DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home News

Securing the Next Wave of Wireless

DigitalCIO Bureau by DigitalCIO Bureau
November 27, 2023
in News, Tech News
0
Securing the Next Wave of Wireless
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

By Debasish Mukherjee: Vice President, Regional Sales APJ at SonicWall Inc.

Wireless connectivity is ubiquitous in today’s mobile, global economy. Wireless devices range from smartphones and laptops to security cameras and virtual reality headsets. Businesses need to recognize and address their need for high quality, performance, and security across wireless networks and endpoints.

Today’s business in a wireless world

High-speed wireless connectivity is no longer optional in today’s network landscape. It’s become a necessity as businesses look to increase customer value and improve employee productivity through BYOD initiatives and the growing use of bandwidth-intensive apps. Other organizations, such as schools and universities, use wireless to provide students with a more connected educational environment. From the user perspective, wireless connectivity is expected regardless of the location or device type. What’s more, there is a growing trend toward the use of “wireless only” devices in the workplace, the classroom, hospitals and in everyday life.

Wireless IoT

Driving all of these are several key factors:

  • The first is the continued proliferation of Wi-Fi-enabled devices, both personal and IT-issued. According to Global Market Insights, the Wi-Fi chipset market size was more than $20 billion (USD) in 2021 and is expected to grow at more than 2.5% CAGR through 2028.
  • Second, the Internet of Things (IoT) has also expanded as devices not traditionally known for wireless functionality, including cars, smart home devices (e.g. refrigerators, security cameras, etc.) and others, can connect to the Internet using wireless. Multiple analyst firms have predicted there will be around 30 billion IoT-connected devices by 2030.
  • Third, coupled with the increase in Wi-Fi-ready devices is the use of bandwidth-intensive applications such as HD multimedia, cloud and mobile apps, which are increasingly hosted in the network. And finally, the newest wireless standard, 802.11ax, has gone mainstream as users look to take advantage of the promise of multi-gigabit wireless speeds. Together, this combination is driving the need for organizations to provide customers, employees and students with a highspeed wireless solution that significantly enhances the user experience.

Home on the enterprise

According to Wi-Fi Alliance, home is becoming an enterprise network. This is caused mainly due to the emergence of everyday connected things, personal assistants, and cordless virtual reality gears. Furthermore, the impact of Wi-Fi can be felt in our everyday lives not just by users but even companies like Amazon, Facebook, Netflix and major airlines. They depend on Wi-Fi to perform day-to-day operations like same-day shipping, mobile access to social media, streaming media services and even on-time airline departures. With the introductions of new standards and protocols, Wi-Fi is bound to further evolve and enhance. the same frequency or channel (e.g. microwaves, cordless phones), can interfere with the wireless signal by obstructing the radio frequency transmission path. All have the potential to impact applications such as video streaming which can suffer when packets are delayed and the image quality is poor or the video is slowed due to buffering.

Assuring wireless quality of service

While speed is always important in any network environment, so too is the quality of the wireless connection in complex, multi-device environments. In many instances, multiple devices are connecting to the same access point and competing for their share of the bandwidth. This “device congestion” causes interference that can result in signal degradation and ultimately poor performance. Additional factors, including physical objects (e.g. buildings, walls, trees) and other devices that share the same frequency or channel (e.g. microwaves, cordless phones), can interfere with the wireless signal by obstructing the radio frequency transmission path. All have the potential to impact applications such as video streaming which can suffer when packets are delayed and the image quality is poor or the video is slowed due to buffering

A growing threat to security

Underlying all of this is the need for wireless traffic to be secured from malicious threats and vulnerabilities over the Internet. Many of today’s wireless networking products offer protection from activities such as rogue access points or access point mapping, to keep intruders from gaining access to the network and ultimately critical resources. However, they often lack the ability to provide deep packet inspection scanning of encrypted traffic over the wireless LAN, putting organizations at risk. These products may also lack additional security features such as rogue access point detection and the ability to segment external user access from internal.

In addition to the security risks, the products can be timeconsuming to deploy, monitor and manage. They may also lack support features for auto-configuration and centralized management which are especially vital when creating and maintaining a large wireless network infrastructure.

Conclusion

What organizations require today from their wireless network is more than just faster connectivity. They need a solution that delivers greater throughput, better signal quality and an enhanced user experience from a wide variety of wireless clients in complex, multi-device environments. Not only that, it must be able to scan for and remove threats over the wireless traffic, whether unencrypted or encrypted, to secure the net

 

Tags: SonicWall
Share30Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

Digital Fraud Overtakes Ransomware as CEOs’ Biggest Concern

by DigitalCIO Bureau
January 19, 2026
0
Retail Industry — Next Big Target for Hackers?

Artificial intelligence, geopolitical fragmentation and a surge in cyber-enabled fraud are redefining the global cyber risk landscape at unprecedented speed, according to the World Economic Forum’s Global Cybersecurity Outlook...

Read moreDetails

Cyera Secures $400M Series F, Hits $9B Valuation

by DigitalCIO Bureau
January 13, 2026
0
Cyera Secures $400M Series F, Hits $9B Valuation

Cyera has announced a $400 million Series F funding round, bringing its total funding to over $1.7 billion. This raise comes just six months after the previous round...

Read moreDetails

Trend Micro Closes Vulnerabilities in Apex Central

by DigitalCIO Bureau
January 9, 2026
0
Financial organizations receive an average of 2200+ application security vulnerability alerts every month: Dynatrace CISO Regional Bank 2023 report

The National Cyber ​​Security Centre (NCSC) is warning of vulnerabilities in Trend Micro Apex Central. These vulnerabilities could potentially cause a Denial-of-Service (DoS) attack. Updates addressing the vulnerability...

Read moreDetails

Aditya Birla Ventures invests in GenAI Company Articul8 AI

by DigitalCIO Bureau
January 9, 2026
0
AMD Acquires Open-Source AI Software Expert Nod.ai

Aditya Birla Ventures has announced its investment in the first tranche of Articul8 AI, Inc.’s oversubscribed Series B financing round. Articul8 AI, an enterprise generative AI (GenAI) software...

Read moreDetails

Snowflake Acquires Observe

by DigitalCIO Bureau
January 9, 2026
0
CRISIL To Acquire Bridge To India Energy

Snowflake has signed a definitive agreement to acquire Observe, a leader in AI-powered observability. With this acquisition, Snowflake will deliver the next generation of AI-powered observability, built on open standards...

Read moreDetails
Next Post
Gartner: 69% Of Top-Performing CISOs Dedicate Time For Personal Professional Development

77% Organizations Fall Victim to Repeated Cyberattacks: Trellix

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

Software Engineering Leader Roles to Require Oversight of Generative AI by 2025

Tech Mahindra, Competera to Deliver AI-Powered Price Optimization Solutions for Retailers

February 3, 2024

DOF and ADDA Accelerate the Digital Transformation of Government Services

October 10, 2019
Tech Mahindra And AVEVA Establish Global Centre of Excellence

Tech Mahindra And AVEVA Establish Global Centre of Excellence

April 3, 2024

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Barracuda Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Digital Transformation Dynatrace E-books Fortinet Gartner GenAI Generative AI Google Cloud IBM Infographics Internet of Things (IoT) Kaspersky Microsoft New Relic NTT DATA NVIDIA Palo Alto Networks Panel Discussion Qlik Salesforce ServiceNow Sophos Tenable Trend Micro Veeam Veeam Software Vertiv Webinars Whitepaper Zscaler

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?