We provide visualization and optimization support for comfortable use of Wi-Fi environments, as well as prevention of information leaks due to unauthorized use and cyber attacks.
By scanning and visualizing the radio waves of the wireless network (Wi-Fi) in the monitored area, it is possible to accurately understand the radio wave conditions and utilize this information for proper Wi-Fi operation management. It also provides a list of access points (APs), a list of devices, and specifies the APs to which the devices are connected. Simple investigation of the Wi-Fi environment: - By simply turning on the sensor, the Wi-Fi network usage can be visualized instantly. - Wireless APs (including stealth) and device MAC addresses, as well as signal strength (dBm). - The wireless protocols, radio channels, and authentication/encryption methods used by the wireless APs. - Information about the AP/SSID to which the devices are connected. Features of WiSAS environment scanning: - It visualizes the Wi-Fi usage in the target area in a snapshot manner. - Even with a simple investigation, various information is included about the APs and devices present in the target area, as well as which devices are connected to which APs. - By understanding the Wi-Fi usage in detail, it can be used for formulating policies and operational management regarding Wi-Fi security.
Inquire About This Product
basic information
Features of WiSAS Environment Scan - It visualizes the Wi-Fi usage in the target area in a snapshot manner. - It includes various information from a simple survey, such as the access points (APs) and devices present in the target area, as well as which devices are connected to which APs. - By understanding the Wi-Fi usage in detail, it can be used for formulating policies and managing operations related to Wi-Fi security.
Price range
Delivery Time
Applications/Examples of results
Acquisition Items List of Access Points in the Target Area - Wireless AP (including stealth) and device MAC addresses, as well as signal strength (dBm) - Wireless protocol, radio channel, authentication/encryption method used by the wireless AP List of Devices in the Target Area - AP/SSID information that the device is connected to, as well as signal strength (dBm)
News about this product(2)
Company information
"There is no path before us; the places we walk become the path!" Globally speaking, Japan's Wi-Fi security measures are quite lagging. In the past, many security products for wired networks have emerged, but there have been no effective measures against the dangers of Wi-Fi. As a pioneer in Wi-Fi security, we have named our optimal solution 'WiSAS' (Wi-Fi Security Assurance Series). To realize a safe and comfortable Wi-Fi environment, we first offer three one-shot analysis services and two continuous monitoring services. However, that is merely a stepping stone. We have many dreams. Day by day, we strive to achieve the "de facto standard" in Wi-Fi-related solutions.