1~5 item / All 5 items
Displayed results
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationContact this company
Contact Us Online1~5 item / All 5 items
The wireless network (Wi-Fi) environment automatically detects security threats 24 hours a day, 365 days a year, based on two factors: signal strength and duration of stay, protecting critical corporate data. It is also possible to automatically block threats based on settings. An alert will be issued if an unauthorized access point (AP) outside of management is discovered. Constant monitoring of unauthorized Wi-Fi usage that directly leads to information leaks: - Permanently installed APs: A list of unverified wireless APs that are permanently installed and detection of connected devices. - Temporarily used APs: A list of unverified wireless APs that have been used temporarily, usage history, and detection of connected devices.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationAutomatically detecting and blocking the presence of security threats protects important corporate data. Constantly monitoring dangerous Wi-Fi usage that directly leads to information leaks. We monitor the wireless network environment 24 hours a day, 365 days a year, from various perspectives. By automatically detecting and blocking the presence of security threats, we protect important corporate data. The reports generated automatically every month comply with PCI DSS standards. * Equipped with wireless IDS/IPS functionality. Security threats: - Unauthorized devices: Detecting connections from unauthorized (external / unclassified) devices to authorized APs. - Malicious devices: Detecting when authorized devices connect to unauthorized (external / unclassified / guest) APs. - Spoofing APs: Detecting the presence of unauthorized APs that masquerade as authorized APs with the same SSID. - MAC spoofing APs: Detecting APs that disguise themselves with the same MAC address as authorized APs. - Wi-Fi Direct APs: Detecting APs that are transmitting Wi-Fi Direct signals. - Hacking devices: Detecting the presence of hacking devices.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationSince it covers all monitoring items in various Wi-Fi environments, the content is deep and diverse. This is a premium service that adds even more monitoring items (12 items) based on WiSAS 24H365D. It comprehensively covers the details of the security requirements set by the credit card industry, PCI DSS, making the content extensive and varied. There is no phrase "this is enough" when it comes to security. Preparedness eliminates worries. The monthly reports can be used for various audits, starting with PCI DSS QSA.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationBy acquiring the radio waves of the wireless network (Wi-Fi) and analyzing them from six security perspectives, we visualize the vulnerabilities and issues lurking in the Wi-Fi environment, preventing threats before they occur. Additionally, it is possible to eliminate threats using location information analysis (optional). You can understand the dangers of using Wi-Fi that directly leads to information leaks. By installing WiSAS sensors in the target area and visualizing the usage of Wi-Fi, we conduct investigations and analyses from a security perspective.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationBy scanning and visualizing the radio waves of the wireless network (Wi-Fi) in the monitored area, it is possible to accurately understand the radio wave conditions and utilize this information for proper Wi-Fi operation management. It also provides a list of access points (APs), a list of devices, and specifies the APs to which the devices are connected. Simple investigation of the Wi-Fi environment: - By simply turning on the sensor, the Wi-Fi network usage can be visualized instantly. - Wireless APs (including stealth) and device MAC addresses, as well as signal strength (dBm). - The wireless protocols, radio channels, and authentication/encryption methods used by the wireless APs. - Information about the AP/SSID to which the devices are connected. Features of WiSAS environment scanning: - It visualizes the Wi-Fi usage in the target area in a snapshot manner. - Even with a simple investigation, various information is included about the APs and devices present in the target area, as well as which devices are connected to which APs. - By understanding the Wi-Fi usage in detail, it can be used for formulating policies and operational management regarding Wi-Fi security.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration