Kaustubh Phanse - Wireless in the Enterprise: Security Risks, Challenges and the Solution - Interop...

Post on 12-Jan-2015

868 views 0 download

Tags:

description

Unsecured WiFi provides an easy target for hit-and-run style attacks allowing hackers to cause severe damage while remaining invisible and undetected. In fact, recent incidents show a growing trend that unsecured WiFi is becoming a safe haven for cybercriminals. In this session, Dr Phanse will discuss the wireless threat landscape, the business risks, and how enterprises can best secure themselves against wireless vulnerabilities and attacks.

transcript

Wireless in the Enterprise:

Security Risks, Challenges, and the Solution

Kaustubh Phanse

Wireless Architect, AirTight Networks

Convenience

Efficiency

Cost savings

Opportunities

Everywhere

WiFi uses Unlicensed

Frequency Spectrum

Off-the-shelf

Plug and play

Wireless is a wonderful thing, unless you are worried about security.

– John Pescatore, Gartner

“”

Internet

Firewall shields inside from outside

Outside is insecure

Enterprise LAN is confined to wires

Inside is secure

Internet

Wireless security holes bypass the firewall

Network not confined to wires or the building anymore

Wardriving

WEP Encryption

WEP was meant to be “Wired Equivalent Privacy”

WEP turned out to be “Worst Ever Privacy”

WiFi Protected Access (WPA/WPA2)

Simply having “No WiFi” policy

does not make your organization immune to WiFi Threats

Portable

Consumer electronics

Cellular phonesNotebooks,

ultra-mobile PCs

Stationary Consumer

electronics

144

5671

48

23%

33%

52%51%

Source: WiFi Alliance and In-Stat

319 million units shipped in 2008

All notebooks, ultra-mobile PCs will have WiFi

2010

Rogue AP is an unauthorized access point connected to the wired enterprise network

Deployed casually or maliciously

Usually consumer or home-grade APs

Malicious

Deliberate

Inadvertent

Administrators lack transparency and control

Internet

Firewall

Is your sensitive data leaking over the air?

Are your employees connecting to neighboring WiFi networks?

Are Rogue APs attached

to your enterprise network?

Can someone across the street shutdown your WiFi network?

Are you having difficulty enforcing your security policies at multiple sites?

Next Generation Threats and Vulnerabilities Projection

June 2009

WLAN

Infrastructure Attacks

Mobile and Wireless

Device Endpoint Attacks

Wireless intrusion prevention system (WIPS)

Automate your wireless security with a WIPS

Instantaneously detect and block wireless threats

Gain visibility 24x7

Regain and stay in control

Accurately locate wireless devices

The Global Leader in Wireless Security and Compliance Solutions

www.airtightnetworks.com

kaustubh.phanse@airtightnetworks.com