Search
The Impact of WiFi on the Digital Learning Experience
Posted by Erika Hashemi on Jan 11, 2017
knob-noster-schools-wifi.png

A Mojo Customer Story: Knob Noster School District

Located in West Central Missouri, Knob Noster School District provides a distinctive mix between rural and urban settings. With 1,600 students and 225 faculty dispersed between four locations, Knob Noster maintains a commitment to high-quality education by identifying ways in which technology can be integrated into all functions for their students.

Posts by Topic

see all
free-on-demand-webinars.png
Like Peanut Butter and Chocolate… Performance and Rogue Detection is Always Better Together
Posted by Sean Blanton on Nov 18, 2016

We all know performance testing is as important a task as any in the WiFi business. We need to know the limits of our access points after all, and it certainly helps you to have all the information at hand to make the most informed decision you can. But performance testing focused soley on speed? Well, while it's important, it doesn't give you all the information you need. Because you, dear reader, are not just upgrading your WiFi for speed. You want all the bells and whistles that come standard with enterprise WiFi platforms today. And you want to turn them all on. And most importantly, you want to know if and how they affect speed.

Why Your Access Points Need a Third 2x2 11ac Radio for Security
Posted by Hemant Chaskar on Jun 21, 2016

WIPS monitoring requires scanning all WiFi channels in round-robin fashion to detect threats and vulnerabilities. This scanning can be in one of two forms:

  1. background scanning, in which a radio that provides WiFi access service intermittently scans off-service channels, or
  2. dedicated scanning, in which a radio is dedicated to security and does not provide WiFi access service.

For enterprises that desire strong WIPS security and/or those that deploy real-time applications, background scanning isn’t adequate for the following reasons:

Do You Have the Right Network Security Strategy?
Posted by Sean Blanton on Mar 28, 2016

A network-focused strategy for wireless security is the conventional wisdom, but is it really the right one? In our next webinar (Wednesday, March 30th, at 8:00 am PST), I’ll argue that a client-focused strategy is best.

What You Need to Know about 5 Cloud-Managed Wi-Fi Myths
Posted by Sriram Venkiteswaran on Sep 17, 2015

Any technology often sparks lengthy discussions, questions, and tends to summon some common misconceptions that can and should be disproven. Cloud Wi-Fi is no exception to this. I want to share some of the most common myths about cloud Wi-Fi that I’ve seen and show you why they are not reality.

Presidio Partners: "Why We Like AirTight"
Posted by Freddy Mangum on Jul 21, 2015

At Presidio Partners, we strongly believe in the power of technology, innovation, and data to push our entrepreneurs and ourselves in ways that will make the world a better place and help us meet ever-changing societal challenges. This view informs our pursuit of investment opportunities with young, growing companies.

Visit AirTight at ISTE 2015 - Booth 3161
Posted by Sean Blanton on Jun 28, 2015

Elevate the classroom experience with AirTight Secure Cloud Wi-Fi

10 Lessons for Retailers from Recent Security Reports
Posted by Freddy Mangum on Jun 16, 2015

Recent security reports from Verizon and new data from Mary Meeker of Kleiner Perkins Caufield & Byers have important security lessons for retailers. This blog summarizes key findings from these two widely respected sources.

PCI Compliance and Wi-Fi: Friends or Foes?
Posted by Robert Ferruolo (Dr. RF) on May 28, 2015

This is part three of our blog series dedicated to wireless PCI compliance; in this installment we focus on deployment best practices and common misconceptions. Read part 1: New PCI 3.1 Guidelines Address SSL Vulnerability and part 2: 3 Trends Impacting Wireless PCI Compliance

3 Trends Impacting Wireless PCI Compliance
Posted by AirTightTeam on May 21, 2015

This is part two of the three-part blog series dedicated to wireless PCI compliance, which is a hot topic for retailers and other enterprises that accept payment cards. Read part 1 of the series: New PCI 3.1 Guidelines Address SSL Vulnerability; part 3: PCI Compliance and Wi-Fi: Friends or Foes?