Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

AirTight WIPS

2025-03-28 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

AIRTIGHT WIPS

The infrastructure of wireless local area network (WLAN) is one of the most important and direct threats in current enterprise networks. To make matters worse, Wi-Fi demand for personal smartphones and tablets is flooding businesses, inadvertently violating network security boundaries and putting organizations that do not deploy wireless at risk. AirTight WIPS provides enterprises with continuous and comprehensive protection against current and emerging wireless threats.

Gartner rated as "Strong Positive"

AirTight has always been rated as the best wireless defense system (WIPS) in the industry. In Gartner's annual wireless LAN IPS market evaluation report, AirTight has won the highest rating "special recognition" for many years, and AirTight is the only supplier at the top of Gartner wireless IPS evaluation. Ease of use, automatic device classification, accurate threat detection, and reliable threat defense put AirTight's WIPS/WIDS solution ahead of its competitors. Relying on extraordinary patented wireless detection and protection technology, AirTight WIPS provides complete protection visible throughout the day for the enterprise's wireless environment.

Automatic equipment classification

Using AirTight's label grouping technology patent, WIPS can automatically and quickly classify wireless devices in Wi-Fi environment into three categories: Authorized, Rogue and External. As a result, he can eliminate false positives and eliminate the need for security administrators to use complex rules to identify rogue wireless devices or manual detection. This is different from the error-prone device classification techniques of most WLAN solutions, which rely on slow and uncertain CAM table lookups associated with MAC addresses, signatures, or passive wired network sniffing techniques.

Integrated wireless threat detection

AirTight WIPS provides the most comprehensive protection for all types of wireless threats, including Rogue APs, Soft APs, Honeypots, Wi-Fi DoS, Ad-hoc Networks, Client misassociations, and Mobile hotspots. Security administrators do not need to develop complex CAPTCHA codes to detect threats, and AirTight WIPS protects existing and unknown networks with its unique technology.

Automatic threat defense

Most wireless detection / defense systems often incorrectly disrupt their own or neighboring Wi-Fi networks, while AirTight can truly and correctly distinguish whether threats come from neighboring wireless Wi-Fi devices, effectively enabling AirTight users to guard against and block any threats that abuse Wi-Fi or violate corporate security policies. AirTight can intelligently identify various types of wireless network threats and block multiple security threats simultaneously in multiple channels in the 2.4 GHz and 5 GHz bands.

Accurate location and tracking

With the import of flat structure diagrams containing physical address information, AirTight can provide real-time or past query location information to help security administrators quickly track fragile or threatening devices and take action to eliminate security risks. Main features:

Relying on AirTight patented technology: probabilistic RF fingerprint recognition technology (probabilistic RF fingerprinting), the positioning accuracy can be improved to the foot level.

The WIPS sensor has self-calibration function and does not need to be adjusted manually.

By comprehensively calculating the influence of RF obstacles, antenna direction, equipment transmission power and other factors on the instantaneous signal change, the positioning information can be processed stably.

Secure BYOD policy enforcement

AirTight WIPS can automatically analyze the types of smartphones and tablets that try to access the corporate network (Android, BlackBerry, iPhone, iPad, Windows Mobile, etc.) and classify access and denial according to policy. At the same time, it can be easily integrated with almost all mobile device management (MDM) through the API provided by AirTight. Main features:

Automatically analyze the types of smartphones and tablets.

Prevent unauthorized personal device access.

Detect and block moving WiFi hotspots.

Centralized management system based on "location awareness".

AirTight's region-based policy management architecture can greatly simplify regional management and easily expand from dozens to tens of thousands of wireless users; through this architecture, enterprises can define a role-based management mechanism, and each administrator can only manage their own areas and functions, thus avoiding the occurrence of "out of bounds" and improper management. Other related functions, such as inherited and customized policies, dashboards, lists of devices and alerts, statistics and reporting, etc. Main features:

Unified management console.

Policy customization and inheritance based on region classification.

Role-based management.

Intelligent forensics

AirTight's intelligent forensics function is easy to use and can easily audit a variety of wireless events, so that security administrators can make decisions faster and better. Main features:

Parameters such as forensics time can be configured.

Events, devices, duration and other conditions can be filtered or sorted.

Provide real-time and historical location tracking.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report