AirTight Videos

Sign up for a customized personal demo with an AirTight expert.

Fields marked with asterisk (*) are required


    Your privacy is important for us.


All Videos Wireless Security Product Demos Wireless Security Technology Videos Wireless Security hacking videos Interviews
AirTight Social Wi-Fi

Length: 6:00 min

AirTight Social Wi-Fi integrates Wi-Fi access with social network channels to enable onsite user communities and engagement, e.g., retailers with customers, teachers with students and parents.

AirTight Wi-Fi Analytics

Length: 6:00 min

Gain business intelligence using Wi-Fi based anonymous presence analytics, opt-in identity analytics and social demographics of your onsite user community to enable omni-channel engagement.

AirTIght Wi-Fi - Quick installation video

Length: 18:00 min

With zero-touch provisioning and easy centralized management, AirTight's Cloud Wi-Fi solution significantly reduces the cost and IT overhead in deploying and managing distributed Wi-Fi networks.

Cloud-managed Wi-Fi for the Distributed Enterprise

Length: 19:00 min

Powered by a scalable, multi-tenant and fault-tolerant cloud architecture, the AirTight Cloud Wi-Fi solution is ideal for managing distributed Wi-Fi networks across virtually any number of sites.

AirTight Wireless Intrusion Prevention System (WIPS)

Length: 21:00 min

AirTight's patented and industry leading WIPS provides the most comprehensive wireless protection by automatically and accurately detecting, blocking, and locating all types of wireless threats.

AirTight Secure Wi-Fi

Length: 4:15 min

An innovative cloud-based solution that provides a cost-effective and easy way to manage geographically distributed Wi-Fi networks without sacrificing security or compliance and without buying expensive traditional WLAN equipment.

Integration between SpectraGuard Enterprise and McAfee ePO

Length: 03:06 min

This short video will demonstrate how AirTight Networks SpectraGuard Enterprise wireless intrusion prevention system integrates with McAfee ePolicy Orchestrator to strengthen your WLAN security while improving IT response time and lowering operational overhead.

Securing Your Cisco wireless LAN with SpectraGuard Enterprise

Length: 2:52 minutes

Secure your Cisco Wireless LAN with SpectraGuard Enterprise - the best-of-breed wireless intrusion prevention system (WIPS) - while minimizing your administrative burden and total cost of ownership.

Wireless PCI Compliance in under 5 minutes

Length: 3:16 minutes

This video shows how easy and cost-effective it is to automate your wireless PCI vulnerability scanning using AirTight’s SpectraGuard Online. It can be configured and running in as little as 5 minutes and 3 easy steps. No need anymore to send staff to remote locations with a handheld analyzer to conduct the routine PCI wireless scans.

Eliminate Rogue Access Points

Length: 8:13 minutes

This short video will inform you on the risks posed by Rogue Access Points (APs) and how to eliminate Rogue APs from your enterprise once and for all.

Client Misassociation

Length: 6:44 minutes

In this short video we will look at how enterprises can better manage their Wi-Fi users and ensure that they do not unwittingly put the enterprise network at risk or expose sensitive data

Predictive WLAN Performance Management

Lenght: 4:20 minutes

This short video introduces Predictive WLAN Preformance management offered by AirTight Networks as a licensed feature in its SpectraGuard Enterprise wireless intrusion prevention system.

Smart Wireless Forensics at Your Fingertips

Length: 3:30 minutes

This short video introduces AirTight Networks Smart Forensics the latest in wireless forensics technology now available as a licensed feature in SpectraGuard Enterprise intrusion prevention system.

Erratic Wi-Fi haunts iPhone 4 Launch: Can this happen to your enterprise?

Length: 8:58 minutes

The iPhone 4 demo came to a screeching halt at the Apple WWDC 2010 when the iPhone4 failed to get a reliable Wi-Fi connection to its designated access point. Overcrowding of Wi-Fi client devices was adjudged the most likely villain. What exactly went wrong? Can the same happen to your enterprise Wi-Fi network? Can you rely on Wi-Fi to run your business-critical applications? How can you be proactive and avoid getting flooded with help desk calls from your irritated Wi-Fi users. To find out, join Mike Baglietto, Director, Product marketing, AirTight Networks as he engages Pravin Bhagwat, Co-founder and CTO, AirTight Networks in an informal chat.

Why Wireless Scanning is Imperative for PCI Compliance

Length: 8:07 minutes

Dr. Hemant Chaskar, Director of Technology, AirTight Networks
Mike Baglietto, Director of Product Marketing, AirTight Networks

Rogue access points on enterprise network pose serious security threat and also violate PCI (Payment Card Industry) standard. While use of wireless scanning along with wired-wireless traffic correlation is fundamentally robust way for rogue access point detection, wireside-only scanning is sometimes touted as a low cost alternative for detecting rogue access points on network. This video describes why wireside-only scanning in insufficient for security and compliance, and how it causes constant overhead of manual intervention, which in long run can be more expensive than low entry cost.

RSA Conference 2010

Length: 24:09 minutes

RSA Conference 2010, San Francisco

Dr. Kaustubh Phanse, Wireless Architect, AirTight Networks
James Cowing, CISSP,QSA, Digital Resources Group

This session describes the components of a forensic audit with focus on wireless security. We analyze the unique technical challenges wireless presents in securing enterprise network and data, discuss tools for wireless traffic acquisition and analysis, and review the evolution of wireless forensic and anti-forensic techniques. You will also learn about wireless security best practices to proactively avoid a security breach.

Enterprise WiFi Security: Protection or Frustration?

Length: 9:49 minutes

Dr. Hemant Chaskar, Director of Technology, AirTight Networks
Mike Baglietto, Director of Product Marketing, AirTight Networks

WiFi today poses big challenge to enterprise network security. Security lapses in managed Wi-Fi infrastructure as well as vulnerabilities arising from unmanaged, uncontrolled activity such as rogue APs and client misassociations; can result in costly security breaches. Many organizations have taken cognizance of this matter and are acting on it. Wireless security systems are available from many vendors today which claim to mitigate WiFi threats and vulnerabilities. However, incorrect choice of wireless security system can in fact result in frustration for the network and security staff, rather than helping them solve the WiFi security problem. This video explains what to look for in the wireless security system to ensure that you get protection rather than frustration from such security systems.

Marker Packet Techniques Explained

Length: 5:25 minutes

Dr. Hemant Chaskar, Director of Technology, AirTight Networks
Mike Baglietto, Director of Product Marketing, AirTight Networks

Accurate on-wire/off-wire detection of APs in wireless intrusion prevention system (WIPS) is the factor which makes difference between whether "you work for the system" or "system works for you". This video explains how AirTight’s SpectraGuard Enterprise WIPS performs accurate on-wire/off-wired detection via its unique patented marker packet techniques, to positively and accurately identify rogue APs and neighborhood APs without any manual intervention.

WiFish Finder: WiFi Client vulnerability assessment made simple

Length: 21:10 minutes

Md Sohail Ahmad, Manager, R&D, AirTight Networks

WiFish Finder is a tool for assessing whether WiFi devices active in the air are vulnerable to 'Wi-Fishing' attacks. Assessment is performed through a combination of passive traffic sniffing and active probing techniques. Most WiFi clients keep a memory of networks (SSIDs) they have connected to in the past. Wi-Fish Finder first builds a list of probed networks and then using a set of clever techniques also determines security setting of each probed network.

Wi Fi Wireless Networks Open To Attack

Length: 3:31 minutes

Many home Wi-Fi's have little or no protection and computer hackers trolling for victims can easily break in.

FOX 5's Sherri Ly and AirTight Researcher Rick Farina went into some local neighborhoods and it didn't take long to find people who left their computers wide open

Autoimmunity Disorder in Wireless LAN

Length: 2 minutes

Rick Farina,Senior Wireless Security Researcher, AirTight Networks

The Video demonstrates how the methodology used to study the phenomenon in humans can be applied to study wireless systems when they are invaded by intruders such as foreign clients or malicious code

Caffe Latte attack

Length: 7:39 minutes

Rick Farina ,Senior Wireless Security Researcher. AirTight Networks

The video demonstrates that it is possible to retrieve the WEP key from an isolated Client - the Client can be on the Moon! - using a new technique called "AP-less WEP Cracking".

Hacking HTTPS over WiFi

Hacking HTTPS over WiFi

Length:3:45 minutes

Vivek Ramchandran, Wireless Security Researcher, AirTight Networks

Secure Socket Layer (SSL) protocol is widely used for running secure applications (e.g., HTTPS). However, a WiFi man-in-the-middle attack can allow a hacker to bypass SSL and access sensitive data. Watch this video to see how a hacker can steal email login and password sent over HTTPS.

In an interview with TMCnet, Kaustubh Phanse, Director Technology, AirTight Networks, discusses the first cloud-based solution combining simultaneous wireless access and intrustion detection and prevention management

Interview with AirTight Networks CTO Pravin Bhagwat - hosted by TMCNet

In an interview with TMCnet, Dr. Pravin Bhagwat, CTO and Co-founder, AirTight Networks, elaborates ways in which Wi-Fi vulnerabilities can tear down the network security perimeter of any organization, including those who have not officially deployed Wi-Fi, and how a wireless intrusion prevention system (WIPS) can detect and block inadvertent misuse of Wi-Fi as well as protect enterprises from Wi-Fi hack attacks.

Interview with AirTight Networks CEO David King – hosted by TMCNet

Interview with AirTight Networks CEO David King – hosted by TMCNet

Length:20:10 minutes

David King, Chairman and CEO of AirTight Networks, talks about the ever growing risks from the pervasive Wi-Fi technology, describes common wireless threat scenarios, and discusses the role played by a wireless intrusion prevention system (WIPS) in protecting enterprise networks from wireless threats.

Security experts warn of dangers of rogue Wi-Fi hotspots

Length: 3:30 minutes

AirTight Networks President Kiran Deshpande demonstrates security risks to Wi-Fi hotspot users, in this interview with CNN International at London Heathrow airport.

AirTight Networks at HIMSS 2010

Length 2:42 minutes

Tom Conklin, Federal Sales Manager, AirTight Networks.

AirTight Networks presented its enterprise wireless security product 'SpectraGuard Enterprise' at HIMSS 2010 and was rated amongst the top 10 security products for healthcare. During the event, Tom Conklin, Federal Sales Manager from AirTight Networks, was interviewed.