We provide visualization and optimization support for comfortable use of Wi-Fi environments, as well as prevention of information leaks due to unauthorized use and cyber attacks.
By acquiring the radio waves of the wireless network (Wi-Fi) and analyzing them from six security perspectives, we visualize the vulnerabilities and issues lurking in the Wi-Fi environment, preventing threats before they occur. Additionally, it is also possible to eliminate threats using location information analysis (optional). You can understand the dangerous use of Wi-Fi that directly leads to information leakage. By installing WiSAS sensors in the target area and visualizing the Wi-Fi usage, we conduct investigations and analyses from a security standpoint.
Inquire About This Product
basic information
Main cases discovered in the WiSAS vulnerability assessment: - Multiple instances of tethering detected using unmanaged (personal) smartphones in critical security areas. - Multiple instances of unmanaged (personal) portable Wi-Fi detected, with communication directed to personal cloud storage. - Discovery of a super-mini access point connected to the internal network at a certain manufacturing company, which was found to be the cause of a leak of confidential information based on surveillance camera footage. - Detection of a honey pot access point masquerading as a legitimate wireless access point, confirming that a legitimate computer was mistakenly connected. - Multiple instances of unintentionally activated Wi-Fi Direct detected (e.g., printers, scanners). - Detection of Wi-Fi from an activated telephone router within the data center, confirming that it was in an easily accessible state due to the password being set to default. - Multiple activated access points detected despite being outside of working hours. Necessary and sufficient investigation and analysis items for understanding the reality of Wi-Fi security: The WiSAS vulnerability assessment service is primarily a 24-hour one-shot service, but its investigation and analysis scope identifies vulnerabilities and security risks from the following six perspectives.
Price range
Delivery Time
Applications/Examples of results
Vulnerability Diagnosis Items ◆ Unauthorized Devices Detects unauthorized devices (external / unclassified※1) connected to authorized APs. ◆ Fraudulent Devices Detects when authorized devices connect to unauthorized APs (external / unclassified / guest). ◆ Spoofing AP Detects the presence of fraudulent APs that masquerade as authorized APs with the same SSID. ◆ MAC Spoofing AP Detects the presence of APs that disguise themselves with the same MAC address as authorized APs. ◆ Wi-Fi Direct AP Detects APs that are broadcasting Wi-Fi Direct signals. These are mainly printers, scanners, projectors, etc., and represent one method of intrusion. ◆ Hacking Devices Detects dangerous hacking devices that intercept surrounding Wi-Fi signals. ◆ Wireless DOS Attack Analysis (Optional) Detects cyber attacks that send a large number of wireless frames to authorized APs and devices. ◆ Location Information Analysis (Optional) Installs three or more sensors in the target area to pinpoint the location of unauthorized APs or devices using the principle of triangulation.
News about this product(2)
Company information
"There is no path before us; the places we walk become the path!" Globally speaking, Japan's Wi-Fi security measures are quite lagging. In the past, many security products for wired networks have emerged, but there have been no effective measures against the dangers of Wi-Fi. As a pioneer in Wi-Fi security, we named our optimal solution 'WiSAS' (Wi-Fi Security Assurance Series). To realize a safe and comfortable Wi-Fi environment, we first offer three one-shot analysis services and two constant monitoring services. However, that is merely a stepping stone. We have many dreams. We strive daily to aim for the "de facto standard" in Wi-Fi-related solutions.