We provide visualization and optimization support for comfortable use of Wi-Fi environments, as well as prevention of information leaks due to unauthorized use and cyber attacks.
By scanning and visualizing the radio waves of the wireless network (Wi-Fi) in the monitored area, it is possible to accurately understand the radio wave conditions and utilize this information for proper Wi-Fi operation management. It also provides a list of access points (APs), a list of devices, and specifies the APs to which the devices are connected. Simple investigation of the Wi-Fi environment: - By simply turning on the sensor, the Wi-Fi network usage can be visualized instantly. - Wireless APs (including stealth) and device MAC addresses, as well as signal strength (dBm). - The wireless protocols, radio channels, and authentication/encryption methods used by the wireless APs. - Information about the AP/SSID to which the devices are connected. Features of WiSAS environment scanning: - It visualizes the Wi-Fi usage in the target area in a snapshot manner. - Even with a simple investigation, various information is included about the APs and devices present in the target area, as well as which devices are connected to which APs. - By understanding the Wi-Fi usage in detail, it can be used for formulating policies and operational management regarding Wi-Fi security.
Inquire About This Product
basic information
Features of WiSAS Environment Scan - It visualizes the Wi-Fi usage in the target area in a snapshot manner. - It includes various information from a simple survey, such as the access points (APs) and devices present in the target area, as well as which devices are connected to which APs. - By understanding the Wi-Fi usage in detail, it can be used for formulating policies and managing operations related to Wi-Fi security.
Price range
Delivery Time
Applications/Examples of results
Acquisition Items List of Access Points in the Target Area - Wireless AP (including stealth) and device MAC addresses, as well as signal strength (dBm) - Wireless protocol, radio channel, authentication/encryption method used by the wireless AP List of Devices in the Target Area - AP/SSID information that the device is connected to, as well as signal strength (dBm)
News about this product(2)
Company information
"There is no path before us; the places we walk become the path!" Globally speaking, Japan's Wi-Fi security measures are quite lagging. In the past, many security products for wired networks have emerged, but there have been no effective measures against the dangers of Wi-Fi. As a pioneer in Wi-Fi security, we have named our optimal solution 'WiSAS' (Wi-Fi Security Assurance Series). To realize a safe and comfortable Wi-Fi environment, we first offer three one-shot analysis services and two continuous monitoring services. However, that is merely a stepping stone. We have many dreams. Day by day, we strive to achieve the "de facto standard" in Wi-Fi-related solutions.



![[Nationwide business trip support available] Contracted 3D measurement and 3D scanning](https://image.mono.ipros.com/public/product/image/892/2000664314/IPROS74007609256617611994.png?w=280&h=280)


![Structurescan 'SIR-EZLT' [Rental]](https://image.mono.ipros.com/public/product/image/3cf/2000453330/IPROS92388261914810050777.jpeg?w=280&h=280)

![Multi-layered defense against ransomware measures [Tack SecurePlatform]](https://image.mono.ipros.com/public/default/object/noimage_l.gif?w=280&h=280)

