It is a standard service for WiSAS continuous monitoring.
Automatically detecting and blocking the presence of security threats protects critical data for businesses. Constant monitoring of dangerous Wi-Fi usage that directly leads to data leaks. We continuously monitor the wireless network environment 24 hours a day, 365 days a year, from various perspectives. By automatically detecting and blocking the presence of security threats (*), we protect important data for businesses. The reports generated automatically each month are compliant with PCI DSS. * Equipped with wireless IDS/IPS functionality. Security threats: - Unauthorized devices: Detect connections from unauthorized (external / unclassified*) devices to authorized APs. - Malicious devices: Detect when authorized devices connect to unauthorized (external / unclassified / guest) APs. - Spoofing APs: Detect the presence of unauthorized APs that masquerade as authorized APs with the same SSID. - MAC spoofing APs: Detect APs that disguise themselves with the same MAC address as authorized APs. - Wi-Fi Direct APs: Detect APs that are transmitting Wi-Fi Direct signals. - Hacking devices: Detect the presence of hacking devices.
Inquire About This Product
basic information
Benefits of introducing WiSAS 24H365D - By installing WiSAS sensors in the target area and simply turning them on, monitoring can be conducted. - It is a completely independent solution that does not require connection to an existing network. - It monitors the wireless network (Wi-Fi) environment of the target area 24 hours a day, 365 days a year, without human intervention. - Each incident is timestamped, allowing it to be used as evidence. - Alerts will be issued if any unauthorized incidents outside of management are detected. - The data collected by the sensors consists only of Wi-Fi header information, so there is no concern about information leakage. - The collected data is encrypted and sent to the WiSAS management center via NTT Docomo's LTE network. - Monitoring results for one month are automatically uploaded to a dedicated archive server every month. - Wi-Fi environments can be scanned freely at any time (optional).
Price range
Delivery Time
Applications/Examples of results
<The Ideal State of Wi-Fi Security Achievable with WiSAS> WiSAS categorizes all Wi-Fi devices into three main groups: 1. Safe List (Authorized, Guest): A list of devices/APs that do not require vigilance. 2. Block List (Unauthorized): A list of clearly malicious devices that should not be allowed to operate within the target network. 3. Unverified List (External, Unclassified): A list of devices that have not been classified as safe or blocked. To ensure Wi-Fi security, it is essential to thoroughly classify unverified devices, deny communication to blocked devices, and allow communication only to safe devices, thereby creating a clean environment. In future operations, any new legitimate Wi-Fi devices necessary for business will simply be registered as safe and allowed communication. This is the "Wi-Fi Security Management Method" proposed by WiSAS. Additionally, the results of this classification can be utilized as a database for managing Wi-Fi devices.
News about this product(1)
Company information
"There is no path before us; the places we walk become the path!" Globally speaking, Japan's Wi-Fi security measures are quite lagging. In the past, many security products for wired networks have emerged, but there have been no effective measures against the dangers of Wi-Fi. As a pioneer in Wi-Fi security, we named our optimal solution 'WiSAS' (Wi-Fi Security Assurance Series). To realize a safe and comfortable Wi-Fi environment, we first offer three one-shot analysis services and two constant monitoring services. However, that is merely a stepping stone. We have many dreams. We strive daily to aim for the "de facto standard" in Wi-Fi-related solutions.