It is a standard service for WiSAS continuous monitoring.
Automatically detecting and blocking the presence of security threats protects important corporate data. Constantly monitoring dangerous Wi-Fi usage that directly leads to information leaks. We monitor the wireless network environment 24 hours a day, 365 days a year, from various perspectives. By automatically detecting and blocking the presence of security threats, we protect important corporate data. The reports generated automatically every month comply with PCI DSS standards. * Equipped with wireless IDS/IPS functionality. Security threats: - Unauthorized devices: Detecting connections from unauthorized (external / unclassified) devices to authorized APs. - Malicious devices: Detecting when authorized devices connect to unauthorized (external / unclassified / guest) APs. - Spoofing APs: Detecting the presence of unauthorized APs that masquerade as authorized APs with the same SSID. - MAC spoofing APs: Detecting APs that disguise themselves with the same MAC address as authorized APs. - Wi-Fi Direct APs: Detecting APs that are transmitting Wi-Fi Direct signals. - Hacking devices: Detecting the presence of hacking devices.
Inquire About This Product
basic information
Benefits of implementing WiSAS 24H365D - By installing WiSAS sensors in the target area and simply turning on the power, monitoring can be conducted. - It is a completely independent solution that does not require connection to an existing network. - It monitors the wireless network (Wi-Fi) environment of the target area 24 hours a day, 365 days a year, without human intervention. - Each incident is timestamped, allowing for use as various forms of evidence. - Alerts will be issued if any unauthorized incidents outside of management are detected. - The data collected by the sensors consists only of Wi-Fi header information, so there is no concern about information leakage. - The collected data is encrypted and sent to the WiSAS management center via NTT Docomo's LTE line. - Monitoring results for one month are automatically uploaded to a dedicated archive server every month. - Wi-Fi environments can be scanned freely at any time (optional).
Price range
Delivery Time
Applications/Examples of results
<The Ideal State of Wi-Fi Security Achievable with WiSAS> WiSAS classifies all Wi-Fi devices into three main groups: 1. Safe List (Authorized, Guest): A list of access points/devices that do not require vigilance. 2. Block List (Malicious): A list of devices that are clearly malicious and should not be allowed to operate within the target network. 3. Unverified List (External, Unclassified): A list of devices that have not been classified as safe or blocked. To ensure Wi-Fi security, it is essential to thoroughly classify unverified devices, deny communication to blocked devices, and allow communication only to safe devices, thereby creating a clean environment. In future operations, any new legitimate Wi-Fi devices necessary for business will simply be registered as safe and allowed communication. This is the "Wi-Fi Security Management Method" proposed by WiSAS. Additionally, the results of the classification can be utilized as a management database for Wi-Fi devices.
News about this product(1)
Company information
"There is no path before us; the places we walk become the path!" Globally speaking, Japan's Wi-Fi security measures are quite lagging. In the past, many security products for wired networks have emerged, but there have been no effective measures against the dangers of Wi-Fi. As a pioneer in Wi-Fi security, we have named our optimal solution 'WiSAS' (Wi-Fi Security Assurance Series). To realize a safe and comfortable Wi-Fi environment, we first offer three one-shot analysis services and two continuous monitoring services. However, that is merely a stepping stone. We have many dreams. Day by day, we strive to achieve the "de facto standard" in Wi-Fi-related solutions.