kaustubh phanse - wireless in the enterprise: security risks, challenges and the solution - interop...

27
Wireless in the Enterprise: Security Risks, Challenges, and the Solution Kaustubh Phanse Wireless Architect, AirTight Networks

Upload: interop-mumbai-2009

Post on 12-Jan-2015

873 views

Category:

Technology


0 download

DESCRIPTION

Unsecured WiFi provides an easy target for hit-and-run style attacks allowing hackers to cause severe damage while remaining invisible and undetected. In fact, recent incidents show a growing trend that unsecured WiFi is becoming a safe haven for cybercriminals. In this session, Dr Phanse will discuss the wireless threat landscape, the business risks, and how enterprises can best secure themselves against wireless vulnerabilities and attacks.

TRANSCRIPT

Page 1: Kaustubh Phanse - Wireless in the Enterprise: Security Risks, Challenges and the Solution - Interop Mumbai 2009

Wireless in the Enterprise:

Security Risks, Challenges, and the Solution

Kaustubh Phanse

Wireless Architect, AirTight Networks

Page 2: Kaustubh Phanse - Wireless in the Enterprise: Security Risks, Challenges and the Solution - Interop Mumbai 2009

Convenience

Efficiency

Cost savings

Opportunities

Page 3: Kaustubh Phanse - Wireless in the Enterprise: Security Risks, Challenges and the Solution - Interop Mumbai 2009
Page 4: Kaustubh Phanse - Wireless in the Enterprise: Security Risks, Challenges and the Solution - Interop Mumbai 2009

Everywhere

Page 5: Kaustubh Phanse - Wireless in the Enterprise: Security Risks, Challenges and the Solution - Interop Mumbai 2009

WiFi uses Unlicensed

Frequency Spectrum

Page 6: Kaustubh Phanse - Wireless in the Enterprise: Security Risks, Challenges and the Solution - Interop Mumbai 2009

Off-the-shelf

Page 7: Kaustubh Phanse - Wireless in the Enterprise: Security Risks, Challenges and the Solution - Interop Mumbai 2009

Plug and play

Page 8: Kaustubh Phanse - Wireless in the Enterprise: Security Risks, Challenges and the Solution - Interop Mumbai 2009

Wireless is a wonderful thing, unless you are worried about security.

– John Pescatore, Gartner

“”

Page 9: Kaustubh Phanse - Wireless in the Enterprise: Security Risks, Challenges and the Solution - Interop Mumbai 2009

Internet

Firewall shields inside from outside

Outside is insecure

Enterprise LAN is confined to wires

Inside is secure

Page 10: Kaustubh Phanse - Wireless in the Enterprise: Security Risks, Challenges and the Solution - Interop Mumbai 2009

Internet

Wireless security holes bypass the firewall

Network not confined to wires or the building anymore

Page 11: Kaustubh Phanse - Wireless in the Enterprise: Security Risks, Challenges and the Solution - Interop Mumbai 2009

Wardriving

Page 12: Kaustubh Phanse - Wireless in the Enterprise: Security Risks, Challenges and the Solution - Interop Mumbai 2009

WEP Encryption

WEP was meant to be “Wired Equivalent Privacy”

WEP turned out to be “Worst Ever Privacy”

Page 13: Kaustubh Phanse - Wireless in the Enterprise: Security Risks, Challenges and the Solution - Interop Mumbai 2009

WiFi Protected Access (WPA/WPA2)

Page 14: Kaustubh Phanse - Wireless in the Enterprise: Security Risks, Challenges and the Solution - Interop Mumbai 2009

Simply having “No WiFi” policy

does not make your organization immune to WiFi Threats

Page 15: Kaustubh Phanse - Wireless in the Enterprise: Security Risks, Challenges and the Solution - Interop Mumbai 2009

Portable

Consumer electronics

Cellular phonesNotebooks,

ultra-mobile PCs

Stationary Consumer

electronics

144

5671

48

23%

33%

52%51%

Source: WiFi Alliance and In-Stat

319 million units shipped in 2008

Page 16: Kaustubh Phanse - Wireless in the Enterprise: Security Risks, Challenges and the Solution - Interop Mumbai 2009

All notebooks, ultra-mobile PCs will have WiFi

2010

Page 17: Kaustubh Phanse - Wireless in the Enterprise: Security Risks, Challenges and the Solution - Interop Mumbai 2009

Rogue AP is an unauthorized access point connected to the wired enterprise network

Deployed casually or maliciously

Usually consumer or home-grade APs

Page 18: Kaustubh Phanse - Wireless in the Enterprise: Security Risks, Challenges and the Solution - Interop Mumbai 2009

Malicious

Deliberate

Inadvertent

Page 19: Kaustubh Phanse - Wireless in the Enterprise: Security Risks, Challenges and the Solution - Interop Mumbai 2009

Administrators lack transparency and control

Page 20: Kaustubh Phanse - Wireless in the Enterprise: Security Risks, Challenges and the Solution - Interop Mumbai 2009

Internet

Firewall

Is your sensitive data leaking over the air?

Are your employees connecting to neighboring WiFi networks?

Are Rogue APs attached

to your enterprise network?

Can someone across the street shutdown your WiFi network?

Are you having difficulty enforcing your security policies at multiple sites?

Page 21: Kaustubh Phanse - Wireless in the Enterprise: Security Risks, Challenges and the Solution - Interop Mumbai 2009

Next Generation Threats and Vulnerabilities Projection

June 2009

WLAN

Infrastructure Attacks

Mobile and Wireless

Device Endpoint Attacks

Page 22: Kaustubh Phanse - Wireless in the Enterprise: Security Risks, Challenges and the Solution - Interop Mumbai 2009
Page 23: Kaustubh Phanse - Wireless in the Enterprise: Security Risks, Challenges and the Solution - Interop Mumbai 2009
Page 24: Kaustubh Phanse - Wireless in the Enterprise: Security Risks, Challenges and the Solution - Interop Mumbai 2009

Wireless intrusion prevention system (WIPS)

Page 25: Kaustubh Phanse - Wireless in the Enterprise: Security Risks, Challenges and the Solution - Interop Mumbai 2009

Automate your wireless security with a WIPS

Instantaneously detect and block wireless threats

Gain visibility 24x7

Regain and stay in control

Accurately locate wireless devices

Page 26: Kaustubh Phanse - Wireless in the Enterprise: Security Risks, Challenges and the Solution - Interop Mumbai 2009
Page 27: Kaustubh Phanse - Wireless in the Enterprise: Security Risks, Challenges and the Solution - Interop Mumbai 2009

The Global Leader in Wireless Security and Compliance Solutions

www.airtightnetworks.com

[email protected]