1~5 item / All 5 items
Displayed results
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationContact this company
Contact Us Online1~5 item / All 5 items
The wireless network (Wi-Fi) environment automatically detects security threats based on two factors: signal strength and duration of stay, 24 hours a day, 365 days a year, protecting critical corporate data. It is also possible to automatically block threats based on settings. An alert will be issued if an unauthorized access point (AP) outside of management is discovered. Constant monitoring of unauthorized Wi-Fi usage that directly leads to data leaks: - Permanently installed APs: A list of unverified wireless APs that are permanently installed and detection of connected devices. - Temporarily used APs: A list of unverified wireless APs that have been temporarily used, usage history, and detection of connected devices.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationAutomatically detecting and blocking the presence of security threats protects critical data for businesses. Constant monitoring of dangerous Wi-Fi usage that directly leads to data leaks. We continuously monitor the wireless network environment 24 hours a day, 365 days a year, from various perspectives. By automatically detecting and blocking the presence of security threats (*), we protect important data for businesses. The reports generated automatically each month are compliant with PCI DSS. * Equipped with wireless IDS/IPS functionality. Security threats: - Unauthorized devices: Detect connections from unauthorized (external / unclassified*) devices to authorized APs. - Malicious devices: Detect when authorized devices connect to unauthorized (external / unclassified / guest) APs. - Spoofing APs: Detect the presence of unauthorized APs that masquerade as authorized APs with the same SSID. - MAC spoofing APs: Detect APs that disguise themselves with the same MAC address as authorized APs. - Wi-Fi Direct APs: Detect APs that are transmitting Wi-Fi Direct signals. - Hacking devices: Detect the presence of hacking devices.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationIt covers all monitoring items in various Wi-Fi environments, so the content is deep and diverse. This is a premium service that adds more monitoring items (12 items) based on WiSAS 24H365D. It encompasses all the details of the security requirements set by the credit card industry, PCI DSS, so the content is deep and diverse. There is no phrase "this is enough" when it comes to security. Preparedness eliminates worries. The monthly reports can be used for various audits, starting with PCI DSS QSA.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationBy acquiring the radio waves of the wireless network (Wi-Fi) and analyzing them from six security perspectives, we visualize the vulnerabilities and issues lurking in the Wi-Fi environment, preventing threats before they occur. Additionally, it is also possible to eliminate threats using location information analysis (optional). You can understand the dangerous use of Wi-Fi that directly leads to information leakage. By installing WiSAS sensors in the target area and visualizing the Wi-Fi usage, we conduct investigations and analyses from a security standpoint.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationBy scanning and visualizing the radio waves of the wireless network (Wi-Fi) in the monitored area, it is possible to accurately understand the radio wave conditions and utilize them for proper operation management of Wi-Fi. It also clearly indicates the list of access points (APs), the list of devices, and the APs to which the devices are connected. Simple investigation of the Wi-Fi environment - By simply turning on the sensor, the Wi-Fi network usage can be visualized instantly. - Wireless APs (including stealth) and device MAC addresses, as well as signal strength (dBm). - The wireless protocols, radio channels, and authentication/encryption methods used by the wireless APs. - Information on the AP/SSID that the devices are connected to. Features of WiSAS environment scanning - It visualizes the Wi-Fi usage in the target area in a snapshot manner. - Even with a simple investigation, various information is included about the APs and devices present in the target area, as well as which devices are connected to which APs. - By understanding the Wi-Fi usage in detail, it can be used for formulating policies and operational management related to Wi-Fi security.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration