We provide visualization and optimization support for comfortable use of Wi-Fi environments, as well as prevention of information leaks due to unauthorized use and cyber attacks.
By acquiring the radio waves of the wireless network (Wi-Fi) and analyzing them from six security perspectives, we visualize the vulnerabilities and issues lurking in the Wi-Fi environment, preventing threats before they occur. Additionally, it is possible to eliminate threats using location information analysis (optional). You can understand the dangers of using Wi-Fi that directly leads to information leaks. By installing WiSAS sensors in the target area and visualizing the usage of Wi-Fi, we conduct investigations and analyses from a security perspective.
Inquire About This Product
basic information
Main cases discovered in WiSAS vulnerability assessment: - Multiple detections of tethering by unmanaged (personal) smartphones in critical security areas. - Multiple detections of unmanaged (personal) portable Wi-Fi, with communication directed to personal cloud storage. - Discovery of a super-small access point connected to the internal network at a certain manufacturing company, which was found to be the cause of a leak of confidential information from surveillance camera footage. - Detection of a honey pot access point masquerading as a legitimate wireless access point, confirming that a legitimate computer was mistakenly connected. - Multiple detections of unintentionally activated Wi-Fi Direct (e.g., from printers and scanners). - Detection of Wi-Fi from an activated telephone router within the data center, confirming that it was in an easily accessible state due to the password being set to default. - Multiple detections of activated access points despite being outside of working hours. Necessary and sufficient investigation and analysis items for understanding the reality of Wi-Fi security: The WiSAS vulnerability assessment service is primarily a 24-hour one-shot service, but its investigation and analysis scope identifies vulnerabilities and security risks from the following six perspectives.
Price range
Delivery Time
Applications/Examples of results
Vulnerability Diagnosis Items ◆ Unauthorized Devices Detects unauthorized devices (external / unclassified※1) connected to authorized APs. ◆ Fraudulent Devices Detects when authorized devices connect to unauthorized APs (external / unclassified / guest). ◆ Spoofing AP Detects the presence of unauthorized APs that masquerade as authorized APs with the same SSID. ◆ MAC Spoofing AP Detects the presence of APs that disguise themselves with the same MAC address as authorized APs. ◆ Wi-Fi Direct AP Detects APs that are broadcasting Wi-Fi Direct signals. These are mainly printers, scanners, projectors, etc., and represent one method of intrusion. ◆ Hacking Devices Detects dangerous hacking devices that intercept surrounding Wi-Fi signals. ◆ Wireless DOS Attack Analysis (Optional) Detects cyber attacks that bombard authorized APs and devices with a large number of wireless frames. ◆ Location Information Analysis (Optional) Installs three or more sensors in the target area to identify the location of unauthorized APs or devices using the principle of triangulation.
News about this product(2)
Company information
"There is no path before us; the places we walk become the path!" Globally speaking, Japan's Wi-Fi security measures are quite lagging. In the past, many security products for wired networks have emerged, but there have been no effective measures against the dangers of Wi-Fi. As a pioneer in Wi-Fi security, we have named our optimal solution 'WiSAS' (Wi-Fi Security Assurance Series). To realize a safe and comfortable Wi-Fi environment, we first offer three one-shot analysis services and two continuous monitoring services. However, that is merely a stepping stone. We have many dreams. Day by day, we strive to achieve the "de facto standard" in Wi-Fi-related solutions.