AirTight Webinars

Sign up for a customized personal demo with an AirTight expert.

Fields marked with asterisk (*) are required

  •  

    Your privacy is important for us.


Watch this space for announcements on future webinars.


Upcoming Webinars


How to Monetize Wi-Fi Analytics

Date: September 30, 2014
Time: 8am PST

Presenter: Sean Blanton, Systems Engineer Manager, Western Region

Join us for the 3rd installment of our Social Wi-Fi and Analytics webinar series. In this 30 minute webinar we will introduce how to monetize Wi-Fi Analytics. The purpose of this webinar is to perform an in depth Breakdown of Wi-Fi Analytics and How to Monetize it

Topics:

  • Dwell Time
  • Foot Traffic
  • Capture: The amount of clients who come into a location (vs those who pass by)
  • Conversion
  • Loyalty
  • Considerations when analyzing data
  • Monetization
802.11ac Channel Capacity Planning

Date: October 14, 2014
Time: 8am & 6pm PST

Presenter: Robert Ferruolo, Senior Technical Engineer

Join us for the 5th installment of our 802.11ac webinar series. In this 30 minute webinar you will learn about 802.11ac Channel Capacity Planning

Topics:

  • Discovering Applications, Client Devices, Physical Environment, Etc.
  • Determining Use Case Specifics
  • Calculating Per Client Airtime Utilization
  • Calculating Required Number a Radios/Channels for a Given Use Case



Recorded Webinars


Wireless Security Strategies for 802.11ac and the Internet of Things

Length:30 min

Presenter: Hemant Chaskar, Vice President of Technology and Innovation

View this webinar to learn Wireless Security Strategies for 802.11ac and the Internet of Things (IoT) 

In this 30 minute webinar you will learn about:

  • How do you secure your network with the rise of 802.11ac devices and IoT in the wireless neighborhood?
  • What is the reality of IoT? How it affects your Wi-Fi security
  • Industry Specific examples where IoT security may be a concern
  • The impact of IoT and 802.11ac
  • Network security concerns with IoT
  • Why native/specialized/specific 802.11ac security is required
  • Existing/Traditional approaches to 802.11ac
  • Next Generation Strategies for 802.11ac security challenges 
Introduction to Social Wi-Fi and Analytics

Length:30 min

Presenter:  
Sean Blanton, Systems Engineer Manager – Western Region, AirTight Networks

View the 2nd installment of our Social Wi-Fi and Analytics webinar series. In this 30 minute webinar we will introduce deeper dive concepts of Social/Engagement Wi-Fi and Analytics. 

Topics covered throughout the webinar include:

  • Guest Manager System (GMS): External system to host splash pages
  • Social Wi-Fi using publicly available API's
  • Engagement Wi-Fi using built-in plugins to support "web forms"
  • Wi-Fi Analytics using anonymous recording of client device behavior when in range of the sensor
802.11ac Deployment Best Practices

Length:30 min

Presenter:
Robert Ferruolo, Senior Technical Engineer, AirTight Networks

View the 4th installment of our 802.11ac webinar series. In this 30 minute webinar you will learn about 802.11ac Deployment Best Practices. 

Topics include:

  • Switching Infrastructure Recommendations 
  • PoE Requirements 
  • AP Density 
  • Signal Strength/SNR Recommendations 
  • 2.4GHz Considerations 
  • WIPS Sensors 
Introduction to Social Wi-Fi and Analytics

Length:30 min

Presenter:
Sean Blanton, Senior Systems Engineer, AirTight Networks

View this Social Wi-Fi and Analytics webinar. In this 30 minute webinar we have introduced the general concepts of Social/Engagement Wi-Fi and Analytics. 

Topics:

  • What is "Social Wi-Fi"?
  • What is "Engagement Wi-Fi"?
  • What is "Wi-Fi and Social Analytics"?
  • Why do we do it? 
Introduction to 802.11ac - 802.11n vs 802.11ac

Length:30 min

Presenter:
Robert Ferruolo, Senior Technical Engineer, AirTight Networks

View the 3rd installment of our 802.11ac webinar series. In this 30 minute webinar you will learn if 802.11ac is right for your network. 

Topics discussed:

  • Determining if 11ac is the Right Choice
  • Technical capacity differences between 11n and 11ac
  • 11ac use cases by industry
  • Requirements to solutions for specific verticals 
Introduction to 802.11ac - 802.11n vs 802.11ac

Length: 30:00 min

Speakers:
Robert Ferruolo, Senior Technical Engineer, AirTight Networks

Topics discussed:

  • 11ac Feature Review 
  • Channel Availability 
  • QAM 
  • Beamforming 
  • MIMO 
  • MU-MIMO 
  • Frame Aggregation 
  • Error Correction
Introduction to 802.11ac - 802.11n vs 802.11ac

Length: 30:00 min

Speakers:
Robert Ferruolo, Senior Technical Engineer, AirTight Networks

Topics discussed:

  • Technical differences between 11n and 11ac
  • 11ac use cases by industry
  • Determining if 11ac is the right choice
Wireless PCI Compliance - Are you ready for DSS 3.0?

Length: 47:30 min

Speakers:
Kevin McCauley, Director of Retail Market Development, AirTight Networks
Andrew von Nagy, Director of Evangelism, AirTight Networks

View this webinar to learn:

  • Key Do's and Don'ts of securing your data in the age of mobility
  • How wireless projects can affect PCI Compliance
  • How to get ready for PCI DSS 3.0

Length:60 min

Speakers:
Joe Skorupa, Editor-in-Chief, RIS News
Robert Fort, Former CIO of Wet Seal
Kevin S. McCauley, Director, Retail Market Development, AirTight Networks

View this webinar to learn:
The omnichannel technologies examined in this online session involve using Wi-Fi to increase in-store conversions and loyalty, analytics to understand in-store shopper behavior, and Web capabilities to personalize the shopping experiences.

Length:69 min

Speakers:
Steve Rowen, Analyst,  RSR Research
Dr. Kaustubh Phanse, Chief Evangelist & Wireless Architect, AirTight Networks

View this webinar to learn:

  • How the best retailers are treating store technologies differently than their competitors;
  • Getting past the 'fear of showrooming';
  • What role Wi-Fi plays in helping stores compete with channel-blind consumers;  
  • How reliable in-store Wi-Fi can allow you to deploy applications to increase employee efficiency; and
  • Using social Wi-Fi and guest analytics to increase customer loyalty.
Live Demo:  Cloud Wi-Fi Armed to Defend Your Network 24/7

Length:64 min

Speaker: Kaustubh Phanse, Principal Wireless Architect, AirTight Networks

View live demo of AirTight Wi-FiTM to find out how easy and cost-effective it is to deploy and manage AirTight's cloud-managed Wi-Fi and security at ten or tens of thousands of distributed locations. AirTight Wi-Fi is also the only Wi-Fi solution that is armed with a concurrent wireless intrusion prevention system (WIPS) to defend your network from wireless threats 24/7.

Understanding WLAN Performance and Security Challenges with BYOD

Length:60 min

Speakers:
Joe Bardwell, Chief Scientist, Connect802
Dr. Kaustubh Phanse, Principal Wireless Architect, AirTight Networks

View this webinar to learn:

  • Top 4 challenges to integrating BYOD and Mobile Internet into your WLAN
  • Techniques to evaluate your Wireless LAN performance
  • Security challenges BYOD introduces
  • How to enhance your WLAN's ROI

This Webinar concludes with a live demonstration of AirTight's BYOD capabilities for ensuring enterprise WLAN security and performance.

Is BYOD a threat to your network security?

Managing the risk from iPhones, iPads, Androids and Tablets

Length:72 min

Speakers:
Dr, Kaustubh Phanse, Principal Wireless Architect, AirTight Networks
Della Lowe, Sr. Director of Global Marketing, AirTight Networks

View this webinar to know:

  • How to identify smartphones connected to your network
  • To define and enforce a smartphone access policy
  • Why Mobile Device Management (MDM) alone cannot restrict unapproved smart device connections
  • Controls to restrict access of personal smart devices on your network
Deploy BYOD Secure Wi-Fi for your Distributed Enterprise

Length: 54 min

Speakers:
Dr. Kaustubh Phanse, Principal Wireless Architect, AirTight Networks
Della Lowe, Sr. Director, Global Marketing, AirTight Networks

AirTight experts discuss:

  • Controller vs. Cloud managed Wi-Fi architectures
  • Advantages of hierarchical policy definition and control
  • Security implications of Wi-Fi and the importance of auto-prevention
  • Why a cloud-based Wi-Fi solution makes sense for your budget
iPhones, iPads and Androids: Are unmanaged "Smart" devices outsmarting your network security

Length: 47 min

Speaker:
Mike Baglietto, Director of Product Marketing, AirTight Networks

Watch this webinar to understand:

  • Pros and cons of various approaches for wireless PCI scanning
  • How to comply with the PCI DSS wireless security requirements by achieving real security at less cost
  • Why a cloud-based wireless PCI scanning solution makes more sense for distributed enterprises
Eliminate the Cost and Complexity of Deploying Distributed Wi-Fi in Retail

Length: 52 min

Speaker:
Dr. Kaustubh Phanse, Principal Wireless Architect, AirTight Networks
Mike Baglietto, Director of Product Marketing, AirTight Networks

View this webinar to know:

  • Controller vs. Cloud managed Wi-Fi architectures
  • Advantages of hierarchical policy definition and control
  • Security implications of Wi-Fi and the importance of auto-prevention
  • Why a cloud-based Wi-Fi solution makes sense for your budget
Stop wasting time and money on your wireless PCI compliance!

Get more than a checkmark for less than a manual scan

Length:36 min

Speaker:
Mike Baglietto, Director of Product Marketing, AirTight Networks

Watch this webinar and learn:

  • Pros and cons of various approaches for wireless PCI scanning
  • How to comply with the PCI DSS wireless security requirements by achieving real security at less cost
  • Why a cloud-based wireless PCI scanning solution makes more sense for distributed enterprises
iPhones, iPads and Androids: Are unmanaged "Smart" devices outsmarting your network security

Length: 56 min

Speakers:
Dr. Kaustubh Phanse, Principal Wireless Architect, AirTight Networks
Mike Baglietto, Director of Product Marketing, AirTight Networks

Watch this webinar to know:

  • How to identify smartphones connected to your network
  • To define and enforce a smartphone access policy
  • Why Mobile Device Management (MDM) alone cannot restrict unapproved smart device connections
  • Controls to restrict access of personal smart devices on your network
How Government Agencies Meet and Exceed GAO NIST Wireless Security Guidelines

Length:  60 min

Speaker:
Dr. Hemant Chaskar, Director of Technology, AirTight Networks
Tom Conklin,Managing Director, Goverment Relations, AirTight Networks

In this Webinar, AirTight security experts discuss:

  • The state-of-the art in wireless intrusion prevention technology and systems; which can be used to protect networks from WLAN vulnerabilities, including those specifically cited in the GAO report and others.
  • Additional details on the WLAN risk scenarios cited in the GAO report and the recommendations in the report for processes and technology to protect government agencies networks from wireless vulnerabilities and attacks.  
  • Effective strategies Agencies use to protect networks from wireless risks
  • How to avoid the nuisance of false alarms in wireless intrusion prevention systems.
A Cheaper, More Secure Way to Meet PCI Wireless Requirements

Length:35 min

Speaker:
Mike Baglietto, Director of Product Marketing, AirTight Networks

View this webinar to understand:

  • How to maintain the security of your network and meet PCI compliance.
  • Why a cloud-based solution makes sense for PCI compliance.
  • How AirTight's unique PCI scanning service can save you time and money.
Taking the cost and complexity out of branch office Wi-Fi

Length:40 min

Speaker:
Dr. Hemant Chaskar, Vice President, Technology, AirTight Networks
Mike Baglietto, Director of Product Marketing, AirTight Networks

AirTight experts will discuss:

  • Controller vs. Cloud managed Wi-Fi architectures
  • Advantages of hierarchical policy definition and control
  • Security implications of Wi-Fi and the importance of auto-prevention
  • Why a cloud-based Wi-Fi solution makes sense for your budget
iPhone, Droids, Tablets: Smartphones Threaten Your Network

Length: 55 min

Speakers:
Dr. Hemant Chaskar, Vice President for Technology, AirTight Networks
Mike Baglietto, Director of Product Marketing, AirTight Networks

This webinar will discuss:

  • The limitations of common security practices
  • How to identify smartphones connected to your network
  • To define and enforce a smartphone access policy
  • Controls to restrict access of personal smart devices on your network
IT's New Challenge: Deploying Wi-Fi for Fun and Profit

Length: 35 min

Speakers:
Dr. Hemant Chaskar, Vice President, Technology, AirTight Networks
Mike Baglietto, Director of Product Marketing, AirTight Networks

This Webinar will discuss

  • The pros and cons of various approaches to PCI wireless scanning and Wi-Fi deployment
  • The security implications Wi-Fi brings for your network and how to maintain network security
  • Why a cloud-based Wi-Fi solution makes sense for meeting PCI compliance and adding Wi-Fi to your retail network
  • How AirTight's unique Cloud Services can meet your needs with a cost effective, low touch solution.
IT's New Challenge: Deploying Wi-Fi for Fun and Profit

Length:35 min

Speakers:
Dr. Hemant Chaskar, Vice President, Technology, AirTight Networks
Mike Baglietto, Director of Product Marketing, AirTight Networks

Watch this Webinar to learn how deploying a cloud-based secure Wi-Fi solution can meet your busness objectives with the fastest deployment, lowest cost and minimal management overhead.

Are Smartphones Outsmarting Your Network Security Perimeter?

Length: 60:00 min

Speakers:
Pravin Bhagwat, CTO, AirTight Networks
Mike Baglietto, Director of Product Marketing, AirTight Networks

In this Webinar, AirTight CTO, Pravin Bhagwat, describes the threat scenarios posed by the proliferation of smartphones at work and discuss strategies you can use today to keep tabs on the smartphone usage in your network.  He lays out the types of threats posed by Wi-Fi enabled devices and discuss the three things you need to know to protect your network.

Leveraging the Cloud for Wi-Fi Access and PCI Compliance

Length:57 min

Speaker: Mike Baglietto, Director of Product Marketing, AirTight Networks

This Webinar will discuss:

  • The security implications of adding Wi-Fi to your retail network
  • Why a cloud-based solution makes sense for deploying Wi-Fi
  • How to maintain the security of your network and meet PCI compliance
PCI Compliance in a Wi-Fi Connected World

Length: 60:00 min

Speaker:
Mike Baglietto, Director of Product Marketing, AirTight Networks

Watch this Webinar to find out:

  • How to go beyond rogue APs to understand what wireless vulnerabilities are still present in retail CDEs and going undetected
  • The impact of the consumerization of Wi-Fi enabled devices on network security
  • How AirTight’s Cloud ServicesTM can let you deploy secure Wi-Fi and remain PCI compliant.
Webinar - PCI Still Misses the Mark on Wireless Security

Length: 60:00 min

Speaker:
Mike Baglietto, Director of Product Marketing, AirTight Networks

Watch this AirTight webinar to learn:

  • How to go beyond rogue APs to understand what wireless vulnerabilities are still present in retail CDEs and going undetected
  • Why the checkmark is not enough
  • The impact of the consumerization of Wi-Fi enabled devices on network security
  • The benefits and limitations of the various approaches to satisfying PCI scanning
  • Critical criteria to consider when choosing PCI wireless scanning solutions
Wireless Tsunami - The Next Generation of Wi-Fi Attacks

Length: 45:00 min

Speakers:

Gopinath K.N., Director of Engineering, AirTight Networks
Mike Baglietto, Director of Product Marketing, AirTight Networks

This AirTight Webinar reveals the smartphone as attacker, research which was presented last week at the CSI 2010 security conference. AirTight calls the attacks SmartPots - a mobile Honeypot - and a very real threat to a Wi-Fi network.

Webinar: Why You Should go Beyond the PCI Wireless Checkmark

Length:60 min

Mike Baglietto, Director of Product Marketing, AirTight Networks

Watch this AirTight webinar to learn:

  • The results of a study of Over 200 retail credit card data environments
  • Going beyond rogue APs to understand what wireless vulnerabilities are still present in retail CDEs and going undetected
  • Why you should go beyond the checkmark
  • The impact of the consumerization of Wi-Fi enabled devices on network security
  • The benefits and limitations of the various approaches to satisfying PCI scanning
Satisfy Your PCI Wireless Compliance Needs for 3 Years

Length: 60 min

Mike Baglietto, Director of Product Marketing, AirTight Networks

Listen this webinar to know:

  • Applicable wireless security requirements
  • Real world examples of how not to secure your cardholder data
  • Recommendations for a strong wireless security posture
  • Step-by-step process for complying with wireless PCI requirements
Hole196 Vulnerability in WPA2 Security

Length:60 min

Anthony Paladino, Managing Director, Systems Engineering
Dr. Kaustubh Phanse, Principal Wireless Architect
Md. Sohail Ahmad, Senior Security Researcher

Listen this webinar to learn:

  • About the "WPA2 Hole196" zero-day vulnerability and how it can be exploited
  • Understand risks it can pose to your enterprise data and network security
  • Evaluate possible countermeasures and determine the steps you can take to protect your enterprise from such zero-day vulnerabilities
Webinar - Conquering the Minefield of Soft Rogue APs in Enterprise Networks

Length: 45:26 min

Dr. Hemant Chaskar, Director of Technology

Watch this Webinar to learn:

  • Conventional Rogue AP vs Soft Rogue AP Scenarios
  • 5 Windows Soft Rogue APs you need to be aware of
  • What this means for enterprise security
  • What security administrators can do about it
Windows 7 - a New Wireless Security Risk to the Enterprise

Length: 42:44 minutes

Sri Sundarlingam, Product Management
Kaustubh Phanse, Senior Wireless Architect

Listen this webinar to learn

  • Three steps that will convert any Windows 7 system into a wireless threat
  • How your enterprise data and wired network can be at risk and why you won’t know
  • Why network security defenses such as 802.1X/NAC cannot protect you
  • Why only wireless intrusion prevention (WIPS) mitigates this threat
Wireless Security: The Easiest PCI Investment to Justify

Length: 60 min

John Kindervag, Senior Analyst, Forrester Research
Mike Baglietto, Director of Product Marketing, AirTight Networks

Watch this webinar to learn:

  • A review of the PCI DSS Wireless Guideline
  • Detection is not prevention - review of market IDS to IPS evolution
  • An Integrated, cost effective solution for WLAN performance and security
Preparing for a wireless audit for PCI DSS compliance

Length: 65 minutes

Jim Cowing, Managing Director, Digital Resources Group
Mike Baglietto, Director of Product Marketing, AirTight Networks

Whether or not wireless is deployed in your card holder data environment, every organization subject to PCI has a minimum set of wireless security requirements. Are you confident that the necessary controls are in place to prevent a breach over wireless? Are you certain that no rogue access points are present in your network? Can you provide proof of compliance to these wireless standards?

Skyjacking a Cisco WLAN Access Point: Attack Analysis and Countermeasures

Length: 79 minutes

Dr. Pravin Bhagwat, CTO, AirTight Networks
Dr. Hemant Chaskar, Director of Technology, AirTight Networks

This webinar deconstructs the skyjacking vulnerability-explaining why the vulnerability occurs in Cisco WLANs, which Cisco access points are affected, how skyjacking can be exploited to launch potent attacks, and what are the best practices to proactively protect your enterprise network against such zero-day vulnerabilities and attacks. 

How the PCI Wireless Guidelines Apply to You

Length: 43 minutes

Samir Palnitkar, General Manager of AirTight Online solutions,
Mike Baglietto, Director of Product Marketing

This informative webinar is a review of recently published guidelines by PCI's wireless Special Interest Group, to help you understand how the wireless PCI requirements apply to all cardholder data environments and gain information on practical methods for securing wireless in accordance with the PCI DSS.

Understanding Wi-Fi Security Vulnerabilities and Ways of Mitigating Them

Length: 79:16 minutes

Dr. Hemant Chaskar, Director of Technology at AirTight Networks

This webinar includes discussion on important Wi-Fi security issues and the solutions available to address them. Enterprises which need to secure their networks from Wi-Fi threats in order to protect their information assets, prevent unauthorized use of their network, enforce no-Wi-Fi zones, and meet regulatory compliance for themselves and their clients will benefit from this webinar.

Effective Strategies for Evaluating WLAN Security

Length: 52:36 minutes

Dr. Hemant Chaskar, Director of Technology at AirTight Networks

This informative Webinar offers a practical guide for selecting a WLAN security solution. Hemant Chaskar explains the prevalent methods for wireless access point detection and classification.

Gartner Analyst, John Pescatore, Discusses Wireless Security as SaaS

Length: 41:22 minutes

John Pescatore, VP and Distinguished Analyst, Gartner
Mike Baglietto, Director of Product Marketing, AirTight

With the proliferation of wireless technology throughout the enterprise, multi-dimensional attacks combined with a lack of wireless expertise can challenge even the most experienced IT staff. Security conscious organizations are faced with 3 key wireless security requirements: protect the business from unauthorized users, safeguard sensitive data, and meet evolving compliance standards for wireless security.

Case Study Webinar – How to Secure Your Cisco WLAN Today

Length: 64 minutes

Paul Labbe, Director, Clinical Engineering, Maine Medical Center
John Foley, Senior Network Engineer, Maine Medical Center
Craig Mathias, Principal, Farpoint Group
Sri Sundaralingam, Vice President, Product Management, AirTight Networks

Learn about:

  • Effective pre-deployment planning including predictive RF planning, RF site survey, etc
  • Key best practices to follow for securing your WLAN
  • Comparing integrated WIDS versus overlay WIPS
  • Key criteria for selecting your WIPS vendor
  • Security capabilities provided by WLAN infrastructure vendors (e.g. Cisco)
802.11n deployment checklist - what you need to know before you start.

Length: 67 minutes

Lisa Phifer, President, Core Competence
Sri Sundaralingam, Vice President, Product Management, AirTight Networks

"Failing to prepare is preparing to fail."
Nothing better sums up the frustration and expense of most wireless network deployments. From poor performance to inadequate security, most wireless initiatives are over budget and yet still under perform.

Why wireless continues to be the #1 threat to your network

Length: 63 minutes

Mike Baglietto, Director, Product Marketing, AirTight Networks

Concern about wireless security is the # 1 issue impeding WLAN adoption today. This webinar discusses the evolution of current and emerging wireless threats and their impact on the enterprise, the security challenges facing IT, especially with the adoption of 802.11n, and the pros and cons of various defense mechanisms intended to address the vulnerabilities wireless introduces into your business on a daily basis.

Is the latest wireless vulnerability just the tip (or TKIP) of the iceberg?

Length: 52 minutes

Pravin Bhagwat, CTO, AirTight Networks
Hemant Chaskar, Director of Technology, AirTight Networks

  • How researchers cracked TKIP and what this means for future attacks on WPA?
  • What impact will this have on enterprise security?
  • How does it affect compliance requirements like PCI and HIPAA?
  • What best practices can be put in place to ensure you are protected?
PCI DSS and the Wireless Connection: Pay attention - TJX was no accident!

Length: 52 minutes

Mike Baglietto, Director, Product Marketing, AirTight Networks

There’s a New Sherriff in Town and He’s Getting Tough on Wireless Security. His name is the PCI DSS 1.2 and wireless security has finally been recognized as an important component of protecting your network and your WLAN.

Protect your network and reap the benefits of wireless

John Pescatore, Research Fellow, Gartner
Mike Baglietto, Director of Product Marketing, AirTight Networks

If you trusted your wireless network, what applications would you roll out? How much more efficient would your workforce be? How many more customers could you acquire? Learn how to understand the risks, protect your network and reap the benefits of wireless.

Radio Chaos - Wi-Fi Under Siege

Length: 40 minutes

Rick Farina, Sr. Wireless Security Researcher

A live educational webcast demonstrating hacker techniques and defenses