Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

AirTight CLOUD SERVICES

2025-01-18 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

AIRTIGHT CLOUD SERVICES

AirTight cloud architecture has been developed since 2008. Based on a mature cloud technology, AirTight cloud architecture can expand to provide services for dozens or even thousands of locations or devices. Its multi-user mode ensures complete isolation of each user's user account, configuration, and data information. In fact, AirTight is the first and only provider of cloud-based wireless network connectivity and WIPS services in the world, as well as a multi-user hierarchical location user account model for AirTight patented technology (for example, enterprise and business, multi-brand management, etc.).

[3-in-1 solution]

AirTight cloud service provides enterprises with a powerful enterprise-class WiFi access, wireless prevention system (WIPS) and regulatory compliance solution, which is efficient, easy to manage, highly scalable and so on.

WiFi access

AirTight WiFi wireless access solution simplifies deployment and centralized management of WiFi network shuttling to and from distribution locations. It reduces the cost and complexity of traditional controller-based wireless solutions and is ideal for companies with only a small number of IT employees, as well as for distributed wireless connectors, remote offices, and enterprises with tight budgets. All AirTight WiFi Access Point (AP) are reliable products with high-speed performance.

Wireless Prevention system (WIPS)

AirTight WIPS*** prevention system provides the best enterprise-class wireless network security. AirTight has a number of patents and has been ranked first in Gartner's market report on WIPS for many years. AirTight WIPS provides comprehensive protection for enterprises against various types of wireless threats, such as Rogue APs, Soft Rogue APs, Ad-hoc networks, Client misassociations, Honeypots, Wi-Fi DoS attacks, etc., as well as risks brought by BYOD, such as mobile hotspots. AirTight APs can not only provide wireless network protection, but also provide wireless access, or only act as a dedicated WIPS sensor.

[compliance / Regulatory Compliance]

AirTight enables enterprises to meet the wireless security regulations required by regulations in different industries, such as PCI DSS, HIPAA, DoDD 8100.2, GLBA, SOX, and MITS.

AirTight built-in reports can show a variety of wireless vulnerabilities and threats, these reports can make auditing easier and faster, you can generate reports from different regions in a centralized and unified management interface, you can generate reports according to your needs, or you can set a schedule and email the report.

[secure data center with high fault tolerance]

AirTight data centers around the world have local and WAN-based high availability and redundancy architectures that ensure 99.9% uptime. AirTight AP and sensor devices serving users communicate with AirTight Cloud through secure channels encrypted by AES. At the same time, AirTight AP and sensor devices can operate independently, even if they can not connect to the Internet, they can continue to provide uninterrupted service. The AirTight data center uses SAS-70- II authentication mechanism-providing multi-level physical and network security mechanisms, two-factor authentication and protection against a variety of threats.

[social Wireless Network / Social WiFi]

The AirTight wireless system allows users to log in using accounts of social networks, including Facebook, Twitter, Google+, LinkedIn... Wait. Visitors can selectively share their personal public information when they log on to social networks, so that AirTight can be authorized to access these visitors' public information, which will contribute to customer loyalty programs. In addition to authenticating through social networks, AirTight's guest management allows visitors to authenticate users through text messages (SMS), Guest Book, and Web Form plug-ins.

Anonymous visibility and usage analysis

Through the monitoring of WiFi usage, the AirTigth wireless analysis engine provides timely and historical information to all wireless devices, including:

Use track

Residence time

Brand loyalty (repeat visitors, visit frequency)

Number of times and duration of wireless login

Conversion rate (how many WiFi devices have been incorporated into merchants or related areas)

Through the unique location management of AirTight, the analysis work can be targeted at specific areas or across all wireless deployment areas, and can also be analyzed on the basis of time, date, week, month and so on. Analysis reports of wireless use can be generated according to the needs of managers, or automatically generated and sent through Email on a regular basis.

When visitors log on to social networks, they can optionally share their personal information, through which the AirTight system can provide a variety of statistical data, such as age, gender, and public details (name, date of birth, photo, email, location, friend or follower … Etc.).

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report