Thanks to Tablets and Smartphones, Wi-Fi Security a Bigger Concern

Look for 2012 as the year for home networking routers with built-in access and security controls to take off. Why? Because the popularity of tablets like the iPad and Kindle Fire will necessitate a way for SOHO employers (and parents) to control users’ online habits and to protect them from unwanted, non-business related sites. Because the brains at Cyberoam, makers of identity-based unified threat management (UTM) appliances know all too well that everyday browsing is moving quickly away from desktops to devices like smartphones, gaming consoles and tablets, they are the first vendor to offer up a Wi-Fi router that adds parental controls (think employee controls too) and security to anything connected to the local Wi-Fi.

It’s no surprize that consumer electronics network connections are growing rapidly. ABI Research firm says that wireless will remain the dominant LAN connection type and that, "Wi-Fi connections in consumer electronics devices will rise from 113 million in 2008 to more than 285 million by 2012."

To hear Abhilash Sonwane, senior vice president for Cyberoam, explain the problem this causes, he says, “Wi-Fi security does not come pre-configured in most routers available in the market today, resulting in open wireless routers that offer limited or no security over Wi-Fi. This is leading to unsecure Internet access with network security getting easily compromised. “

To solve this problem the company developed a Wi-Fi router called NetGenie, which combines URL and application blocking coupled with antivirus, Intrusion Protection, firewall and virtual private network (VPN) for small offices and home offices. The company surveyed thousands of working parents and small employers so as to convince management of its market demand.

“At the time when we were mulling over the NetGenie idea, Wi-Fi security was already a concern,” said Sonwane. “ The survey findings revealed that parents wanted the security of antivirus, Intrusion Prevention and parental controls for their kids and over 84% of parents were willing, rather eager, to buy a solution to safeguard users from online threats. The statistics that came out from the survey sufficiently confirmed the demand for a product like this.”

NetGenie administrators can control and protect wireless devices such as iPads and smartphones from wasting company time on non-business related websites while permitting free access during certain pre-allocated times. Admins can also override default settings by adding URLs to a whitelist. Websites that fall under categories such as gaming, adult content, and shopping sites, for example, can be blocked. Access can also be limited to applications such as Skype and Yahoo Messenger, social media sites such as Facebook and Twitter, job portals, movie downloads, and the like.

The $139 device generates reports on browsing activities and applications used, detailing user attempts made to access blocked websites and applications deemed inappropriate by the administrator. These reports also do a good job of listing attempted virus or intrusion attacks on the network.

On the security side, NetGenie SOHO version throws in a customizable firewall with stateful packet inspection and NAT capabilities, distributed denial of service (DDos) protection, MAC binding and Intrusion Prevention. For peace of mind, all devices connected to NetGenie are protected against viruses, spyware, unwanted downloads and installation of harmful programs. Like most standard routers, it assures secure wireless traffic using WEP, WPA and WPA2 encryption standards.

NetGenie settings can be managed through any connected device such as a desktop, laptop, or handheld device from anywhere within the network without the need to install software. With support for 3G, NetGenie allows users to share a USB broadband or 3G modem with multiple users simultaneously.

With employees (and kids) doing more of their Internet browsing on smartphones and tablets, the hardware approach to monitoring and blocking Internet access to non-productive websites makes smart sense.

About the Author

Victor Cruz is a consultant and writer living in Boston whose articles have appeared in Cloud Computing Journal, CommPro.biz, and eSecurity Planet.

Featured

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

  • Beyond Apps: Access Control for Today’s Residents

    The modern resident lives in an app-saturated world. From banking to grocery delivery, fitness tracking to ridesharing, nearly every service demands another download. But when it comes to accessing the place you live, most people do not want to clutter their phone with yet another app, especially if its only purpose is to open a door. Read Now

  • Survey: 48 Percent of Worshippers Feel Less Safe Attending In-Person Services

    Almost half (48%) of those who attend religious services say they feel less safe attending in-person due to rising acts of violence at places of worship. In fact, 39% report these safety concerns have led them to change how often they attend in-person services, according to new research from Verkada conducted online by The Harris Poll among 1,123 U.S. adults who attend a religious service or event at least once a month. Read Now

  • AI Used as Part of Sophisticated Espionage Campaign

    A cybersecurity inflection point has been reached in which AI models has become genuinely useful in cybersecurity operation. But to no surprise, they can used for both good works and ill will. Systemic evaluations show cyber capabilities double in six months, and they have been tracking real-world cyberattacks showing how malicious actors were using AI capabilities. These capabilities were predicted and are expected to evolve, but what stood out for researchers was how quickly they have done so, at scale. Read Now

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.