Security monitoring services - List of Manufacturers, Suppliers, Companies and Products

Security monitoring services Product List

1~2 item / All 2 items

Displayed results

WiSAS NORA

It is a service that particularly focuses on "rogue" Wi-Fi among the WiSAS constant monitoring solutions.

The wireless network (Wi-Fi) environment automatically detects security threats based on two factors: signal strength and duration of stay, 24 hours a day, 365 days a year, protecting critical corporate data. It is also possible to automatically block threats based on settings. An alert will be issued if an unauthorized access point (AP) outside of management is discovered. Constant monitoring of unauthorized Wi-Fi usage that directly leads to data leaks: - Permanently installed APs: A list of unverified wireless APs that are permanently installed and detection of connected devices. - Temporarily used APs: A list of unverified wireless APs that have been temporarily used, usage history, and detection of connected devices.

  • Other security systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

WiSAS 24H365D

It is a standard service for WiSAS continuous monitoring.

Automatically detecting and blocking the presence of security threats protects critical data for businesses. Constant monitoring of dangerous Wi-Fi usage that directly leads to data leaks. We continuously monitor the wireless network environment 24 hours a day, 365 days a year, from various perspectives. By automatically detecting and blocking the presence of security threats (*), we protect important data for businesses. The reports generated automatically each month are compliant with PCI DSS. * Equipped with wireless IDS/IPS functionality. Security threats: - Unauthorized devices: Detect connections from unauthorized (external / unclassified*) devices to authorized APs. - Malicious devices: Detect when authorized devices connect to unauthorized (external / unclassified / guest) APs. - Spoofing APs: Detect the presence of unauthorized APs that masquerade as authorized APs with the same SSID. - MAC spoofing APs: Detect APs that disguise themselves with the same MAC address as authorized APs. - Wi-Fi Direct APs: Detect APs that are transmitting Wi-Fi Direct signals. - Hacking devices: Detect the presence of hacking devices.

  • Other security systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration