It is a service that particularly focuses on "rogue" Wi-Fi among the WiSAS constant monitoring solutions.
The wireless network (Wi-Fi) environment automatically detects security threats based on two factors: signal strength and duration of stay, 24 hours a day, 365 days a year, protecting critical corporate data. It is also possible to automatically block threats based on settings. An alert will be issued if an unauthorized access point (AP) outside of management is discovered. Constant monitoring of unauthorized Wi-Fi usage that directly leads to data leaks: - Permanently installed APs: A list of unverified wireless APs that are permanently installed and detection of connected devices. - Temporarily used APs: A list of unverified wireless APs that have been temporarily used, usage history, and detection of connected devices.
Inquire About This Product
basic information
<Reasons to Introduce WiSAS NORA> According to the annual ranking of the "Top 10 Information Security Threats" published by the IPA (Information-technology Promotion Agency, Japan), information leaks due to internal misconduct ranked 8th in 2018, 5th in 2019, and significantly rose to 2nd place in 2020. Previously, information leaks primarily occurred through external memory devices, printed materials, or wired networks, but recently, due to the increase in layoffs during the COVID-19 pandemic, there has been a dramatic rise in information leaks utilizing unauthorized personal smartphones for tethering and portable Wi-Fi devices, collectively referred to as "rogue APs." WiSAS NORA continuously monitors these dangerous "rogue APs" 24/7, 365 days a year.
Price range
Delivery Time
Applications/Examples of results
<The Ideal State of Wi-Fi Security Achievable with WiSAS> WiSAS categorizes all Wi-Fi devices into three main groups: 1. Safe List (Authorized, Guest): A list of devices (APs/devices) that do not require vigilance. 2. Block List (Malicious): A list of clearly malicious devices that should not operate within the target network. 3. Unverified List (External, Unclassified): A list of devices that have not been classified as safe or blocked. To ensure Wi-Fi security, it is essential to thoroughly classify unverified devices, deny communication to blocked devices, and allow communication only to safe devices, thereby creating a clean environment. In future operations, any new legitimate Wi-Fi devices necessary for business will simply be registered as safe and permitted communication. This is the "Wi-Fi Security Management Method" proposed by WiSAS. Additionally, the results of the classification can be utilized as a management database for Wi-Fi devices.
News about this product(1)
Company information
"There is no path before us; the places we walk become the path!" Globally speaking, Japan's Wi-Fi security measures are quite lagging. In the past, many security products for wired networks have emerged, but there have been no effective measures against the dangers of Wi-Fi. As a pioneer in Wi-Fi security, we named our optimal solution 'WiSAS' (Wi-Fi Security Assurance Series). To realize a safe and comfortable Wi-Fi environment, we first offer three one-shot analysis services and two constant monitoring services. However, that is merely a stepping stone. We have many dreams. We strive daily to aim for the "de facto standard" in Wi-Fi-related solutions.