It is the technology providing wireless connection for the devices to access Internet or communicate with each other.
You can manage the devices trying to connect your network by Wi-Fi technology according to organizational/institutional policies. Thus, you can adopt a significant security policy against these threats. You can inspect and control the devices trying to connect your network via Wi-Fi by certain identity authentication (Radius, Active Directory and R.T. Identity No Authentication) methods and receive a report.
You can deploy Access Point devices at certain location across your organization and create a wireless and simple communication structure. Thus, you can centrally manage all of your Access Points and implement separate security policies for each Access Point by monitoring which users have connected to which Access Point.