Case study: easyHotspot Business


easyHotspot is perfect solution for companies when needed wireless or cable access for visitors, secured from the point of view of their Internet access and their connection to the internal network of the company.


Applications


Most business networks have security systems, procedures and limitations that implies access restrictions to certain destinations (sites not complying with company's activity or objectionable content) or to certain ports (eg the e-mail service of other servers). Also, the internal network is usually protected by enforcing procedures in the connected computers.

However, most companies need to offer its visitors access to Internet. However, the introduction of an external computer into internal network will deny all security measures, allowing uncontrolled access both its internal and Internet resources. Thus, to provide this service is also needed to control access to Internet connection for several reasons:
  • A company needs to ensure that only its visitors use their Internet connection, not also computers in the immediate neighborhood (apartments in blocks neighbors, other companies have offices nearby, a.s.o.)
  • the free wireless connection also means is impossible to identify user, which may give him the opportunity of using access to attack on other Internet sites, electronic fraud, other crimes, for which the connection owner could be liable.
In general, Internet access service for business visitors is implemented in one of the following:
  • access is unrestricted, no password and no encryption. The advantage is that any connection is easy and transparent, without the need for additional knowledge from users or your staff. The downside is obvious, namely that all computers within a radius of 100-200 meters around the site can have free Internet access through your equipment, and your connection.
  • restricted encryption key (WEP, WPA-PSK, WPA2-PSK). Advantage is that you control who connects to the access-point, but a relative advantage because the given password remains saved in the visitor's computer and can be reused and because, over time, any wireless connection using the security system can be decrypted, using specialized software. The time taken is not given password complexity, but the amount of traffic, the more traffic, the faster the decryption. Once decrypted, the connection can be used by the computers in the vicinity of location (see above). Disadvantage is that your staff should be enrolled for specific settings for different types of user equipment.
  • restricted encryption key or WPA Enterprise WPA2 Enterprise (802.1x, implementing digital certificates). The advantage is that you control and secure all the people that connect to your access-point. The disadvantages are that your staff should undergo an in depth specialization about that system and specific settings for various possible types of communication different users' equipment and that you need a license server (RADIUS implementation or equivalent).
As you can see, all options have drawbacks, and as of IT security and access control there either are no implementation or there is only a false and ineffective or complicated in terms of management solution. This also does not solve the problem of unwanted visitors that access the company intranet.


Optimization and securing using easyHotspot


easyHotspot address precisely these situations, enabling the easy use and no need for specific level knowledge of your employees, as well as a maximum security control connections all over your visitors.

easyhotspot for business

Thus, easyHotspot equipment will either double the existing gateway connecting directly to the Internet through a connection or will be placed inside the corporate network, ensuring separation from internal resources. Your visitor will follow three steps for unrestricted Internet access:
  • Any connection to the wireless network will be redirected to a page the user will be required an access code and will provide information about how to obtain that access code (IT department, other ways).
  • Following the call of the visitor and using an unique user name and password, your staff will generate an access code. Access codes are generated according to different categories and can provide access for various time periods.
  • Visitor will enter the access code and then can use Internet connection.
You will be able to view traffic reports, the number of connections per interval time, other summary.