DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home News

Securing the Next Wave of Wireless

DigitalCIO Bureau by DigitalCIO Bureau
November 27, 2023
in News, Tech News
0
Securing the Next Wave of Wireless
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

By Debasish Mukherjee: Vice President, Regional Sales APJ at SonicWall Inc.

Wireless connectivity is ubiquitous in today’s mobile, global economy. Wireless devices range from smartphones and laptops to security cameras and virtual reality headsets. Businesses need to recognize and address their need for high quality, performance, and security across wireless networks and endpoints.

Today’s business in a wireless world

High-speed wireless connectivity is no longer optional in today’s network landscape. It’s become a necessity as businesses look to increase customer value and improve employee productivity through BYOD initiatives and the growing use of bandwidth-intensive apps. Other organizations, such as schools and universities, use wireless to provide students with a more connected educational environment. From the user perspective, wireless connectivity is expected regardless of the location or device type. What’s more, there is a growing trend toward the use of “wireless only” devices in the workplace, the classroom, hospitals and in everyday life.

Wireless IoT

Driving all of these are several key factors:

  • The first is the continued proliferation of Wi-Fi-enabled devices, both personal and IT-issued. According to Global Market Insights, the Wi-Fi chipset market size was more than $20 billion (USD) in 2021 and is expected to grow at more than 2.5% CAGR through 2028.
  • Second, the Internet of Things (IoT) has also expanded as devices not traditionally known for wireless functionality, including cars, smart home devices (e.g. refrigerators, security cameras, etc.) and others, can connect to the Internet using wireless. Multiple analyst firms have predicted there will be around 30 billion IoT-connected devices by 2030.
  • Third, coupled with the increase in Wi-Fi-ready devices is the use of bandwidth-intensive applications such as HD multimedia, cloud and mobile apps, which are increasingly hosted in the network. And finally, the newest wireless standard, 802.11ax, has gone mainstream as users look to take advantage of the promise of multi-gigabit wireless speeds. Together, this combination is driving the need for organizations to provide customers, employees and students with a highspeed wireless solution that significantly enhances the user experience.

Home on the enterprise

According to Wi-Fi Alliance, home is becoming an enterprise network. This is caused mainly due to the emergence of everyday connected things, personal assistants, and cordless virtual reality gears. Furthermore, the impact of Wi-Fi can be felt in our everyday lives not just by users but even companies like Amazon, Facebook, Netflix and major airlines. They depend on Wi-Fi to perform day-to-day operations like same-day shipping, mobile access to social media, streaming media services and even on-time airline departures. With the introductions of new standards and protocols, Wi-Fi is bound to further evolve and enhance. the same frequency or channel (e.g. microwaves, cordless phones), can interfere with the wireless signal by obstructing the radio frequency transmission path. All have the potential to impact applications such as video streaming which can suffer when packets are delayed and the image quality is poor or the video is slowed due to buffering.

Assuring wireless quality of service

While speed is always important in any network environment, so too is the quality of the wireless connection in complex, multi-device environments. In many instances, multiple devices are connecting to the same access point and competing for their share of the bandwidth. This “device congestion” causes interference that can result in signal degradation and ultimately poor performance. Additional factors, including physical objects (e.g. buildings, walls, trees) and other devices that share the same frequency or channel (e.g. microwaves, cordless phones), can interfere with the wireless signal by obstructing the radio frequency transmission path. All have the potential to impact applications such as video streaming which can suffer when packets are delayed and the image quality is poor or the video is slowed due to buffering

A growing threat to security

Underlying all of this is the need for wireless traffic to be secured from malicious threats and vulnerabilities over the Internet. Many of today’s wireless networking products offer protection from activities such as rogue access points or access point mapping, to keep intruders from gaining access to the network and ultimately critical resources. However, they often lack the ability to provide deep packet inspection scanning of encrypted traffic over the wireless LAN, putting organizations at risk. These products may also lack additional security features such as rogue access point detection and the ability to segment external user access from internal.

In addition to the security risks, the products can be timeconsuming to deploy, monitor and manage. They may also lack support features for auto-configuration and centralized management which are especially vital when creating and maintaining a large wireless network infrastructure.

Conclusion

What organizations require today from their wireless network is more than just faster connectivity. They need a solution that delivers greater throughput, better signal quality and an enhanced user experience from a wide variety of wireless clients in complex, multi-device environments. Not only that, it must be able to scan for and remove threats over the wireless traffic, whether unencrypted or encrypted, to secure the net

 

Tags: SonicWall
Share30Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

Ascendion Acquires Product Strategy & Transformation Firm Moodys

by DigitalCIO Bureau
June 25, 2025
0
Ascendion Leads The Charge in Generative AI

Ascendion has announced the acquisition of Moodys Northwest Consulting (Moodys), a premier product strategy and transformation firm. The move strengthens Ascendion's ability to help enterprise clients imagine, build,...

Read moreDetails

AuthBridge Unveils GroundCheck.ai for Smarter CPV

by DigitalCIO Bureau
June 25, 2025
0
AuthBridge Unveils GroundCheck.ai for Smarter CPV

AuthBridge, India's leading trust and authentication technology company, has launched GroundCheck.ai — India's first AI-powered platform purpose-built to transform Contact Point Verification (CPV) for customers, merchants, and vendors across sectors. At...

Read moreDetails

C-Suite misalignment over GenAI adoption

by DigitalCIO Bureau
June 25, 2025
0
L&T Tech Services Accelerates Transition to Smart Vehicles with Generative AI on AWS

NTT DATA has launched its new report, “The AI Security Balancing Act: From Risk to Innovation,” highlighting the opportunities and risks AI presents in cybersecurity. The findings show...

Read moreDetails

Zithara was conceived as a highly modular platform; Co-founder-Varun Kashyap

by DigitalCIO Bureau
June 23, 2025
1
Zithara was conceived as a highly modular platform; Co-founder-Varun Kashyap

Our team works closely with clients to identify new revenue levers, optimize existing customer journeys, and continuously unlock incremental value. This outcome-driven partnership approach is what transforms us...

Read moreDetails

Email Phishing Analysis: A SOC Analyst’s Guide to Spotting Suspicious Emails

by DigitalCIO Bureau
June 21, 2025
0
Email Phishing Analysis: A SOC Analyst’s Guide to Spotting Suspicious Emails

In the ever-evolving landscape of cyber threats, phishing emails remain one of the most persistent and damaging attack vectors faced by organizations globally. Disguised as legitimate communications -...

Read moreDetails
Next Post
Gartner: 69% Of Top-Performing CISOs Dedicate Time For Personal Professional Development

77% Organizations Fall Victim to Repeated Cyberattacks: Trellix

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

More Than 50% of CDAOs Will Secure Funding for Data Literacy and AI Literacy Programs by 2027

LogicMonitor And OpenAI Supercharge Data Center Operations

January 24, 2025
GlobalLogic Appoints Technology Services Veteran Srinivas Shankar as Chief Business Officer & Head of Global Industries

GlobalLogic Appoints Technology Services Veteran Srinivas Shankar as Chief Business Officer & Head of Global Industries

October 17, 2023

VIAVI Augments Support to Service Providers and Network Equipment Manufacturers

April 23, 2020

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Dell Technologies Digital Transformation Dynatrace E-books Fortinet Gartner GenAI Generative AI Google Cloud HCLTech Honeywell IBM Infographics Internet of Things (IoT) Kaspersky Microsoft Netskope NTT DATA Palo Alto Networks Panel Discussion Qlik Salesforce ServiceNow Sophos Tenable Veeam Veeam Software Vertiv Webinars Whitepaper Zscaler

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?