AccessAgility Blog

Captive Portal Benefits

[fa icon="calendar'] Nov 30, 2018 9:50:05 AM / by Blog Team posted in WiFi Security, Managed WiFi

[fa icon="comment"] 0 Comments

A captive portal is a web page that a user is prompted with when connecting to a public access WiFi network. The captive portal states the terms, agreements, and acceptable usage policy for the user and then permits usage of the guest network upon the user’s acceptance of the policies. There are a handful of benefits that come with using a captive portal, including the ability to separate network traffic, limit data usage, collect valuable data, marketing and business recognition, and liability protection. With all of these benefits, there is very little reason to not have a captive portal as the gateway to your guest network.

Read More [fa icon="long-arrow-right"]

The Benefits of Subnetting

[fa icon="calendar'] Nov 16, 2018 3:21:03 PM / by Blog Team posted in WiFi Security, Managed WiFi

[fa icon="comment"] 0 Comments

What is subnetting, what is it used for, and why is it important?

Subnetting is the practice of dividing up a network into two or more networks. Common advantages of subnetting include enhancing routing efficiency, network management control, and improving network security. While these are just a few of the benefits that subnetting provides, they are the most noticeable after immediately implementing a subnet system.

Read More [fa icon="long-arrow-right"]

Understanding Intrusion Detection and Prevention Systems

[fa icon="calendar'] Sep 21, 2018 10:07:01 AM / by Keith Hutton posted in WiFi Security, Managed WiFi, WiFi as a Service

[fa icon="comment"] 0 Comments

An intrusion detection system (IDS) monitors network devices in order to grant security administrators the ability to identify attacks in progress and take appropriate action to protect a network. In order for users on a network to access a web server on the internet, the firewall must allow traffic through port 80. However, this open port is often used as an attack vector for hackers and malware to gain access to your network. An IDS examines this traffic and compares it with known exploits; similar to how antivirus software uses known virus signatures to identify threats. When the intrusion system detects a match to a known exploit, it sends an alert to the security or web server administrator so they can take action. Intrusion prevention systems (IPS) are very similar to IDSs, but as opposed to just sending an alert, these systems go one step further and automatically take action to prevent an intrusion.

Read More [fa icon="long-arrow-right"]

Securing Wireless Infusion Pumps

[fa icon="calendar'] Apr 11, 2018 8:30:00 AM / by Blog Team posted in Managed WiFi, WiFi Security

[fa icon="comment"] 0 Comments

An infusion pump is a medical device that pumps controlled amounts of medication, nutrients, and other vital fluids into a patient’s body through an IV. These devices are mostly found in hospitals, nursing homes, and other various medical settings. The pump is to be programmed in order to set the rate and duration of the fluid delivery based on the needs of the patient.

Read More [fa icon="long-arrow-right"]

WiFi Project Timeline

[fa icon="calendar'] Mar 9, 2018 3:13:25 PM / by Blog Team posted in Managed WiFi, Wireless Network

[fa icon="comment"] 0 Comments

Deciding whether or not to upgrade your wireless network can take months.

Planning and designing a new wireless network can take months.

Once you’ve decided to take action, implementing a new wireless network can take months.

It is important, and often necessary, to plan months in advance when it comes to upgrading a network’s infrastructure.

Read More [fa icon="long-arrow-right"]

WiFi as a Service (Waas) Pricing

[fa icon="calendar'] Mar 1, 2018 4:05:04 PM / by Blog Team posted in wifi consultant, Wireless Network, WiFi as a Service, Managed WiFi

[fa icon="comment"] 0 Comments

WiFi as a Service (WaaS), or managed WiFi, can be priced many different ways. Before getting into pricing models, it helps to review the cost elements of any project. All WiFi projects have four cost elements: labor, materials, other direct costs (ODC), and travel.

Read More [fa icon="long-arrow-right"]

Wireless / WiFi as a Service (WaaS) Introduction

[fa icon="calendar'] Jul 19, 2017 5:44:13 PM / by Zaib Kaleem posted in WiFi as a Service, Managed WiFi, Wireless Network

[fa icon="comment"] 0 Comments

When I first started in networking back in the late 1990s we called outsourced management of customer owned or leased equipment a managed network service (MNS). The scope of these MNS projects could range from just remote management and monitoring of routers to full turnkey design, installation, and management of all IT assets (routers, switches, servers, firewalls, etc.).

 

Read More [fa icon="long-arrow-right"]