We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byKenny Sharratt
Modified about 1 year ago
Digilogix Next Generation Secure Wi-Fi Hotspot Solution www.digilogix.in Confidential - Do not distribute © 2012 - 13. Digilogix Technologies Pvt. Ltd. All Rights Reserved
© 2011-13. Digilogix Technologies Pvt. Ltd. All Rights Reserved Wi-Fi Hotspot Deployment- Traditional Access Points Network Switch Access Controller Internet Your Wi-Fi Hotspot Infrastructure Users User’s validity check done here Unencrypted connection between user device and network
Key problems of today’s Wi-Fi hotspots 1 Lack of wireless security Majority of Wi-Fi hotspots use open configuration without encryption at wireless level. No online privacy or data protection can be guaranteed to the users in such Wi-Fi hotspot networks. Firewall and Anti-Virus protects your private and confidential data here! How is your private and confidential data protected when they are transmitted in the air? Data exchanged in an open Wi-Fi hotspot A Laptop User Wireless AP/Router © 2011-13. Digilogix Technologies Pvt. Ltd. All Rights Reserved
Common Security Threats: Wi-Fi Hotspots Data sent over unsecured wireless connection ❶Passive Snooping (Session, Cookies, Unencrypted private data etc.) ❷Impersonation/ Identity Theft (MAC/IP Spoofing, Firesheep) Cyber criminal ❸Man-in-the-middle Attack (By planting honeypot AP) © 2011-13. Digilogix Technologies Pvt. Ltd. All Rights Reserved
Common Myth – Web Based User Authentication Username/password == Security Web based login portal is present in most of Wi-Fi hotspots to prevent unauthorized internet access. Users do not get any security cover for their online browsing activity. Moreover, control like this can be bypassed. Tricks and techniques are freely available on the internet. © 2011-13. Digilogix Technologies Pvt. Ltd. All Rights Reserved
Threats and implications of Wi-Fi hotspot insecurity Threat 1: Passive snooping Implication: Loss of private/confidential data transmitted in plain text e.g. cookies for session hijacking. Threat 3: Unauthorized network access Implication: Network is abused for conducting cybercriminal activities such sending emails for terror, extortion etc. Negative publicity and brand erosion for service providers. Threat 2: Evil Twin/MiTM Attack Implication: Loss of private/confidential data, business secrets, emails, IMs, impersonation even if SSL based applications are used e.g. https based web service. Real world Wi-Fi hotspot hacking incidence and news: #1: March 25, 2013 Ashtabula man uses Wi-Fi hotspot at hotel, bank notices fraudulent charges #2: May 14, 2012 FBI sounds alarm on Hotel Wi-Fi caper #3 Oct 15, 2008 UK hotels vulnerable to same Wi-Fi hack as US hotel chain © 2011-13. Digilogix Technologies Pvt. Ltd. All Rights Reserved
Key problems of today’s Wi-Fi hotspots 2 Wireless service usability Wi-Fi hotspot network still use web based user authentication system to provide controlled internet access. While today’s users have started using apps centric internet enabled device such as smartphone and tablet. Use of browser is getting rarer on handhelds. A less informed user often miss to open browser on his handheld, forgets to do user authentication and hence finds difficulty in accessing the internet. This results into need for technical assistance for such guests staying in hotels. © 2011-13. Digilogix Technologies Pvt. Ltd. All Rights Reserved
Key problems of today’s Wi-Fi hotspots 3 Wireless network scalability Majority of Wi-Fi hotspots use open configuration and hence anyone can connect to a traditional Wi-Fi hotspot network. Today’s users use always-on internet capable handhelds such as smartphone and tablet for browsing. In Wi-Fi deployments such as conferences, a lot of casual users connect to Wi-Fi network. Their device remains connected even if they are not browsing. This saturates the network fast and creates wireless connectivity problem for other genuine users. © 2011-13. Digilogix Technologies Pvt. Ltd. All Rights Reserved
Digilogix Secure Wi-Fi Solution Built-in robust security-User’s Privacy and Data Protection Central/Remote Management Multi-Sites Management Multiple Wireless Network Management BYOD Access Management High speed wireless networks: IEEE 802.11n Compliant -150/300 Mbps Key Product Features Product is completely plug-n-play Based on Patent Pending Virtual Wireless Security (vWISE™) Technology Compliant with WPA/WPA2 wireless security standard Unique WPA2 Password for each user with pre-defined validity and auto-expiry Works ALSO with existing Wi-Fi infrastructure & vendor Works with major PMS interface e.g. Opera, IDS, Micros, etc. Both Cloud and Desktop based Server authentication available © 2011-13. Digilogix Technologies Pvt. Ltd. All Rights Reserved
DigiFi-Cloud Our Solution, Your Choice DigiFi Desktop Locally Hosted, Locally Managed DigiFi Cloud Cloud Hosted, Remotely Managed © 2011-13. Digilogix Technologies Pvt. Ltd. All Rights Reserved
Digilogix Secure Wi-Fi Access Access Points Access Control on Cloud Network Switch Less infrastructure overhead for Wi-Fi Hotspot deployment Cost competitive Your Wi-Fi Hotspot Infrastructure User’s validity check done here Users Different password for each and every guest with validity and auto-expiry © 2011-13. Digilogix Technologies Pvt. Ltd. All Rights Reserved
Key Benefits- Security, Usability and Scalability all at one place Lobby Wi-FiRoom Wi-FiConference Wi-Fi Secured Wi-Fi service for walking guests. No unauthorized access possible. 100% user’s privacy and data protection. Browser-less authentication provides seamless internet access for smartphone and tablet users. Zero access related technical support call. Support for personal Wi-Fi network for guests with their name. High availability of Wi-Fi network for real users. Event based Wi-Fi network advertisement on-the-fly at almost zero effort. © 2011-13. Digilogix Technologies Pvt. Ltd. All Rights Reserved
Competitive Differentiation © 2011-13. Digilogix Technologies Pvt. Ltd. All Rights Reserved
We Provide What You Want! Low cost, enterprise grade Zero management overhead Quick installation/less cabling Regulatory compliance Customer satisfaction © 2011-13. Digilogix Technologies Pvt. Ltd. All Rights Reserved
Contact RZF 1/25B, #201, 2nd Floor, Street #1, Mahavir Enclave, New Delhi-110045. Delhi, India Mobile: +91-9555102011 +91-9810633139 Email: email@example.com Web: www.digilogix.in About Digilogix Digilogix, by virtue of its innovative products and solutions, helps businesses build secured and intelligent wireless infrastructure that can benefit businesses in many ways. Most Wi-Fi hotspots in the world are insecure and users of these networks are exposed to a wide array of security problems. Digilogix products can be deployed to offer Wi-Fi security as a value added service to garner the trust of visitors and impact the bottom line of business by converting them into wireless hotspot users. Put our product to the test, Contact us for a free trial today! © 2011-13. Digilogix Technologies Pvt. Ltd. All Rights Reserved Digilogix Technologies Pvt. Ltd.Digilogix Technologies Pvt. Ltd.
Deployment Scenario: Mobile Secured Wi-Fi Hotspots Confidential - Do not distribute © Digilogix Technologies Pvt. Ltd. All Rights Reserved.
Accessing Public Wi-Fi: Security Issues Sankar Roy Department of Computing and Information Sciences Kansas State University.
Short Customer Presentation September The Company Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
DIR-619L Wireless N 300 Cloud Router Sales Guide February 9 th 2011 D-Link HQ.
OPSEC Awareness Briefing Man-In-The-Middle Attacks (MITM)
Page 1 MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their.
Innovation Towards a next generation secure internet Private Application Ecosystems Sanjay Deshpande CEO and Chief Innovation Officer Center.
Simon Prasad. Introduction Smartphone and other mobile devices have made it so easy to stay connected. But this easy availability may lead to personal.
IBM Rational Application Security Group (aka Watchfire) Web Based Man In the Middle Attack © 2009 IBM Corporation 1 Active Man in the Middle Attacks The.
Company Confidential WiFiSPARK Limited The Benefits of Wireless Networking Matt O’Donovan WiFiSPARK Limited Tel :
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices Smartphones Laptops Tablets USB Memory Portable Media Player Handheld.
ORNL Site Report ESCC July 15, 2013 Susan Hicks David Wantland.
Network Security. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Intrusion Detection and Intrusion Prevention.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 2 Network Security Basics.
Total Threat Protection Securing All Your Threat Vectors Hartford Tech Summit.
1 #UPAugusta Today’s Topics What are Deadly IT Sins? Know them. Fear them. Fix them. #UPAugusta201 6.
RUCKUS WIRELESS PROPRIETARY AND CONFIDENTIAL Ruckus Smart Wi-Fi for Retail.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Encrypting Wireless Data with VPN Techniques. Topics Objectives VPN Overview Common VPN Protocols Conclusion.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Doc.: IEEE ai Submission Paul Lambert, Marvell Security Review and Recommendations for IEEE802.11ai Fast Initial Link Setup Author:
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Global Wi-Fi Presented for: YOU. About Global WiFi Why is free Wi-Fi important? What is Social HotSpot™ marketing? How does it work ? What are the benefits.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Presented for: Local Businesses. About Fargo Local Wi-Fi Why is free Wi-Fi important? What is Social HotSpot™ marketing? How does it work ? What are the.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
Mgt 20600: IT Management & Applications Telecommuncations and Networks Tuesday March 28, 2006.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Barracuda Networks Steve Scheidegger Commercial Account Manager
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Network Basics.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Security Issues and Challenges in Cloud Computing Lambu Akhila Reddy CSC 557.
© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Our Products Unified Threat ManagementCyberoam.
A Study of Secure Communications in WiFi Networks Bumjo Park 1 and Namgi Kim 11 1 Dept. Of Computer Science, Kyonggi Univ. San 94-1, Iui, Yeongtong, Suwon,
Mobile and Wireless Security INF245 Guest lecture by Bjorn Jager Molde University College.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
Enterprise | education | public printing locations PrinterOn for Hospitality.
Wireless Security Ysabel Bravo Fall 2004 Montclair State University - NJ.
Wi-Fi Technology ARTI J JANSARI M.E.(C.S.E.):-1ST (E.C.)
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Confidential. For Channel Partners only. Do not distribute. C
© 2017 SlidePlayer.com Inc. All rights reserved.