Sesame Networks Tackles Wi-Fi Guest Security

By Carol Ellison  |  Posted 2004-10-25 Print this article Print

A wireless network security product from Canadian company Sesame Networks uses cell phone numbers to associate a user's activity with that person's identity.

Canadian Wi-Fi network company Sesame Networks makes its U.S. debut Monday with a security product designed to enable secure guest access to the Internet over enterprise wireless connections. Guest access has been a sticking point for Wi-Fi networks in enterprises where managers fear the consequences of opening segments of their WLANs (wireless LANs) for general public use. If they make Wi-Fi guest access available at all, they typically do it by running an open segment in front of a firewall on the corporate WLAN. But running an open segment can leave the organization liable if it is used to stage abuses, such as hacker and DOS (denial of service) attacks on other networks.
That concern has impeded WLAN adoption in organizations such as libraries that want to make guest access available while ensuring that it is not abused, said Cliff Grossner, Sesame Networks vice president of product marketing.
"An open Wi-Fi network opens them to liability if it is used in a way it should not be used," Grossner said. Abuses, he said, can be traced to the IP address from which they originated. The solutions presently used for enterprise guest access differ from public hot spots run by operators, which charge for access and can trace activities to the users account, he said. Enterprise solutions can be cumbersome if the segment is not left open. They require enterprises to maintain and track temporary IDs, reconfigure laptops to work on their networks, or revert to dial-up access for guests. Sesame Networks solution uses cell phone numbers to impose a means of associating a users activity with that persons identity. It presents guests with a customizable welcome screen that invites them to enter their cell phone number. That number is recorded in Sesame Networks data center and is associated with an activation code that is sent to the users phone via a SMS message. The user enters the code on their computing device to receive guest access on the enterprises WLAN. "Were using the basic features that the carriers provide, but were not going through the carriers in a business sense," Grossner said. "Its secure and traceable and can be deployed in 30 minutes." Grossner said Sesame Networks, which specializes in identity management solutions, intends to expand in the U.S. market and "will be looking at other services that require the authenticated network." Check out eWEEK.coms Mobile & Wireless Center at for the latest news, reviews and analysis.

Be sure to add our mobile and wireless news feed to your RSS newsreader or My Yahoo page

Carol Ellison is editor of's Mobile & Wireless Topic Center. She has authored whitepapers on wireless computing (two on network security–,Securing Wi-Fi Wireless Networks with Today's Technologies, Wi-Fi Protected Access: Strong, Standards-based Interoperable Security for Today's Wi-Fi Networks, and Wi-Fi Public Access: Enabling the future with public wireless networks.

Ms. Ellison served in senior and executive editorial positions for Ziff Davis Media and CMP Media. As an executive editor at Ziff Davis Media, she launched the networking track of The IT Insider Series, a newsletter/conference/Web site offering targeted to chief information officers and corporate directors of information technology. As senior editor at CMP Media's VARBusiness, she launched the Web site, VARBusiness University, an online professional resource center for value-added resellers of information technology.

Ms. Ellison has chaired numerous industry panels and has been quoted as a networking and educational technology expert in The New York Times, Newsday, The Los Angeles Times and The Wall Street Journal, National Public Radio's All Things Considered, CNN Headline News, WNBC and CNN/FN, as well as local and regional Comcast and Cablevision reports. Her articles have appeared in most major hi-tech publications and numerous newspapers and magazines, including The Washington Post and The Christian Science Monitor.

Submit a Comment

Loading Comments...
Manage your Newsletters: Login   Register My Newsletters

Rocket Fuel