May 20, 2013
, Inc. (NYSE: RKUS) today unveiled the first-of-its kind
technology called Secure Hotspot that automatically helps protect open Wi-Fi communications for users without cumbersome and manual configuration of their devices.
Based on Ruckus-patented Dynamic Pre-Shared Key (Dynamic PSK™) and using Ruckus proprietary
Zero IT Activation
™ technologies, Secure Hotspot allows an operator or enterprise to offer secured encrypted access to public network Wi-Fi services by automatically configuring each device with the requisite Wi-Fi network information along with a unique pre-shared key—all without user involvement.
Among the first users, UCOPIA Communications, a leader in mobility and network security solutions in
, has experienced the benefits of Ruckus Secure Hotspot technology. "Secure Hotspot technology gives us an incredibly simple, scalable and more secure way to offer safer hotspot access without users having to do anything. This is a huge win for everyone," said Didier Plateau, founder and CEO of UCOPIA. "The best part is that Secure Hotspot is a free software service within our existing Ruckus gear that allows our customers to differentiate themselves from the myriad of other hotspot services floating around."
a recent industry report from the Wireless Broadband Alliance (WBA) and Informa Telecoms & Media
, the number of public hotspots worldwide is expected to more than double from 2.1 million in 2012 to nearly 6 million in 2015. But while hotspot traffic is growing, so are identity theft, fraud and other criminal activities that can be made possible through access to unencrypted confidential information. Users are becoming more aware and more fearful that their communications at open hotspots could be compromised.
While most businesses with a knowledgeable IT staff will take the time to secure their internal wireless infrastructure with suitable encryption techniques, most public hotspots are not encrypted or protected in any way. This means that users are potentially vulnerable to attacks or confidentiality breaches. This is also a major problem for enterprises with limited IT staff that want to offer safer guest access but don't have the time or expertise to implement robust wireless security. Authentication (i.e., who is the user and what is the device) and encryption (data protection) are the two primary security items that need to be addressed.