Professional Documents
Culture Documents
<Client Name>
Contents
Introduction to Tatweer Technology Solutions ............................................................................................ 1
AirTight Wireless & WIPS .............................................................................................................................. 2
Indoor Access Points ..................................................................................................................................... 3
Band Unlocked Software-Defined Radios ..................................................................................................... 3
Managed Controller ...................................................................................................................................... 4
Management Console Overview:.................................................................................................................. 5
Wireless Intrusion Prevention....................................................................................................................... 6
AirTight's Unique Differentiators .................................................................................................................. 6
Why AirTight Wireless................................................................................................................................... 7
Why our Solution is Unique: ......................................................................................................................... 8
manner of security domains. This ensures wherever our customer is on their security roadmap, we can
work together to provide proper advising and the right solution to reach our goals together.
Tatweer is part of Al Shareef Group, which has been established and operating in the Middle East since
1980. This stability and experience ensures we are able to maintain long lasting relationships with our
customers across a variety of industries.
Our solutions range across all security domains and is based on our Tatweer Security Vision. Security
goals may differ by organization or industry and we feel it is important to understand the nuances of each
individual so we can help you reach your security goals, not ours. Our consultative and relationship based
approach ensures we understand what each organization wants to achieve, create a roadmap of how to get
there, and develop an execution plan together to ensure your success criteria is always met.
Our focused approach is something build into every fiber of our business model. And for our customers,
this means we are expert in the solutions we provide. By focusing with only the carefully selected solutions
which make up our portfolio, we streamline the full deployment lifecycle. From analysis, to
recommendation, to deployment, to ROI, and support; we have focused our processes to deliver true value
to our customers throughout the deployment lifecycles and along their security roadmap.
In addition the proposed solution also provides isolated architecture for Guest Wi-Fi provisioning, ensuring
easy to manage Guest Wi-Fi completely secure and separate from corporate WLAN.
Following are the main components of our solution as per the requirements:
The whole solution is based on the Airtight Access Points and Management console platform for highly
secure and scalable WLAN architecture. Below is a brief description of all these components:
Dual AP with Background WIPS: 2.4 GHz AP on one radio and 5 GHz AP on
the other radio, with background wireless monitoring in respective bands;
AP + Dedicated WIPS: 2.4 or 5 GHz AP on one radio and a dedicated dual band
WIPS sensor on the other radio for 24/7 wireless threat protection in both bands;
Dedicated Overlay WIPS: Dedicated WIPS sensor in 2.4 GHz on one radio
and 5 GHz on the other radio for 24/7 wireless threat protection in both band
Key Features:
It can also be used to cost-effectively extend the range of Wi-Fi access in areas where it is not practical to
rollout Ethernet cables, and to implement point-to-point or backhaul mesh Wi-Fi links to interconnect
buildings or campuses, while simultaneously providing Wi-Fi access to users.
Managed Controller
The Airtight Networks WLAN architecture is a completely managed WLAN solution providing centralized
management through the Data Centers ensuring ease of operation for enterprises like <Client Name> with
fast and easy provisioning of wireless capacity at a very low cost.
Powered completely by the Airtight Managed Console architecture, the Airtight Networks solution ensures
a complete suite of enterprise class features without investing on multiple components and their
management.
With the Airtight powered Airtight Networks Managed WLAN Services, <Client Name> can get a highly
robust solution to deliver enterprise class Wi-Fi access, wireless intrusion prevention system (WIPS) and
regulatory compliance.
Utilizing the Airtight Wi-Fi technology, this service simplifies deployment and centralized management
of Wi-Fi networks across distributed locations. It eliminates the cost and complexity of traditional controller
based enterprise WLAN solutions and is ideal for enterprises with a small IT staff, geographically
distributed sites or remote offices, and a tight budget. All Airtight Wi-Fi access point (AP) models are fully
supported with this architecture and can deliver reliable, high-speed performance.
Furthermore the Airtight Networks Wireless Intrusion Prevention System, powered by Airtight WIPS,
offers best-in-class wireless security for enterprise networks. Powered by several patents, and ranked at the
top by Gartner in all its six Market scope reports on WIPS, Airtight Networks WIPS offers enterprises
comprehensive protection from all types of wireless threats such as Rogue APs, Soft Rogue APs, Ad-hoc
networks, Client misassociations, Honeypots, Wi-Fi DoS attacks, and BYOD risks, e.g., mobile hotspots.
The Airtight APs can provide WIPS protection while simultaneously offering Wi-Fi access, or they can be
converted into dedicated WIPS sensors. Pre-defined compliance reports that map various wireless
vulnerabilities and threats to specific requirements simplify the audits. Reports can be generated across any
number of locations from a single management console. They can be generated on demand or scheduled
for automatic generation and archival or delivery by email.
Eliminates the need to define arbitrary Rogue detection rules based on SSID, signal strength, MAC
OUI, etc.
Distributed administration
Automated policy enforcement
Pre-defined DoD compliance reports
Enforcement of No-WiFi policies across large enterprise networks
Integration with the leading WLAN vendors
Solution Architecture