Ryan Orsi

Ryan Orsi

San Diego, California, United States
5K followers 500+ connections

About

Senior product/general manager with 15 years leadership experience in fast-paced, global…

Activity

Join now to see all activity

Experience

  • Amazon Web Services (AWS) Graphic

    Amazon Web Services (AWS)

    San Diego, California, United States

  • -

    San Diego, California, United States

  • -

    Greater San Diego Area

  • -

    Greater Seattle Area

  • -

    San Diego, CA

  • -

    San Diego, ça

  • -

    Reno, NV

  • -

    Reno, NV

  • -

    Reno, NV

  • -

    Ukiah, CA

Education

  • University of Nevada, Reno Graphic

    University of Nevada, Reno

    -

    Activities and Societies: Phi Kappa Phi Beta Gamma Sigma

  • -

    Graduated with high distinction

  • -

    Located in Ukiah, CA

Publications

  • AWS re:Inforce: All About Generative AI for Cybersecurity

    Channel Futures

    As the world’s largest public cloud computing provider hosts its annual security conference in Philadelphia, look for a lot of discussion and capabilities applicable to value-added resellers, system integrators and managed security service providers.

    A few days before AWS re:Inforce, Channel Futures sat down with Ryan Orsi, worldwide cloud foundations and advanced services partner leader, to learn more about what’s in store for the channel

    See publication
  • Survey: 44% of Organizations Are in Early or Midpoint Stages of Generative AI Adoption

    Tech Republic

    Most IT decision-makers pursuing adoption of generative AI choose a hybrid approach of a mix of public and private models (38%), a recent study found. The hybrid approach is appealing because it matches companies’ needs to protect data, maintain control over AI models and results and cost. This illustrates what IT decision-makers prioritize when making decisions about generative AI adoption.

    See publication
  • 7 tough IT security discussions every IT leader must have

    CIO.com

    Security is on every IT leader’s mind, so why not discuss the latest threats and response tactics with colleagues and business partners who can share helpful, actionable insights?

    See publication
  • 2023 TECH COMPANIES MULL STRATEGIES TO BLOCK THREAT GROUPS FROM ABUSING PLATFORMS

    Decipher

    As threat groups eye cloud storage, email and messaging platforms to leverage in their cyberattacks, technology providers are searching for new ways to step up their defense strategies so that they’re not just scrambling to shut down this abuse, but proactively preventing it in the first place.

    See publication
  • re:Inforce 2023: A Look at the Cyber Insurance With AWS Ryan Orsi

    Cybersecurity ASEAN

    Tech behemoth AWS and cyber insurance firms are combining forces, creating a unique blend of technical proficiency and risk management expertise. "It's a supernova moment," as Ryan Orsi, the Senior Manager of AWS's Cloud Foundations Partner Service Acceleration, so poignantly phrased it in our recent chat during the annual re:Inforce event in Anaheim, California. A bold, paradigm-shifting moment that promises to make cyber insurance accessible to even the smallest of businesses. But can this…

    Tech behemoth AWS and cyber insurance firms are combining forces, creating a unique blend of technical proficiency and risk management expertise. "It's a supernova moment," as Ryan Orsi, the Senior Manager of AWS's Cloud Foundations Partner Service Acceleration, so poignantly phrased it in our recent chat during the annual re:Inforce event in Anaheim, California. A bold, paradigm-shifting moment that promises to make cyber insurance accessible to even the smallest of businesses. But can this seemingly indomitable duo truly redefine the cyber insurance industry? The answer, as it turns out, may just surprise you.

    See publication
  • AWS re:Inforce 2023: Key Highlights From the Cloud Security Event

    Spiceworks

    AWS launched Amazon CodeGuru Security, Amazon Verified Access, Amazon Verified Permissions, and more at AWS re:Inforce 2023.

    See publication
  • The 10 Biggest AWS News Stories Of 2023 (So Far)

    CRN

    The $85 billion Seattle-based cloud computing global market share leader has seen a slowdown in sales growth this year so far, but continues to unleash new products, programs and strategic agreements with channel partners at a rapid race.

    See publication
  • AWS launches cyber insurance program

    CRN

    Amazon Web Services is diving headfirst into the cyber insurance industry by launching a new program that guarantees customers a quote within two days, tied with massive revenue opportunities for the channel.

    See publication
  • AWS’ New Cyber Insurance ‘Industry-Shaping’ Program: 5 Big Things To Know

    CRN

    Customers who choose to leverage hardened infrastructure on AWS, coupled with a partner who can guide and implement the right security posture with AWS-backed cyber insurance as the backstop, is an untouchable offering in the market,’ says Justin Copie, CEO of AWS partner Innovative Solutions.

    See publication
  • 9 Questions for IT Leaders to Ask About Cloud Cybersecurity

    InformationWeek

    Companies are increasingly leveraging cloud-based services to do business, driven by the benefits of efficiency and scalability. But rapid cloud migration is not without its challenges. Security is paramount but a considerable concern. A 2022 survey conducted by data security company Netwrix found that improving security is a primary cloud adoption goal for 53% of organizations.

    See publication
  • Cybersecurity: Hoping for the Best, but Preparing for the Worst

    Healthcare IT Today

    In an ideal world we wouldn’t have to worry about cybersecurity for healthcare. But unfortunately that is just not the case. Instead with how deeply personal and important the information and data that we hold is in the world of healthcare, we need to be prepared for the absolute worst. All systems should have protections in place against even the worst of cyber threats.

    See publication
  • The Ever Evolving World of Cybersecurity Threat

    Healthcare IT Today

    Technology and the way people are using it are evolving in an increasingly steady pace. Just 20 years ago cellphones were getting photo display functions for the first time and were primarily being used to talk to people. Now our phones have facial recognition software and people are using them to shoot and edit films for fun. And the world of healthcare is no different. The amount of technology used and how it is being used has skyrocketed and unfortunately, alongside it so has the amount and…

    Technology and the way people are using it are evolving in an increasingly steady pace. Just 20 years ago cellphones were getting photo display functions for the first time and were primarily being used to talk to people. Now our phones have facial recognition software and people are using them to shoot and edit films for fun. And the world of healthcare is no different. The amount of technology used and how it is being used has skyrocketed and unfortunately, alongside it so has the amount and sophistication of cybersecurity threats.

    See publication
  • What to ask your CISO in 2023

    Protocol

    “Creating a culture of security begins with education and awareness to all levels and all roles within a company on what security policies and controls exist, how each department/team directly interacts with them, and training to empower individuals with methods to detect the common tricks bad actors use in a social engineering attack.”

    See publication
  • 8 Channel People Making Waves This Week at AWS

    Channel Futures

    Mark Ryland, AWS’ director of the office of the CISO, and Ryan Orsi, AWS‘ worldwide cloud foundations partner lead for security — MSSP/identity/ops/management, spoke to Channel Futures’ Edward Gately for the Gately Report about a range of security issues. These included the kind of security threats AWS is facing.

    See publication
  • Top Security Priority

    Channel Futures

    Ryan Orsi: I would say absolutely. I kind of tie this back to CEO Adam Selipsky‘s keynote where he announced Amazon Security Lake. It’s yet again the next evolution. Let AWS do the undifferentiated heavy lifting. We work with a lot of partners. And they have to develop their software to integrate with so many sources of logging telemetry. Wth Security Lake, they can sort of boil that down to one because now it’s a single common file-logging format. They have less code to maintain, [fewer]…

    Ryan Orsi: I would say absolutely. I kind of tie this back to CEO Adam Selipsky‘s keynote where he announced Amazon Security Lake. It’s yet again the next evolution. Let AWS do the undifferentiated heavy lifting. We work with a lot of partners. And they have to develop their software to integrate with so many sources of logging telemetry. Wth Security Lake, they can sort of boil that down to one because now it’s a single common file-logging format. They have less code to maintain, [fewer] integrations to maintain, and they can focus more on the analytics side, the threat intelligence and threat investigation side.

    See publication
  • 11 Questions Every CEO Should Ask Their CISO in 2023

    Protocol

    Assuming the organization has already implemented table-stakes user and application security mechanisms such as multi-factor authentication and least privilege access, creating a culture of security among employees is a great way to increase the company’s resilience to bad actors. Creating a culture of security begins with education and awareness to all levels and all roles within a company on what security policies and controls exist, how each department/team directly interacts with them, and…

    Assuming the organization has already implemented table-stakes user and application security mechanisms such as multi-factor authentication and least privilege access, creating a culture of security among employees is a great way to increase the company’s resilience to bad actors. Creating a culture of security begins with education and awareness to all levels and all roles within a company on what security policies and controls exist, how each department/team directly interacts with them, and training to empower individuals with methods to detect the common tricks bad actors use in a social engineering attack.

    See publication
  • How to protect your data in the cloud

    Fortune

    But companies must remember that data security is a shared responsibility with their cloud provider. “Sometimes you’ll hear it as a shared fate,” says Ryan Orsi, worldwide cloud foundations partner lead for security at AWS.

    While the vendor is responsible for host operating systems, virtualization layers, and any devices and buildings where the cloud is located, what’s known as security in the cloud falls to the customer, Orsi explains. “The moment they build an application, the moment…

    But companies must remember that data security is a shared responsibility with their cloud provider. “Sometimes you’ll hear it as a shared fate,” says Ryan Orsi, worldwide cloud foundations partner lead for security at AWS.

    While the vendor is responsible for host operating systems, virtualization layers, and any devices and buildings where the cloud is located, what’s known as security in the cloud falls to the customer, Orsi explains. “The moment they build an application, the moment they upload a piece of data into the cloud, they are responsible for that.”

    See publication
  • Decentralized IT Clouds Security Team’s Ability to Spot Risks

    Security Boulevard

    According to the IT at Work: 2022 and Beyond survey, 74% of IT decision-makers in the U.S. and Canada reported that their organization has successfully decentralized its IT structure. When it comes to the global average, 64% have decentralized their IT structure. Respondents noted some of the obvious challenges: They expect their organization to face challenges maintaining IT security levels (56%) followed by maintaining quality levels (41%) and the reliability of ongoing support (37%).

    See publication
  • Security LIVE! Twitch Show

    Twitch

    This show is hosted by Merritt Baer and Ryan Orsi on the third Tuesday of the month from 1-2pm PT. Each show features AWS Partners discussing various topics related to infrastructure, threat detection/incident response, organizational challenges, hiring and job categories/talent, and, of course, AWS Security, all while following the show rules. Security LIVE! rules: no sales pitches, no overuse of buzz words, and don’t be afraid to dive deep! Participants will walk away with knowledge of how to…

    This show is hosted by Merritt Baer and Ryan Orsi on the third Tuesday of the month from 1-2pm PT. Each show features AWS Partners discussing various topics related to infrastructure, threat detection/incident response, organizational challenges, hiring and job categories/talent, and, of course, AWS Security, all while following the show rules. Security LIVE! rules: no sales pitches, no overuse of buzz words, and don’t be afraid to dive deep! Participants will walk away with knowledge of how to build security solutions with AWS and AWS Partners and guidance on growing their career in security.

    See publication
  • AWS RE:INFORCE 2022: 10 BIGGEST NEWS AND PRODUCT LAUNCHES

    CRN

    Amazon Web Services has reinvented its popular AWS Security Competency program with eight new categories to help customers more easily find partner software and service solutions while also providing the channel with over 40 specific customer use cases.

    Each of the eight categories are defined by AWS security experts to help customers find specific system integrators, security managed service providers and independent software vendor (ISV) offerings to fit their specific cloud security…

    Amazon Web Services has reinvented its popular AWS Security Competency program with eight new categories to help customers more easily find partner software and service solutions while also providing the channel with over 40 specific customer use cases.

    Each of the eight categories are defined by AWS security experts to help customers find specific system integrators, security managed service providers and independent software vendor (ISV) offerings to fit their specific cloud security needs.

    See publication
  • AWS Adds Data Privacy Protection, More to Security Partner Programs

    SDxCentral

    AWS has enhanced and relaunched its Security Competency Program so that it encompasses a host of cybersecurity challenges enterprises face on a daily basis, including identity and access management, threat detection and response, infrastructure security, data protection, compliance and privacy, application security, perimeter protection, and core security.

    See publication
  • AWS On Air

    AWS

    Security LIVE!

    See publication
  • AWS on Air - Security LIVE! with Wiz

    AWS

    Another great moment from Amazon Web Services (AWS) re:Inforce this week was Wiz joining our Security LIVE! show with our wonderful hosts Merritt Baer and Ryan Orsi! Click below and go to timestamp 3:09:35 to learn about democratizing security with Yinon C.! #reinforce22 https://lnkd.in/etWQVff2

    See publication
  • AWS REVAMPS SECURITY COMPETENCY TO ‘ACCELERATE’ CLOUD SALES

    CRN

    Amazon Web Services has reinvented its popular AWS Security Competency program with eight new categories to help customers more easily find partner software and service solutions while also providing the channel with over 40 specific customer use cases.

    See publication
  • AWS’ NEW SECURITY SPECIALIZATIONS FOR MSSPS REMOVES ‘AMBIGUITY’

    CRN

    AWS is doubling down on partner cybersecurity enablement by launching six new specialized managed security services to boost the channel’s ability to provide 24x7 services while also removing the “ambiguity” that exists in the security industry.

    See publication
  • Security Maturity

    Deepwatch

    Security Maturity models using deepwatch managed security

    See publication
  • On Premises and Cloud Security Operations

    Deepwatch

    Common questions and corresponding best practices for utilizing (or not) on-premises security tools and practices in cloud security operations

    See publication
  • Managed AWS Security – even at 3 a.m. and over holidays

    Brighttalk

    Let experts take care of your AWS security monitoring and threat response so you don’t have to. Can you keep up with AWS Security Hub, Amazon GuardDuty, and AWS Cloud Trail alerts? Is your cloud firewall and EC2 workload protection blocking the most advanced threats? And are you proactively preventing threats with proper configuration? AWS recently announced a new baseline standard for cybersecurity, taking care of your AWS security needs by defining ten cybersecurity areas that all workloads…

    Let experts take care of your AWS security monitoring and threat response so you don’t have to. Can you keep up with AWS Security Hub, Amazon GuardDuty, and AWS Cloud Trail alerts? Is your cloud firewall and EC2 workload protection blocking the most advanced threats? And are you proactively preventing threats with proper configuration? AWS recently announced a new baseline standard for cybersecurity, taking care of your AWS security needs by defining ten cybersecurity areas that all workloads should be monitored for around the clock by trained AWS security professionals known as Level 1 Managed Security Services. Sophos is one of the world's first AWS Partners to join the new Level 1 MSSP Competency Program, fusing automated protection, with a team of managed service experts monitoring your environment 24/7 to stop threats – even at 3 a.m. and over the holidays.

    Other authors
    See publication
  • Simplifying cloud security on AWS with PwC

    PwC

    s the cloud more secure for my business than on-premise? How can I get the rest of my leadership team on board to support a secure-by-design cloud strategy? Hear from PwC’s AWS US Cybersecurity Leader, Jason Stauffenecker and AWS Partner Practice Team Lead for Security Consulting and MSSP, Ryan Orsi and they discuss this timely topic.

    See publication
  • Wipro attains AWS Level 1 Managed Security Service Provider competency status

    CRN

    Wipro Limited announced that it has achieved Amazon Web Services (AWS) Level 1 Managed Security Service Provider (MSSP) Competency status. This designation recognizes that Wipro has successfully met AWS’s requirements for a baseline of managed security services to protect and monitor essential AWS resources 24/7, known as Level 1 Managed Security Services.

    See publication
  • Atos Achieves AWS Level 1 Managed Security Service Provider Competency Status

    Atos

    Atos announced today that it has achieved Amazon Web Services (AWS) Level 1 Managed Security Service Provider (MSSP) Competency status. This designation recognizes that Atos has successfully met AWS’s requirements for a baseline of managed security services to protect and monitor essential AWS resources 24/7, known as Level 1 Managed Security Services. This new baseline standard of quality for managed security services was introduced by AWS to benefit cloud environments of any size and it spans…

    Atos announced today that it has achieved Amazon Web Services (AWS) Level 1 Managed Security Service Provider (MSSP) Competency status. This designation recognizes that Atos has successfully met AWS’s requirements for a baseline of managed security services to protect and monitor essential AWS resources 24/7, known as Level 1 Managed Security Services. This new baseline standard of quality for managed security services was introduced by AWS to benefit cloud environments of any size and it spans six security domains: vulnerability management, cloud security best practices and compliance, threat detection and response, network security, host and endpoint security, and application security. The six domains contain multiple MSSP services, each with technical skillset and operational process requirements specific to AWS.

    See publication
  • AWS Sets MSSP Beachhead With New Security Competency

    CRN

    The AWS Level 1 MSSP Competency, which AWS has been piloting for a year, creates a new baseline standard for managed security services that protect, monitor and respond to security events of essential AWS resources and are delivered to customers as a fully managed service.

    The new competency—which AWS channel chief Doug Yeum called an “industry first”—is designed to help partners differentiate themselves in a crowded security market and make it easier for customers to procure their…

    The AWS Level 1 MSSP Competency, which AWS has been piloting for a year, creates a new baseline standard for managed security services that protect, monitor and respond to security events of essential AWS resources and are delivered to customers as a fully managed service.

    The new competency—which AWS channel chief Doug Yeum called an “industry first”—is designed to help partners differentiate themselves in a crowded security market and make it easier for customers to procure their services.

    See publication
  • Claranet among first AWS partners to achieve new MSSP competency launched this week

    Channel Partner Insight

    Global technology provider Claranet has announced that it has achieved Amazon Web Services' newly launched Level 1 Managed Security Service Provider (MSSP) Competency status. AWS bills the Level 1 MSSP Competency as a "baseline standard of quality" for customers, including startups, SMBs and glob

    See publication
  • Deloitte Earns AWS’ Level 1 Managed Security Service Provider Competency

    Deloitte

    With AWS Level 1 MSSP Competency status, Deloitte services meet the cloud security requirements that AWS sets forth, as well as those of industry regulators. Deloitte also leverages its vast network and global resources to provide clients with end-to-end cloud services that help them manage and hone their different cloud security postures.

    See publication
  • Managed Cloud Security Starts at Level 1 with AWS Level 1 MSSP Competency Partners

    AWS

    For some organizations, operationalizing their security responsibilities in the cloud with the right tools, people, and processes can be challenging if they don’t have the cloud security expertise they need in-house.

    A Managed Security Service Provider (MSSP) can integrate, join forces with, and work alongside in-house security teams, or provide full outsourcing for Amazon Web Services (AWS) security operations.

    To help customers looking for support from MSSPs, we created a new…

    For some organizations, operationalizing their security responsibilities in the cloud with the right tools, people, and processes can be challenging if they don’t have the cloud security expertise they need in-house.

    A Managed Security Service Provider (MSSP) can integrate, join forces with, and work alongside in-house security teams, or provide full outsourcing for Amazon Web Services (AWS) security operations.

    To help customers looking for support from MSSPs, we created a new baseline standard of quality to refer to when making the decision about an AWS Partner to team up with. We call this Level 1 Managed Security Services, and it’s a good starting point for customers to operationalize their AWS security responsibilities in the cloud.

    See publication
  • Managed Cloud Security Starts at Level 1 with AWS Level 1 MSSP Competency Partners

    Global Security Mag

    To help customers looking for support from MSSPs, we created a new baseline standard of quality to refer to when making the decision about an AWS Partner to team up with. We call this Level 1 Managed Security Services, and it’s a good starting point for customers to operationalize their AWS security responsibilities in the cloud.

    See publication
  • Mission Achieves AWS Level 1 Managed Security Service Provider Competency Status

    Mission Cloud

    AWS launched the AWS Level 1 MSSPCompetency to enable customers to easily acquire ongoing security monitoring and management, validated by AWS. AWS security experts annually validate the tools used and operational processes of each MSSP address specific cloud security challenges such as continuous event monitoring, triaging, AWS service configuration best practices, and 24/7 incident response. The AWS Level 1 MSSPCompetency provides a faster and easier experience for customers to select the…

    AWS launched the AWS Level 1 MSSPCompetency to enable customers to easily acquire ongoing security monitoring and management, validated by AWS. AWS security experts annually validate the tools used and operational processes of each MSSP address specific cloud security challenges such as continuous event monitoring, triaging, AWS service configuration best practices, and 24/7 incident response. The AWS Level 1 MSSPCompetency provides a faster and easier experience for customers to select the right MSSP to help them achieve their goals for business risk and cloud strategy confidence.

    See publication
  • Observian Achieves AWS Level 1 MSSP Competency Status #AWS #Security #Managed Security

    Observian

    Observian, an AWS Advanced Consulting Partner, announced today that it has achieved Amazon Web Services (AWS) Level 1 Managed Security Service Provider (MSSP) Competency status. This designation recognizes that Observian has successfully met AWS’s requirements for a baseline of managed security services to protect and monitor essential AWS resources 24/7, known as Level 1 Managed Security Services. This new baseline standard of quality for managed security services was introduced by AWS to…

    Observian, an AWS Advanced Consulting Partner, announced today that it has achieved Amazon Web Services (AWS) Level 1 Managed Security Service Provider (MSSP) Competency status. This designation recognizes that Observian has successfully met AWS’s requirements for a baseline of managed security services to protect and monitor essential AWS resources 24/7, known as Level 1 Managed Security Services. This new baseline standard of quality for managed security services was introduced by AWS to benefit cloud environments of any size and it spans six security domains: vulnerability management, cloud security best practices and compliance, threat detection and response, network security, host and endpoint security, and application security. The six domains contain multiple MSSP services, each with technical skillset and operational process requirements specific to AWS.

    See publication
  • Proficio Achieves AWS Level 1 Managed Security Service Provider Competency Status and Becomes an MSSP Seller in AWS Marketplace

    Global News Wire

    AWS launched the AWS Level 1 MSSP Competency together with a dedicated MSSP solution area in AWS Marketplace to enable customers to easily acquire ongoing security monitoring and management, validated by AWS.

    See publication
  • Secureworks Achieves AWS Level 1 Managed Security Service Provider Competency Status

    Secureworks

    AWS launched the AWS Level 1 MSSP Competency to help customers to easily acquire validated security monitoring and management. AWS security experts annually validate that the tools and processes of each MSSP address cloud security challenges such as continuous event monitoring, triaging, AWS service configuration best practices, and 24/7 incident response. The AWS Level 1 MSSP Competency makes it faster and easier for customers to select the right MSSP to help them achieve their goals for…

    AWS launched the AWS Level 1 MSSP Competency to help customers to easily acquire validated security monitoring and management. AWS security experts annually validate that the tools and processes of each MSSP address cloud security challenges such as continuous event monitoring, triaging, AWS service configuration best practices, and 24/7 incident response. The AWS Level 1 MSSP Competency makes it faster and easier for customers to select the right MSSP to help them achieve their goals for business risk and cloud strategy confidence.

    See publication
  • Sophos achieves AWS Level 1 Managed Security Service Provider Competency status

    Sophos

    This new baseline standard of quality for managed security services was introduced by AWS to benefit cloud environments of any size and it spans six security domains: vulnerability management, cloud security best practices and compliance, threat detection and response, network security, host and endpoint security, and application security. The six domains contain multiple MSSP services, each with technical skillset and operational process requirements specific to AWS.

    See publication
  • Tech Mahindra achieves AWS Level 1 Managed Security Service Provider (MSSP) Competency status covering all six cybersecurity cloud domains

    Tech Mahindra

    Tech Mahindra Ltd., a provider of digital transformation, consulting and business re-engineering services and solutions, announced today that it has been recognised and certified as Amazon Web Services (AWS) Level 1 Managed Security Service Provider (MSSP) Competency status.

    See publication
  • Interview: Security for the Wi-Fi 6E age – with WatchGuard

    Wi-Fi NOW

    Enjoy my brand new interview with WatchGuards Wi-Fi security evangelist Ryan Orsi.

    /Claus.

    See publication
  • What every engineer can do about 5G/Wi-Fi handoff security

    5G Technology World

    5G is rolling out across the world such as speed, reliability, and network efficiency. 5G is unlocking or improving use cases such as IoT communications at the edge, high quality video, lower latency to support industry controls and automation, highly-accurate location tracking, and more.

    See publication
  • Why MSSPs Should Add Wi-Fi Security to Their Stack

    MSSP Alert

    Each MSSP offers a unique set of services to their customer base with differentiation and operational efficiency frequently among top management priorities. Selecting the technical components to formulate service offerings around is perhaps one of the most important decisions MSSPs need to make. MSSPs reading this are strongly encouraged to consider adding Wi-Fi security products focused at detecting and preventing the six Layer Two Wi-Fi threat categories that nearly every business has been…

    Each MSSP offers a unique set of services to their customer base with differentiation and operational efficiency frequently among top management priorities. Selecting the technical components to formulate service offerings around is perhaps one of the most important decisions MSSPs need to make. MSSPs reading this are strongly encouraged to consider adding Wi-Fi security products focused at detecting and preventing the six Layer Two Wi-Fi threat categories that nearly every business has been vulnerable to for the last twenty one years.

    See publication
  • Does Your Business Need Its Own VPN?

    IT Pro

    But what about businesses? Have you ever stopped to think whether your business ought to be providing a VPN service to remote workers, or taking advantage of one to protect your sensitive data? We talked to industry experts to find out whether your business needs a VPN.

    See publication
  • A Wireless World

    Ping, Firewalls.com

    Learn about wi-fi security and the Trusted Wireless Environment pledge.

    See publication
  • Ruckus (Commscope) Access Points Put to The Hackers’ Test

    Secplicity

    Ruckus, which is now a part of Commscope via acuquisition in 2018, came into the business-class Wi-Fi market in 2002 with a disruptive antenna design. At the time, the antenna technology was quite novel and utilized multiple electrically-steerable antenna arrays to focus signal to desired targets such as laptops or mobile phones, and reject noisy sources like other Wi-Fi networks and Radio Frequency (RF) interference. Their technology has helped businesses all over the world offer rock-solid…

    Ruckus, which is now a part of Commscope via acuquisition in 2018, came into the business-class Wi-Fi market in 2002 with a disruptive antenna design. At the time, the antenna technology was quite novel and utilized multiple electrically-steerable antenna arrays to focus signal to desired targets such as laptops or mobile phones, and reject noisy sources like other Wi-Fi networks and Radio Frequency (RF) interference. Their technology has helped businesses all over the world offer rock-solid Wi-Fi service, but does it keep hackers out?

    See publication
  • How To Stop Wi-Fi Hackers Abusing Ubiquiti’s UniFi Access Points

    Secplicity

    Ubiquiti, a global networking technology company came onto the mainstream marketplace beginning in 2005 with a clever idea of offering products at low prices to mass markets guiding channel players to monetize their services instead of the hardware. Every strategy has its pluses and minuses and some would say Ubiquiti’s low-price leader concept swung the pendulum too far, reducing their own ability to re-invest profits into their research and development department. Others would say the…

    Ubiquiti, a global networking technology company came onto the mainstream marketplace beginning in 2005 with a clever idea of offering products at low prices to mass markets guiding channel players to monetize their services instead of the hardware. Every strategy has its pluses and minuses and some would say Ubiquiti’s low-price leader concept swung the pendulum too far, reducing their own ability to re-invest profits into their research and development department. Others would say the low-price leader concept has worked and put the UniFi brand on the map alongside networking names like Cisco Meraki. Regardless of which viewpoint you align to, the number of businesses with Ubiquiti UniFi access points around the world is impressive and therefore a prime target for cyber crimals as evidenced by vulnerability disclosed last year.

    See publication
  • Meraki’s Air Marshal Gets Help from a New WIPS Sheriff

    Secplicity

    Wi-Fi hacking is a hot topic, but one that’s plagued by ambiguous and often contradictory technical terminology. Luckily, the lack of common definitions for Wi-Fi threat vectors has actually produced a solution to the problem: the Trusted Wireless Environment. The Trusted Wireless Environment framework succinctly defines the six Layer 2 Wi-Fi hacks that affect nearly every business today and provides a simple test criterion to determine if a Wi-Fi network is protected from each type of attack.

    See publication
  • Wi-Fi hacking: Latest threats & our professional responsibility – with WatchGuard

    Wi-Fi NOW

    No company is more committed to fighting Wi-Fi hacking than WatchGuard. And nobody is more passionate and knowledgable about the topic than Ryan Orsi. Enjoy Ryan’s presentation from Wi-Fi NOW International in London, November 2019, here.

    See publication
  • Overcoming the latest cyber threats

    Land Mobile

    How can organisations protect themselves against cyber attack when the threat is changing all the time as new technologies are adopted and exploited? Kate O’Flaherty reports

    See publication
  • WatchGuard Exec: How To Profitably Close Four Major Attack Surfaces

    CRN

    “Security should not be slowing down your customers, and security should not be consuming too much of your team’s time,” said WatchGuard’s Ryan Orsi.

    See publication
  • Wi-Fi Hacking: Latest Threats and Our Professional Responsibility

    CWNP

    As Wi-Fi professionals, we are the experts in our field. Learn what the current Wi-Fi hacking threats are and why we have a social responsibility to protect the lesser educated (typically our users and customers) from them.

    See publication
  • 5G Is More Secure than Wi-Fi…Right?

    Network Computing

    5G services will be handing-off connections to Wi-Fi networks at a staggering pace, exposing more and more cellular users to Wi-Fi security threats.

    See publication
  • Are Your Guests at Risk From These Six Common Wi-Fi Attacks?

    Hospitality Tech

    Over the years, Wi-Fi has emerged as one of the top guest amenities at hotels. In fact, according to a recent survey, 90% of respondents claim that a Wi-Fi connection is “very important,” and 58% stated that the quality of that service was “highly likely” to impact their booking decisions. Yet despite the need for all this access, guests are concerned about security and online safety – and they should be. In many cases, hotel rooms serve as a remote office for workers, where confidential…

    Over the years, Wi-Fi has emerged as one of the top guest amenities at hotels. In fact, according to a recent survey, 90% of respondents claim that a Wi-Fi connection is “very important,” and 58% stated that the quality of that service was “highly likely” to impact their booking decisions. Yet despite the need for all this access, guests are concerned about security and online safety – and they should be. In many cases, hotel rooms serve as a remote office for workers, where confidential corporate and personal information is exchanged. With a steady stream of media stories showcasing data breaches and vulnerabilities (think Dragonblood), guests are rightfully suspicious of the security hospitality organizations are providing when it comes to the Wi-Fi network.

    See publication
  • Beware Evil Twins on Your Holiday Travel

    Eat Drink Sleep

    Evil twin access points

    See publication
  • Channel Partners and Their Customers Discuss the Importance of Secure Wi-Fi

    Channel Vision Magazine

    How to stop wi-fi hacking

    See publication
  • Q&A: Perspectives From Channel Partners And Customers On Secure Wi-Fi

    Software Business Growth

    If you’re not already familiar, “Get to Know Your Customer Day” is observed annually on the third Thursday of each quarter. It’s an opportunity to reach out to your business’s patrons and get to know them a little better. To mark this week’s celebration, we’ve done just that!

    As a 100 percent channel-focused company, WatchGuard’s entire business is structured to support and enable VARs and MSSPs. Our channel partners are our customers. From network security and intelligence to…

    If you’re not already familiar, “Get to Know Your Customer Day” is observed annually on the third Thursday of each quarter. It’s an opportunity to reach out to your business’s patrons and get to know them a little better. To mark this week’s celebration, we’ve done just that!

    As a 100 percent channel-focused company, WatchGuard’s entire business is structured to support and enable VARs and MSSPs. Our channel partners are our customers. From network security and intelligence to multi-factor authentication and secure Wi-Fi, these channel organizations work tirelessly to provide enterprise-grade security to customers of all sizes and industries. With the world’s ever-increasing reliance on connected devices and Wi-Fi connectivity, secure Wi-Fi is a major focus for our channel partners and their customers. As such, we asked a few questions to get to know their perspectives on the top challenges and benefits of Wi-Fi security today.

    See publication
  • WPA3 flaws found in Dragonfly handshake

    Tech Target

    Researchers discovered vulnerabilities in the WPA3 protocol, specifically in the Dragonfly handshake authentication, allowing for multiple exploits branded Dragonblood.

    See publication
  • Why WPA3 Won't Stop Wi-Fi Hacking

    RCR Wireless

    From corporate offices to friendly neighborhood coffee shops, nearly every organization operating a Wi-Fi network is highly exposed to vulnerabilities which bad actors can use to steal sensitive data, eavesdrop, and infiltrate further into the network. The Wi-Fi attack surface is one of the most desirable to hackers because nearly every cyber security company focuses on layer 7 application attacks (such as zero-day malware and ransomware), while historically very little effort has been made to…

    From corporate offices to friendly neighborhood coffee shops, nearly every organization operating a Wi-Fi network is highly exposed to vulnerabilities which bad actors can use to steal sensitive data, eavesdrop, and infiltrate further into the network. The Wi-Fi attack surface is one of the most desirable to hackers because nearly every cyber security company focuses on layer 7 application attacks (such as zero-day malware and ransomware), while historically very little effort has been made to defend against layer 2 Wi-Fi attacks. In fact, protections for layer 2 have only recently been introduced, leaving 20 years’ worth of Wi-Fi access points, routers, and clients wide open to attack. Layer 2 Wi-Fi attacks often include tactics like flooding an AP with de-authentication frames or cracking WPA2, an encryption protocol designed to protect wireless networks.

    See publication
  • 6 Threats to Block for a Trusted Wireless Environment

    Network Computing

    The majority of today’s Wi-Fi access points, routers, and hotspots are highly exposed attack surfaces. Practically every security company in the business focuses on layer 7 application attacks, such as zero-day malware and ransomware. Unfortunately, very little attention has been paid to Wi-Fi layer 2 attacks, which includes tactics like flooding an access point (AP) with de-authentication frames or cracking WPA2. To help combat these vulnerabilities, more and more IT departments are creating…

    The majority of today’s Wi-Fi access points, routers, and hotspots are highly exposed attack surfaces. Practically every security company in the business focuses on layer 7 application attacks, such as zero-day malware and ransomware. Unfortunately, very little attention has been paid to Wi-Fi layer 2 attacks, which includes tactics like flooding an access point (AP) with de-authentication frames or cracking WPA2. To help combat these vulnerabilities, more and more IT departments are creating “Trusted Wireless Environments” that automatically detect and prevent Wi-Fi threats.

    See publication
  • Understanding Evil Twin AP Attacks and How to Prevent Them

    Dark Reading

    It's been nearly 20 years since IEEE 802.11b was released and the world got the first Wi-Fi-branded products. And yet the Layer 2 attack surface remains largely unprotected from dangerous Wi-Fi threats that can result in stolen credentials and sensitive information as well as backdoor/malware payload drops. Attackers have been exploiting a fundamental issue with Wi-Fi: Laptops, smartphones, and connected devices aren't equipped to distinguish between two radios broadcasting the same SSID name…

    It's been nearly 20 years since IEEE 802.11b was released and the world got the first Wi-Fi-branded products. And yet the Layer 2 attack surface remains largely unprotected from dangerous Wi-Fi threats that can result in stolen credentials and sensitive information as well as backdoor/malware payload drops. Attackers have been exploiting a fundamental issue with Wi-Fi: Laptops, smartphones, and connected devices aren't equipped to distinguish between two radios broadcasting the same SSID name. This allows hackers to use malicious access points (APs) that eavesdrop on traffic, establish "man-in-the-middle" (MitM) positions, and extract sensitive information, often without leaving any traces behind.

    See publication
  • WatchGuard’s New Framework Broadens Focus on Wi-Fi Security

    Channel Partners Online

    Ryan Orsi, WatchGuard’s director of product management, tells Channel Partners that WatchGuardONE partners were one of the top drivers behind the creation of the resource.

    WatchGuard's Ryan Orsi
    WatchGuard’s Ryan Orsi

    “When WatchGuard began focusing on Wi-Fi security, the feedback from our partner community was incredibly consistent across all business models (VAR, MSP, MSSP, project-consulting and distribution) and across all cultures, countries and languages,” he said. “They…

    Ryan Orsi, WatchGuard’s director of product management, tells Channel Partners that WatchGuardONE partners were one of the top drivers behind the creation of the resource.

    WatchGuard's Ryan Orsi
    WatchGuard’s Ryan Orsi

    “When WatchGuard began focusing on Wi-Fi security, the feedback from our partner community was incredibly consistent across all business models (VAR, MSP, MSSP, project-consulting and distribution) and across all cultures, countries and languages,” he said. “They are as passionate about security as we are and agree that all Wi-Fi networks on the planet are mostly wide open to Wi-Fi attacks. They also agree that the lack of awareness of these security threats is astounding.”

    See publication
  • Wi-Fi honeypots: Alive and well at RSAC 2018

    Helpnet Security

    It was a gorgeous, sunny week in San Francisco as the best and brightest security experts around the globe gathered to attend one of the leading cybersecurity tradeshows in the industry – RSA Conference 2018.

    From hacking iOS to why security matters when it comes to Wi-Fi, wireless threats were the topic of several talk-tracks this year. We’re all guilty of connecting to unsecured public Wi-Fi at times. We connect at the Airport, coffee shop, and even at venues like RSAC. And as the…

    It was a gorgeous, sunny week in San Francisco as the best and brightest security experts around the globe gathered to attend one of the leading cybersecurity tradeshows in the industry – RSA Conference 2018.

    From hacking iOS to why security matters when it comes to Wi-Fi, wireless threats were the topic of several talk-tracks this year. We’re all guilty of connecting to unsecured public Wi-Fi at times. We connect at the Airport, coffee shop, and even at venues like RSAC. And as the growth and popularity of Wi-Fi continues to climb, it’s important that we understand the risks that come with connecting to public Wi-Fi, or even offering Wi-Fi to employees, visitors and guests.

    See publication
  • Four wireless standards hackers will target after Wi-Fi

    Helpnet Security

    When any new communication medium for sharing information emerges, it’s often quickly followed by those committed to hacking it. This natural progression is unfortunately very predictable: groups of skilled experts form to explore vulnerabilities; they share ideas, code, tools and more. After a while, that small group balloons into a full-blown community that’s equipped with easy-to-use graphical hacking toolkits and hundreds of instructional resources online. Suddenly, hacks that used to…

    When any new communication medium for sharing information emerges, it’s often quickly followed by those committed to hacking it. This natural progression is unfortunately very predictable: groups of skilled experts form to explore vulnerabilities; they share ideas, code, tools and more. After a while, that small group balloons into a full-blown community that’s equipped with easy-to-use graphical hacking toolkits and hundreds of instructional resources online. Suddenly, hacks that used to require years of experience are now widely available to anyone with a few hours to burn on YouTube and the willingness to download shady software tools.

    See publication
  • Part 3: Current and Future IoT Threats

    Cyber Defense Magazine

    IoT security threats

    See publication
  • Part 2: Defending Your Airspace

    Cyber Defense Magazine

    How WIPS and WIDS work, and all the in between.

    See publication
  • Secure Wi-Fi with Ryan Orsi: IoT Current and Future Attacks

    Brighttalk

    It's expected that by 2020, annual revenues around IoT solutions could exceed $470 billion. As all things IoT saturate the market (cars, tea kettles, toasters!) what does that mean from a security standpoint? What vulnerabilities aren't included in the fine print of these technologies? Join Ryan Orsi in episode three of our webinar series for a look at the current state of Wi-Fi Iot and what may lay ahead.

    See publication
  • Secure Wi-Fi with Ryan Orsi: Defending Your Airspace

    Brighttalk

    During our previous episode, Anatomy of a Wi-Fi Hack, we took a deep dive into the who, what, where and how of wireless hacking.

    In episode two of this webinar series, WatchGuard's Ryan Orsi explores what measures can and should be taken to defend the Wi-Fi airspace around us.

    See publication
  • Part 1: Anatomy of a Wi-Fi Hack

    Cyber Defense Magazine

    How do Wi-Fi hacks actually work?

    See publication
  • Secure Wi-Fi with Ryan Orsi: Anatomy of a Wi-Fi Hack

    Brighttalk

    565,000. Alarmingly, that’s the number of videos currently available on Youtube that explain how to execute a wireless attack. In less than a weekend, anyone with Internet access and some free time can become a Wi-Fi MiTM (Man in the Middle) and wreak havoc on your network.

    Join WatchGuard's Ryan Orsi in episode one of our three-part Secure Wi-Fi miniseries as he explores the motives, execution, and anatomy of a Wi-Fi hack.

    See publication
  • Results of the rogue Access Point experiment at RSA Conference 2017

    Helpnet Security

    The security of open Wi-Fi hotspots has been a subject of great concern for years. But, would you believe that we were overwhelmingly successful using Wi-Fi attacks dating back twelve years on the RSA Conference show floor in San Francisco? Either we are really good at getting lucky with old tools, or there is a serious Wi-Fi security pandemic out there.

    See publication
  • Google wants to revamp public Wi-Fi networks, but what about security?

    Helpnet Security

    William Shakespeare once wrote, “the eyes are the windows to your soul,” but if you ask savvy retailers, they might say it’s guest Wi-Fi. Why? New Wi-Fi systems allow them to use powerful features like social media integration, SMS and email to gather key information about customers and connect with them long after they leave a brick and mortor location. While these features are good for both the business and its customers, they can also create challenges for small business owners who are…

    William Shakespeare once wrote, “the eyes are the windows to your soul,” but if you ask savvy retailers, they might say it’s guest Wi-Fi. Why? New Wi-Fi systems allow them to use powerful features like social media integration, SMS and email to gather key information about customers and connect with them long after they leave a brick and mortor location. While these features are good for both the business and its customers, they can also create challenges for small business owners who are already extremely busy.

    See publication
  • 4 Wi-Fi Services That Will Delight Customers

    Channel Partners Online

    More than 9.1 million stores, cafes, hotels and other sites worldwide offer Wi-Fi, according to analysis firm Maravedis. If you look at this growth map, you can watch the number of global hotspots increasing at about two per second.

    Not only do end customers expect connectivity, companies have learned that Wi-Fi can improve their bottom lines by acting as a source of leads and valuable marketing data, if they do security right. Because my company sells exclusively through the channel…

    More than 9.1 million stores, cafes, hotels and other sites worldwide offer Wi-Fi, according to analysis firm Maravedis. If you look at this growth map, you can watch the number of global hotspots increasing at about two per second.

    Not only do end customers expect connectivity, companies have learned that Wi-Fi can improve their bottom lines by acting as a source of leads and valuable marketing data, if they do security right. Because my company sells exclusively through the channel, our partners constantly send us requests for new and different Wi-Fi services. I’ve distilled these requests to the top four value-added services most important to our mutual SMB customers. Presented here in order of least-to-most complicated, all of these represent potential ongoing billable services for the channel.

    See publication
  • Wi-Fi and security are better together for SMBs

    Helpnet Security

    Wireless adoption is growing fast globally, with Wi-Fi access becoming ubiquitous in businesses, stores, corporate environments and public spaces; literally everywhere we go.

    As a small to midsized business (SMB), you may be considering or already offering Wi-Fi as a service to your customers. It’s a great idea. SMBs are adding Wi-Fi access in their environments to increase customer satisfaction, build loyalty, repeat visits, and enable unique marketing opportunities. Customers…

    Wireless adoption is growing fast globally, with Wi-Fi access becoming ubiquitous in businesses, stores, corporate environments and public spaces; literally everywhere we go.

    As a small to midsized business (SMB), you may be considering or already offering Wi-Fi as a service to your customers. It’s a great idea. SMBs are adding Wi-Fi access in their environments to increase customer satisfaction, build loyalty, repeat visits, and enable unique marketing opportunities. Customers appreciate and come to expect a fast, reliable secure wireless network experience.

    See publication
  • Life of a Wi-Fi Security Researcher

    Infosecurity Magazine/ Dan Raywood

    How secure is your Wi-Fi, the Wi-Fi that your device is connected to, and when did you last read a story about a Wi-Fi hack? This week, Infosecurity attended a conference specifically focused on Wi-Fi, and sat down with the sole security presenter from the conference.

    Ryan Orsi is director of product management at WatchGuard, where he leads secure Wi-Fi solutions for the company. He talked about the 'layer two levels' of the open systems interconnection model, which he said that, since…

    How secure is your Wi-Fi, the Wi-Fi that your device is connected to, and when did you last read a story about a Wi-Fi hack? This week, Infosecurity attended a conference specifically focused on Wi-Fi, and sat down with the sole security presenter from the conference.

    Ryan Orsi is director of product management at WatchGuard, where he leads secure Wi-Fi solutions for the company. He talked about the 'layer two levels' of the open systems interconnection model, which he said that, since its inception 20 years ago, has been forgotten about. “If you stop layer two from ever happening, you stop all of the crazy hacks from happening,” he argued.

    See publication

Patents

  • Small form factor CPL antenna with balanced fed dipole electric field radiator

    Issued US US10320078B2

    An antenna is disclosed with a magnetic loop, a dipole electric field radiator inside the magnetic loop, and with symmetric geometry about the feed. This symmetry allows for realization of image theory and significant size reduction, whereby half of the antenna is removed and replaced by the image induced in a connected ground plane.

    See patent
  • Compound loop antenna system with isolation frequency agility

    Issued US US10270170B2

    An antenna system is provided, including a first antenna, a second antenna, a ground plane, and a resonant isolator located proximate to the first antenna and the second antenna. The resonant isolator is coupled to the ground plane at or proximate to one current null point created by a first antenna and at or proximate to a second current null point created by a second antenna, and is configured to isolate the first antenna from the second antenna at a resonance. In some cases, the resonant…

    An antenna system is provided, including a first antenna, a second antenna, a ground plane, and a resonant isolator located proximate to the first antenna and the second antenna. The resonant isolator is coupled to the ground plane at or proximate to one current null point created by a first antenna and at or proximate to a second current null point created by a second antenna, and is configured to isolate the first antenna from the second antenna at a resonance. In some cases, the resonant isolator may include at least two conductive portions that may be substantially parallel to one another. The resonant isolator may also include an active tuning element that may change the resonance at which the resonant isolator de-couples the two antennas. In some cases, each of the antennas may be a capacitively-coupled compound loop antenna.

    See patent
  • Three-dimensional compound loop antenna

    Issued US US9799956B2

    A three-dimensional compound loop antenna is provided, including a ground plane, a pair of horizontal conductive portions substantially horizontal relative to the ground plane, a feed line substantially vertical relative to the ground plane, and a vertical conductive portion coupling the pair of horizontal conductive portions to the ground plane.

    See patent
  • Compound coupling to re-radiating antenna solution

    Issued US US9748651B2

    physical contact, between two compound loop (CPL) antennas across a variety of barriers such as plastic, human tissues, glass, and air. The compound coupling interface is highly efficient in transferring the RF energy from a source including one CPL antenna to a destination including a second CPL antenna. A re-radiating structure including a further CPL antenna or a different type of antenna may be connected on the destination side to completely physically isolate the source side from the…

    physical contact, between two compound loop (CPL) antennas across a variety of barriers such as plastic, human tissues, glass, and air. The compound coupling interface is highly efficient in transferring the RF energy from a source including one CPL antenna to a destination including a second CPL antenna. A re-radiating structure including a further CPL antenna or a different type of antenna may be connected on the destination side to completely physically isolate the source side from the destination side. When the destination coupling antenna is removed, the source coupling antenna may operate as an efficient radiator at the desired operating frequencies. Likewise, the destination coupling antenna may operate as an efficient radiator in the absence of the source coupling antenna.

    See patent
  • System and method of compound coupling to re-radiating antenna

    Issued TW TWI584523B

    Loop antennas with a substantially uniform current distribution around the loop and having a directional radiation pattern in a plane perpendicular to the plane of the loop

    See patent
  • Antenna system using capacitively coupled compound loop antennas with antenna isolation provision

    Issued US US9496614B2

    An antenna system is provided, including a first antenna, a second antenna, a ground plane, and a resonant isolator coupled to the first and second antennas. Each of the antennas is configured to be a capacitively-coupled compound loop antenna, and the resonant isolator is configured to provide isolation between the two antennas at resonance. The two antennas may be symmetrical or asymmetrical and include a first element that emits a magnetic field and a second element that generates an…

    An antenna system is provided, including a first antenna, a second antenna, a ground plane, and a resonant isolator coupled to the first and second antennas. Each of the antennas is configured to be a capacitively-coupled compound loop antenna, and the resonant isolator is configured to provide isolation between the two antennas at resonance. The two antennas may be symmetrical or asymmetrical and include a first element that emits a magnetic field and a second element that generates an electrical field that is orthogonal to the magnetic field. The radiating element of the second element may be capacitively coupled to the remainder of the second element. The resonate isolator may be comprised of a single conductive element or two conductive elements that are capacitively coupled.

    See patent
  • Capacitively coupled compound loop antenna

    Issued US US9431708B2

    A compound loop antenna (CPL) is described that includes a capacitively fed magnetic loop and/or a capacitively fed electric field radiator. Embodiments include single-band CPL antennas and multi-band CPL antennas. The CPL antennas have been reduced in physical size by capacitively feeding the loop and/or radiator. The embodiments include at least one e-field radiation element that is capacitively coupled or not capacitively coupled, at least one magnetic loop element that is capacitively…

    A compound loop antenna (CPL) is described that includes a capacitively fed magnetic loop and/or a capacitively fed electric field radiator. Embodiments include single-band CPL antennas and multi-band CPL antennas. The CPL antennas have been reduced in physical size by capacitively feeding the loop and/or radiator. The embodiments include at least one e-field radiation element that is capacitively coupled or not capacitively coupled, at least one magnetic loop element that is capacitively coupled. A continuation of the magnetic loop may be continued with either a wire or a connection to a second layer.

    See patent
  • Circular polarized compound loop antenna

    Issued US US9252487B2

    Embodiments provide single-sided and multi-layered circular polarized, self-contained, compound loop antennas (circular polarized CPL). Embodiments of the CPL antennas produce circular polarized signals by using two electric field radiators physically oriented orthogonal to each other, and by ensuring that the two electric field radiators are positioned such that an electrical delay between the two electric field radiators results in the two electric field radiators emitting their respective…

    Embodiments provide single-sided and multi-layered circular polarized, self-contained, compound loop antennas (circular polarized CPL). Embodiments of the CPL antennas produce circular polarized signals by using two electric field radiators physically oriented orthogonal to each other, and by ensuring that the two electric field radiators are positioned such that an electrical delay between the two electric field radiators results in the two electric field radiators emitting their respective electric fields out of phase. Ensuring the proper electrical delay between the two electric field radiators also maintains high efficiency of the antenna and it improves the axial ratio of the antenna.

    See patent
  • Automated antenna builder

    Issued US US8849629B2

    Embodiments are directed to an antenna builder and a method of building and maintaining an antenna design repository. A first embodiment consists of an antenna builder that enables the creation of an antenna representation that can subsequently be output into a plurality of formats to be used by other tools, such as electromagnetic simulation software. An alternative embodiment is directed to a method of building and maintaining a repository of antenna designs. The repository of antenna designs…

    Embodiments are directed to an antenna builder and a method of building and maintaining an antenna design repository. A first embodiment consists of an antenna builder that enables the creation of an antenna representation that can subsequently be output into a plurality of formats to be used by other tools, such as electromagnetic simulation software. An alternative embodiment is directed to a method of building and maintaining a repository of antenna designs. The repository of antenna designs can be queried, enabling a plurality of users to search for specific antenna designs. Alternative embodiments can enable a user to search the repository antenna designs by visually browsing over the antenna designs in the repository. The repository of antenna designs is created by saving solutions generated by an optimizer during an optimization run to the repository. Solutions from the repository can also be used to seed and bootstrap other optimization runs.

    See patent
  • Multi-layered multi-band antenna

    Issued US US8654022 B2

  • Single-sided multi-band antenna

    Issued US US8654021 B2

  • Rules based data processing system and method

    Issued US PCT/US2013/073815

    Systems, methods and mediums are described for processing rules and associated bags of facts generated by an application in communication with a processing engine, database and rule engine that process the bags of facts in view of the rules and generate one or more rule-dependent responses to the application which performs one or more work flows based on the responses. The rule engine may apply forward-chaining, backward-chaining or a combination of forward-chaining and backward-chaining to…

    Systems, methods and mediums are described for processing rules and associated bags of facts generated by an application in communication with a processing engine, database and rule engine that process the bags of facts in view of the rules and generate one or more rule-dependent responses to the application which performs one or more work flows based on the responses. The rule engine may apply forward-chaining, backward-chaining or a combination of forward-chaining and backward-chaining to process the rules and facts. Numerous novel applications that work in conjunction with the processing engine, database and rule engine are also described.

    See patent
  • Capacitively coupled compound loop antenna

    Filed US WO2013064910 A3

  • Automated Antenna Builder

    Filed US US20120065945

Projects

  • Trusted Wireless Environment

    - Present

    The movement stems from the Trusted Wireless Environment framework that succinctly defines the technology components a Wi-Fi network needs in order to provide high performance, scalable management, and security protection from the six known Wi-Fi threat categories.

    These threats are not new and have been around since Wi-Fi went mainstream in 1999. The threats are a reality of the fundamental nature of Wi-Fi: that anyone with a Wi-Fi access point, router, or smartphone can choose whatever…

    The movement stems from the Trusted Wireless Environment framework that succinctly defines the technology components a Wi-Fi network needs in order to provide high performance, scalable management, and security protection from the six known Wi-Fi threat categories.

    These threats are not new and have been around since Wi-Fi went mainstream in 1999. The threats are a reality of the fundamental nature of Wi-Fi: that anyone with a Wi-Fi access point, router, or smartphone can choose whatever SSID network name they’d like to broadcast. This means that anyone can leverage this tactic to steal passwords, access files from various Cloud storage accounts, intercept emails, install malware that monitors the camera and microphone inside your smartphone silently, and much more.

    In 2019, we started a movement dedicated to pursuing industry cooperation in building Wi-Fi security standards to protect everyone from these six known Wi-Fi threat categories into all Wi-Fi ecosystem technologies. The Trusted Wireless Environment movement benefits all vendors, service providers, businesses and consumers of Wi-Fi and seeks to solve this massive security problem with technology so that the weakest link in security chain, us (the users), aren’t a part of the equation.

    We are dedicated to increasing the availability of secure Wi-Fi connections built on a Trusted Wireless Environment, so Wi-Fi users don’t have to worry about their data being compromised. Every signature that we collect will help us partner with organizations such as the Congressional Wi-Fi Caucus, WiFiForward, PCI Security Standards Council, Wi-FiNOW, IEEE, and Wi-Fi Alliance to name a few. These organizations help build security standards for businesses around the world and we want to join forces by collaborating with them to make this world a safer place.

    Other creators
    See project
  • Quarry - Analysis and Reporting Software for the Wireless Products Industry

    - Present

    Quarry is a software platform targeted at providing huge productivity gains and clarity in data analysis/reporting for any ecosystem participant in the wireless products industry. Often engineering teams are saving up to 90% of the time spent on creating charts/reports/summaries when adopting Quarry. Quarry automates many time consuming tasks related to wireless products from early stage R&D reports/analysis to certification/compliance testing and even into mass production. Quarry ties all…

    Quarry is a software platform targeted at providing huge productivity gains and clarity in data analysis/reporting for any ecosystem participant in the wireless products industry. Often engineering teams are saving up to 90% of the time spent on creating charts/reports/summaries when adopting Quarry. Quarry automates many time consuming tasks related to wireless products from early stage R&D reports/analysis to certification/compliance testing and even into mass production. Quarry ties all data types together into a unified space and allows for similar data types to be compared together such as simulated/measured antenna patterns with simple drag and drop user interaction.

    Other creators
    • Amy Brown
    • Adam Pullen
    • Gregory Poilasne
    See project

Organizations

  • Beta Gamma Sigma

    -

    - Present

    International Honor Society

Recommendations received

More activity by Ryan

View Ryan’s full profile

  • See who you know in common
  • Get introduced
  • Contact Ryan directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Ryan Orsi in United States

Add new skills with these courses