connection between user device and network © Digilogix Technologies Pvt. Ltd. All Rights Reserved
Key problems of today’s Wi-Fi hotspots1 Lack of wireless security Majority of Wi-Fi hotspots use open configuration without encryption at wireless level. No online privacy or data protection can be guaranteed to the users in such Wi-Fi hotspot networks. Firewall and Anti-Virus protects your private and confidential data here! How is your private and confidential data protected when they are transmitted in the air? Data exchanged in an open Wi-Fi hotspot A Laptop User Wireless AP/Router © Digilogix Technologies Pvt. Ltd. All Rights Reserved
Common Security Threats: Wi-Fi HotspotsData sent over unsecured wireless connection ❷Impersonation/ Identity Theft (MAC/IP Spoofing, Firesheep) ❶Passive Snooping (Session, Cookies, Unencrypted private data etc.) ❸Man-in-the-middle Attack (By planting honeypot AP) Cyber criminal © Digilogix Technologies Pvt. Ltd. All Rights Reserved
Common Myth – Web Based User AuthenticationUsername/password == Security Web based login portal is present in most of Wi-Fi hotspots to prevent unauthorized internet access. Users do not get any security cover for their online browsing activity. Moreover, control like this can be bypassed. Tricks and techniques are freely available on the internet. © Digilogix Technologies Pvt. Ltd. All Rights Reserved
Threats and implications of Wi-Fi hotspot insecurityThreat 1: Passive snooping Implication: Loss of private/confidential data transmitted in plain text e.g. cookies for session hijacking. Threat 2: Evil Twin/MiTM Attack Implication: Loss of private/confidential data, business secrets, s, IMs, impersonation even if SSL based applications are used e.g. https based web service. Threat 3: Unauthorized network access Implication: Network is abused for conducting cybercriminal activities such sending s for terror, extortion etc. Negative publicity and brand erosion for service providers. Real world Wi-Fi hotspot hacking incidence and news: #1: March 25, 2013 Ashtabula man uses Wi-Fi hotspot at hotel, bank notices fraudulent charges #2: May 14, 2012 FBI sounds alarm on Hotel Wi-Fi caper #3 Oct 15, 2008 UK hotels vulnerable to same Wi-Fi hack as US hotel chain © Digilogix Technologies Pvt. Ltd. All Rights Reserved
Key problems of today’s Wi-Fi hotspots2 Wireless service usability Wi-Fi hotspot network still use web based user authentication system to provide controlled internet access. While today’s users have started using apps centric internet enabled device such as smartphone and tablet. Use of browser is getting rarer on handhelds. A less informed user often miss to open browser on his handheld, forgets to do user authentication and hence finds difficulty in accessing the internet. This results into need for technical assistance for such guests staying in hotels. © Digilogix Technologies Pvt. Ltd. All Rights Reserved
Key problems of today’s Wi-Fi hotspots3 Wireless network scalability Majority of Wi-Fi hotspots use open configuration and hence anyone can connect to a traditional Wi-Fi hotspot network. Today’s users use always-on internet capable handhelds such as smartphone and tablet for browsing. In Wi-Fi deployments such as conferences, a lot of casual users connect to Wi-Fi network. Their device remains connected even if they are not browsing. This saturates the network fast and creates wireless connectivity problem for other genuine users. © Digilogix Technologies Pvt. Ltd. All Rights Reserved
Digilogix Secure Wi-Fi SolutionProduct is completely plug-n-play Based on Patent Pending Virtual Wireless Security (vWISE™) Technology Compliant with WPA/WPA2 wireless security standard Unique WPA2 Password for each user with pre-defined validity and auto-expiry Works ALSO with existing Wi-Fi infrastructure & vendor Works with major PMS interface e.g. Opera, IDS, Micros, etc. Both Cloud and Desktop based Server authentication available Built-in robust security-User’s Privacy Multiple Wireless Network Management and Data Protection BYOD Access Management Central/Remote Management High speed wireless networks: IEEE n Compliant -150/300 Mbps Multi-Sites Management Key Product Features © Digilogix Technologies Pvt. Ltd. All Rights Reserved
Our Solution, Your ChoiceDigiFi-Cloud DigiFi Desktop Locally Hosted, Locally Managed DigiFi Cloud Cloud Hosted, Remotely Managed -connect once, use anywhere - © Digilogix Technologies Pvt. Ltd. All Rights Reserved
Access Control on CloudDigilogix Secure Wi-Fi Access Your Wi-Fi Hotspot Infrastructure Access Points Access Control on Cloud Network Switch User’s validity check done here Users Different password for each and every guest with validity and auto-expiry Less infrastructure overhead for Wi-Fi Hotspot deployment Cost competitive © Digilogix Technologies Pvt. Ltd. All Rights Reserved
Key Benefits- Security, Usability and Scalability all at one placeLobby Wi-Fi Room Wi-Fi Conference Wi-Fi Secured Wi-Fi service for walking guests. No unauthorized access possible. 100% user’s privacy and data protection. Browser-less authentication provides seamless internet access for smartphone and tablet users. Zero access related technical support call. Support for personal Wi-Fi network for guests with their name. High availability of Wi-Fi network for real users. Event based Wi-Fi network advertisement on-the-fly at almost zero effort. -connect once, use anywhere - © Digilogix Technologies Pvt. Ltd. All Rights Reserved
Competitive DifferentiationWi-Fi Features Standalone SOHO APs based WLAN Solution (e.g. D-Link, TP-Link,Belkin) Enterprise Controller based WLAN Solution (e.g. Cisco, Aruba, Ruckus) Digilogix WLAN Solutions Remote WLAN Management No Yes Multiple Site/Deployment Management Multiple Wi-Fi Network Management BYOD Access Management Provision for Secure Hotspot Wi-Fi Internet Access Roaming Support Across Multiple Sites Support for remotely managed mobile Wi-Fi Spot Need of a dedicated Controller H/w Appliance Not available © Digilogix Technologies Pvt. Ltd. All Rights Reserved
We Provide What You Want!Low cost, enterprise grade Zero management overhead Quick installation/less cabling Regulatory compliance Customer satisfaction © Digilogix Technologies Pvt. Ltd. All Rights Reserved
Contact us for a free trial today!Put our product to the test, Contact us for a free trial today! Digilogix Technologies Pvt. Ltd. Contact RZF 1/25B, #201, 2nd Floor, Street #1, Mahavir Enclave, New Delhi Delhi, India Mobile: Web: About Digilogix Digilogix, by virtue of its innovative products and solutions, helps businesses build secured and intelligent wireless infrastructure that can benefit businesses in many ways . Most Wi-Fi hotspots in the world are insecure and users of these networks are exposed to a wide array of security problems. Digilogix products can be deployed to offer Wi-Fi security as a value added service to garner the trust of visitors and impact the bottom line of business by converting them into wireless hotspot users. © Digilogix Technologies Pvt. Ltd. All Rights Reserved
Wi-Fi Technology ARTI J JANSARI M.E.(C.S.E.):-1ST (E.C.)
Encrypting Wireless Data with VPN Techniques
Powerful and convenient management for Windows Mobile ® 6.1 devices in an enterprise environment. These features include: Centralized, over-the-air device.
DIR-619L Wireless N 300 Cloud Router Sales Guide February 9 th 2011 D-Link HQ.
Speaker Name, Title Windows 8 Pro: For Small Business.
Accessing Public Wi-Fi: Security Issues Sankar Roy Department of Computing and Information Sciences Kansas State University.
Innovation Towards a next generation secure internet Private Application Ecosystems Sanjay Deshpande CEO and Chief Innovation Officer Center.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
SMC2804WBRP-G Barricade™ g 2.4GHz 54Mbps Wireless Cable/DSL Broadband Router with USB Print Server SMC2804WBRP-G
BZUPAGES.COM BSIT BZUPAGES.COM BSIT ON.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Network Basics.
Page 1 MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their.
Ruckus Smart Wi-Fi for Retail
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management.
Deployment Scenario: Mobile Secured Wi-Fi Hotspots Confidential - Do not distribute © Digilogix Technologies Pvt. Ltd. All Rights Reserved.
OPSEC Awareness Briefing Man-In-The-Middle Attacks (MITM)
Company Confidential WiFiSPARK Limited The Benefits of Wireless Networking Matt O’Donovan WiFiSPARK Limited Tel :
© 2018 SlidePlayer.com Inc. All rights reserved.