It is a service that particularly focuses on "rogue" Wi-Fi among the WiSAS constant monitoring solutions.
The wireless network (Wi-Fi) environment automatically detects security threats 24 hours a day, 365 days a year, based on two factors: signal strength and duration of stay, protecting critical corporate data. It is also possible to automatically block threats based on settings. An alert will be issued if an unauthorized access point (AP) outside of management is discovered. Constant monitoring of unauthorized Wi-Fi usage that directly leads to information leaks: - Permanently installed APs: A list of unverified wireless APs that are permanently installed and detection of connected devices. - Temporarily used APs: A list of unverified wireless APs that have been used temporarily, usage history, and detection of connected devices.
Inquire About This Product
basic information
<Reasons to Introduce WiSAS NORA> According to the annual ranking of the "Top 10 Information Security Threats" published by IPA (Information-technology Promotion Agency, Japan), information leaks due to internal misconduct ranked 8th in 2018, 5th in 2019, and significantly rose to 2nd place in 2020. Previously, information leaks primarily occurred through external memory devices, printed materials, or wired networks. However, recently, due to an increase in layoffs related to COVID-19, there has been a sharp rise in information leaks utilizing unauthorized personal smartphones for tethering and personal pocket Wi-Fi, collectively referred to as "rogue APs." WiSAS NORA continuously monitors these dangerous "rogue APs" 24/7, 365 days a year.
Price range
Delivery Time
Applications/Examples of results
<The Ideal State of Wi-Fi Security Achievable with WiSAS> WiSAS categorizes all Wi-Fi devices into three main groups: 1. Safe List (Authorized, Guest): A list of access points/devices that do not require vigilance. 2. Block List (Malicious): A list of devices that are clearly malicious and should not be allowed to operate within the target network. 3. Unverified List (External, Unclassified): A list of devices that have not been classified as safe or blocked. To ensure Wi-Fi security, it is essential to thoroughly classify unverified devices, deny communication to blocked devices, and allow communication only to safe devices, thereby creating a clean environment. In future operations, any new legitimate Wi-Fi devices necessary for business will simply be registered as safe and allowed communication. This is the "Wi-Fi Security Management Method" proposed by WiSAS. Additionally, the results of the classification can be utilized as a management database for Wi-Fi devices.
News about this product(1)
Company information
"There is no path before us; the places we walk become the path!" Globally speaking, Japan's Wi-Fi security measures are quite lagging. In the past, many security products for wired networks have emerged, but there have been no effective measures against the dangers of Wi-Fi. As a pioneer in Wi-Fi security, we have named our optimal solution 'WiSAS' (Wi-Fi Security Assurance Series). To realize a safe and comfortable Wi-Fi environment, we first offer three one-shot analysis services and two continuous monitoring services. However, that is merely a stepping stone. We have many dreams. Day by day, we strive to achieve the "de facto standard" in Wi-Fi-related solutions.