SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
Anywhere, Anytime Wireless Protection
Anywhere, Anytime Wireless Protection
EXECUTIVE SUMMARY
AirDefense Enterprise™ is the most powerful Wireless Intrusion Prevention System (IPS) available. Having pioneered the field of
wireless IPS, AirDefense continues to lead in innovation with 27 patents pending or granted. The AirDefense Enterprise solution provides
complete protection against wireless threats, policy compliance monitoring, robust performance monitoring and troubleshooting, and
location tracking in an appliance that can scale to meet the largest global organizations’ needs. AirDefense uses collaborative intelligence
with secure sensors that work in tandem with a hardened purpose-built server appliance to monitor all 802.11 (a/b/g) wireless traffic in real
time for the highest level of security, rogue mitigation and policy enforcement.



COMPREHENSIVE INTRUSION DETECTION
AirDefense Enterprise provides the most comprehensive detection of wireless
intrusion attempts. By analyzing existing and day-zero threats in real-time
against historical data, AirDefense Enterprise is able to accurately detect
all wireless attacks and anomalous behavior. With context-aware detection,
correlation and multi-dimensional detection engines, AirDefense detects only
meaningful security events and maintains the lowest rate of false positive
alarms. This next-generation wireless protection platform offers the industry’s
most extensive event library, with more than 200 security and performance
events.

Wireless vulnerabilities detected include reconnaissance (ad hoc stations,
rogue APs, open/misconfigured APs), sniffing (dictionary attacks, leaky APs,
WEP/WPA/LEAP cracking), masquerade (MAC spoofing, evil twin attacks/Wi-
Phishing attacks), insertion (man-in-the-middle attack, multicast/broadcast
injection) and denial-of-service attacks (disassociation, duration field spoofing,
RF jamming).

AirDefense allows administrators to easily distribute and process alarms in enterprise deployments:
• 	 Customized alarm views, notifications and priorities
• 	 Flexible querying and filtering
• 	 Third-party integration


AUTOMATED PROTECTION
AirDefense responds automatically to wireless threats by stopping the device
involved before it is able to cause damage to the network. By responding on
both the wireless and wired networks, AirDefense is the industry’s most secure
wireless intrusion prevention solution. AirDefense performs targeted terminations
ensuring that only the correct intruders and rogue devices are disconnected.
The system maintains a record of termination actions to allow for a reliable
audit trail. AirDefense also complies with FCC regulations and eliminates the
liability that could be associated with stopping a device wirelessly.

AirTermination™
AirDefense can mitigate wireless threats via the air by disabling wireless
connections between intruders and authorized devices. AirTermination is
extremely precise ensuring that only the offending device is prohibited from
operating.

Wired-side Termination
AirDefense identifies the switch port to which offending devices are connected and turns it off thus preventing the rogue device from
accessing the network.
ELIMINATE ROGUES CONNECTED TO THE NETWORK
Rogue devices are a serious threat to enterprise security. A single rogue
access point can allow an attacker to gain full access to the internal network.
AirDefense can identify any rogue device and disable it automatically. AirDefense
Enterprise identifies rogue devices and determines if they are connected to
the internal network. By analyzing wireless traffic, AirDefense can determine
the level of threat that a potential rogue poses to the organization. This allows
administrators to ignore neighboring devices and focus only on the rogues that
present a serious threat.

This advanced analysis also ensures that neighboring wireless devices are not
misclassified as a rogue. Accuracy is essential as less sophisticated Wireless
IPS systems can easily disable a neighboring access point by mistake opening
the organization to unwanted liability.



        Least Risk                                            DEVICE THREAT LEVEL                         Highest Risk


Neighboring AP                 Connected to                   Unauthorized AP           Connected Station                Rogue on
                              Neighboring AP                    in Building             Transferring Data               the Network



COMPLY WITH ENTERPRISE & REGULATORY POLICIES
AirDefense Enterprise allows administrators to define, monitor and enforce wireless LAN policies in the areas of security, performance,
usage and vendor types. Organizations can minimize vulnerability by ensuring that wireless devices are using the proper security
protocols. Mis-configuration is one of the most common causes for wireless security breaches. When a device is found to be non-
compliant, AirDefense notifies the administrator of the exact discrepancy.

AirDefense includes a variety of regulatory compliance reports for retail establishments, healthcare organizations, financial service
providers and government agencies. There are specific compliance reports for the Payment Card Industry (PCI) Standard, Sarbanes-
Oxley (SOX), HIPAA, GLBA, and the Department of Defense 8100.2 Directive. AirDefense administrators can simply print the applicable
report to demonstrate the wireless network’s compliance.



INVESTIGATE INCIDENTS WITH FORENSIC DATA
AirDefense Enterprise provides forensic data that allows administrators to
retrace any one device’s steps down to the minute. With forensic research,
investigating an event takes minutes instead of potentially hours. Cases that
normally would have required administrators to physically visit sites can now
be investigated remotely.

Administrators can rewind and review minute-by-minute records of connectivity
and communication with the network. By storing more than 325 data points
per wireless device, per connection, per minute, AirDefense Enterprise allows
organizations to view months of historical data on a wireless device that was
recently discovered to be suspicious. AirDefense stores important information
such as channel activity, signal characteristics, device activity and traffic flow.
AirDefense can display time of attack/breach, entry point used, length of
exposure, transfers of data and systems compromised.
TROUBLESHOOT NETWORK PERFORMANCE                                                LOCATION TRACKING
With a real-time view of all WLAN traffic, AirDefense enables network           AirDefense Enterprise includes powerful location track-
administrators to remotely troubleshoot problems, identify and respond          ing technology that allows administrators to minimize the
to network mis-configurations, and monitor the network’s availability.          amount of time required to find a device when visiting a
AirDefense analyzes traffic flow to interpret WLAN performance and              site. After importing images of a floor plan and specifying
identify usage characteristics, interference from neighboring WLANs,            the characteristics of the building, AirDefense is able to
channel overlap, and performance degradation.                                   consistently locate devices within four cubicles.

AirDefense can help measure network usage & performance by
determining over-utilized APs & channels, pinpointing network
congestion, finding bandwidth hogs & analyzing utilization &
congestion trends.

Administrators can drill down into a live, streaming view of devices,
BSSIDs, and channels to review:
• 	Remote frame captures
• 	Authentication errors
• 	AP configuration issues
• 	Network interference                                                   AIRDEFENSE
                                                                            SENSOR




                                                                                               NETWORK
                    AIRDEFENSE DEPLOYMENT




                                                                                           AIRDEFENSE SERVER




     MOBILE WORKFORCE PROTECTION
     AirDefense Personal, an add-on for AirDefense Enterprise, protects end-user laptops when they travel away from the protection of
     AirDefense sensors. AirDefense Personal is a software agent that enforces wireless policy for remote users. It quietly monitors for
     malicious or accidental wireless activities and misconfigurations that may cause security exposures or policy violations. AirDefense
     Personal provides uninterrupted protection for all mobile employees and their enterprise wireless assets - at work, home, airports
     or other hotspots. Threats detected include risky configuration, insecure communication, suspicious WLAN settings and risky
     WLAN connectivity.

     It integrates with AirDefense Enterprise for:
     • 	Centralized policy definitions and analysis
     • 	Combined alarm management & reporting
     • 	Automated enforcement
     •	 Comprehensive reporting
INNOVATIVE ADD-ON MODULES
WEP Cloaking                                                          Spectrum Analysis
WEP Cloaking provides protection                                      With Spectrum Analysis, administrators
for wireless infrastructure secured by                                can identify and classify possible
WEP encryption. It helps meet PCI                                     sources of non-802.11 interference.
requirements by supplementing WEP                                     Interference types detected include
encryption and provides protection for                                microwaves, cordless phones, wireless
WEP networks that would otherwise                                     cameras and Bluetooth. Administrators
be extremely vulnerable. It leads to                                  can troubleshoot the physical layer
tremendous cost savings by enabling a more orderly process of         of the WLAN in real-time at remote locations without requiring
migrating away from the WEP protocol.                                 specialized hardware.

Sensor-less Rogue Detection                                           Centralized Management Console
Sensor-less Rogue Detection allows the administrators to detect       The Centralized Management Console (CMC) manages settings
and eliminate rogue wireless devices without deploying wireless       of multiple appliances from one console. Using the CMC,
sensors. It is the most cost-effective and easily deployed solution   administrators can manage deployments with tens of thousands
to identify rogue wireless devices on a large scale and allows for    of sensors from one central console. Settings across multiple
prioritization of sites in need of additional wireless protection.    appliances can be synchronized to ensure a consistent deployment.

Advanced Forensics                                                    LiveRF
The Advanced Forensics module                                         The AirDefense LiveRF module,
provides administrators with the ability                              powered by Motorola technology,
to rewind and review detailed records                                 provides the industry’s only real-
of wireless activity that can assist in                               time assessment of wireless network
forensic investigations or wireless                                   performance.     Administrators    can
network troubleshooting. It also allows                               troubleshoot wireless connectivity,
trend analysis for network performance                                view throughput, capacity, coverage
and capacity planning. By storing and managing 325 data points        holes and interference issues from a central console. With LiveRF,
every minute for each wireless device, Advanced Forensics is          administrators can visualize the performance of differing wireless
the ultimate resource for tracking threats and understanding the      applications from simple web browsing to live video without having
performance trends of the wireless network.                           to go out to remote locations.




    ENTERPRISE CLASS SCALABILITY WITH LOWEST TCO
    Scalable
    AirDefense Enterprise’s distributed architecture supports sensors in hundreds of locations reporting back to a centralized
    appliance.
    The high-end appliance supports up to 150,000 devices per appliance with over 35,000 devices concurrently active.

    Centrally-managed
    Using a single interface for policy enforcement, system/sensor updates & system management, AirDefense Enterprise is easy to use
    with dashboards and wizards that provide role-based views. Multiple appliances can be managed using the Centralized Management
    Console.

    Easily deployed & reliable
    AirDefense Enterprise is an appliance based solution and uses zero-configuration sensors requiring minimal effort to deploy. For
    redundancy, a secondary appliance can be deployed.

    Low bandwidth requirements
    Patent-pending optimization algorithms to minimize the amount of wired bandwidth to less than 3 Kbps per sensor, while continuing
    to maintain full, centralized correlation and complete security.
ABOUT AIRDEFENSE
AirDefense is the market leader in anywhere, anytime wireless security. The company is trusted by more Fortune 500 companies,
healthcare organizations and high-security government agencies for enterprise wireless protection than any other company. AirDefense
products provide the most advanced solutions for rogue wireless detection, policy enforcement and intrusion prevention, both inside and
outside an organization’s physical locations and wired networks.

As a key layer of security, AirDefense Enterprise complements wireless VPNs, encryption & authentication. AirDefense Enterprise detects
& responds to wireless threats and unauthorized devices on the wireless network using distributed smart sensors (monitoring 802.11
a/b/g) and a secure server appliance. With Common Criteria certification and FIPS compliant cryptography, AirDefense’s enterprise-class
products scale to support single offices as well as organizations with hundreds of locations around the globe.




                   MARKET                                      TECHNOLOGY                                     RECOGNIZED
                   LEADER                                        LEADER                                         LEADER
         • 	700+ Customers including                      •	 Pioneer of wireless intrusion               • 	Numerous industry awards for 	
         	 market leaders in all major 	                  	 prevention technology & market               	 innovation & growth
         	 industries & government                        • 	Most advanced solutions for 	
         • 	More than 35 of Fortune 100 	                 	 mobile worker protection
         	 companies depend on                            	 regardless of location
         	 AirDefense                                     • 	27 Patents pending covering
         • 	Securing over 10,000,000                      	 fundamentals of wireless
         	 wireless devices around the 	                  	 security
         	 globe                                          •	 Common Criteria certified




              “After completing an exhaustive search of
              wireless LAN security and management                                   “(AirDefense) enables us at any one time
              solutions, DeCA concluded that AirDefense                              to graphically depict all over the world what
              offers the only enterprise-class solution for                          access points are communicating with what
              24x7, real-time monitoring of the airwaves that                        (wireless workstations) -- whether there is
              scales to support a wireless LAN deployment                            unauthorized policy set on those devices,
              with more than 1,000 access points around                              whether there are security or performance
              the globe.”                                                            issues.”

              Defense Commissary Agency (DeCA)                                       News Corp.


                                                                                     “AirDefense provides the peace of mind from
                                                                                     knowing that we can identify and eliminate all
              “With AirDefense, I sleep well at night knowing                        unsanctioned wireless laptops, APs, ad hoc
              that my network is protected from rogue wire-                          networks and application-specific wireless
              less devices.”                                                         devices as they enter our airspace.”

              University of Utah Health Sciences Center                              Carilion Health System




                                    Alpharetta, GA U.S.A. |             877.220.8301       |   www.airdefense.net

Contenu connexe

Tendances

The 300 Leonidas Solution
The 300 Leonidas SolutionThe 300 Leonidas Solution
The 300 Leonidas Solutionmatthew.maisel
 
Solution: Block Armour Secure Remote Access for WFH
Solution: Block Armour Secure Remote Access for WFHSolution: Block Armour Secure Remote Access for WFH
Solution: Block Armour Secure Remote Access for WFHBlock Armour
 
Build Redundant and Resilient Networks with Micro-Segmentation
Build Redundant and Resilient Networks with Micro-SegmentationBuild Redundant and Resilient Networks with Micro-Segmentation
Build Redundant and Resilient Networks with Micro-SegmentationWestermo Network Technologies
 
Augmentation of a SCADA based firewall against foreign hacking devices
Augmentation of a SCADA based firewall against foreign hacking devices Augmentation of a SCADA based firewall against foreign hacking devices
Augmentation of a SCADA based firewall against foreign hacking devices IJECEIAES
 
Cevn Vibert. Thales UK. 28th January
Cevn Vibert. Thales UK. 28th JanuaryCevn Vibert. Thales UK. 28th January
Cevn Vibert. Thales UK. 28th JanuaryUKTI2014
 
Three Networks, Different Risks - IT, OT and Engineering
Three Networks, Different Risks - IT, OT and EngineeringThree Networks, Different Risks - IT, OT and Engineering
Three Networks, Different Risks - IT, OT and EngineeringWaterfall Security Solutions
 
HEADS, an automatic system for the early detection of oil leaks
HEADS, an automatic system for the early detection of oil leaksHEADS, an automatic system for the early detection of oil leaks
HEADS, an automatic system for the early detection of oil leaksIndra Company
 
Sb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinetSb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinetIvan Carmona
 
White paper scada (2)
White paper scada (2)White paper scada (2)
White paper scada (2)Ivan Carmona
 
ICS case studies v2
ICS case studies v2ICS case studies v2
ICS case studies v2Nguyen Binh
 
karsof full presentation
karsof full presentationkarsof full presentation
karsof full presentationColin Valencia
 

Tendances (20)

Idps technology starter v2.0
Idps technology starter v2.0Idps technology starter v2.0
Idps technology starter v2.0
 
Review of network diagram
Review of network diagramReview of network diagram
Review of network diagram
 
Aensis idps 1000 v ext_eng
Aensis idps 1000  v ext_engAensis idps 1000  v ext_eng
Aensis idps 1000 v ext_eng
 
The 300 Leonidas Solution
The 300 Leonidas SolutionThe 300 Leonidas Solution
The 300 Leonidas Solution
 
Securing SCADA
Securing SCADA Securing SCADA
Securing SCADA
 
Solution: Block Armour Secure Remote Access for WFH
Solution: Block Armour Secure Remote Access for WFHSolution: Block Armour Secure Remote Access for WFH
Solution: Block Armour Secure Remote Access for WFH
 
Build Redundant and Resilient Networks with Micro-Segmentation
Build Redundant and Resilient Networks with Micro-SegmentationBuild Redundant and Resilient Networks with Micro-Segmentation
Build Redundant and Resilient Networks with Micro-Segmentation
 
Augmentation of a SCADA based firewall against foreign hacking devices
Augmentation of a SCADA based firewall against foreign hacking devices Augmentation of a SCADA based firewall against foreign hacking devices
Augmentation of a SCADA based firewall against foreign hacking devices
 
Endpoint Security
Endpoint SecurityEndpoint Security
Endpoint Security
 
S C A D A Security Keynote C K
S C A D A  Security  Keynote  C KS C A D A  Security  Keynote  C K
S C A D A Security Keynote C K
 
The State of the Net in India
The State of the Net in IndiaThe State of the Net in India
The State of the Net in India
 
Cevn Vibert. Thales UK. 28th January
Cevn Vibert. Thales UK. 28th JanuaryCevn Vibert. Thales UK. 28th January
Cevn Vibert. Thales UK. 28th January
 
SourceFire IPS Overview
SourceFire IPS OverviewSourceFire IPS Overview
SourceFire IPS Overview
 
Three Networks, Different Risks - IT, OT and Engineering
Three Networks, Different Risks - IT, OT and EngineeringThree Networks, Different Risks - IT, OT and Engineering
Three Networks, Different Risks - IT, OT and Engineering
 
HEADS, an automatic system for the early detection of oil leaks
HEADS, an automatic system for the early detection of oil leaksHEADS, an automatic system for the early detection of oil leaks
HEADS, an automatic system for the early detection of oil leaks
 
Euro mGov Securing Mobile Services
Euro mGov Securing Mobile ServicesEuro mGov Securing Mobile Services
Euro mGov Securing Mobile Services
 
Sb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinetSb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinet
 
White paper scada (2)
White paper scada (2)White paper scada (2)
White paper scada (2)
 
ICS case studies v2
ICS case studies v2ICS case studies v2
ICS case studies v2
 
karsof full presentation
karsof full presentationkarsof full presentation
karsof full presentation
 

En vedette (14)

Ap51 xx reference_guide
Ap51 xx reference_guideAp51 xx reference_guide
Ap51 xx reference_guide
 
Ap7181 brochure it_bpg
Ap7181 brochure it_bpgAp7181 brochure it_bpg
Ap7181 brochure it_bpg
 
Link planner userguide.3.3.1
Link planner userguide.3.3.1Link planner userguide.3.3.1
Link planner userguide.3.3.1
 
Ap 7131-gr-ss-v4a-fip svalidated
Ap 7131-gr-ss-v4a-fip svalidatedAp 7131-gr-ss-v4a-fip svalidated
Ap 7131-gr-ss-v4a-fip svalidated
 
Ap 622 ss 0112_chv4
Ap 622 ss 0112_chv4Ap 622 ss 0112_chv4
Ap 622 ss 0112_chv4
 
Ita mototrbo dp4000_specifiche_adv
Ita mototrbo dp4000_specifiche_advIta mototrbo dp4000_specifiche_adv
Ita mototrbo dp4000_specifiche_adv
 
Phn 2524 001v000
Phn 2524 001v000Phn 2524 001v000
Phn 2524 001v000
 
Ap6521 spec sheet
Ap6521 spec sheetAp6521 spec sheet
Ap6521 spec sheet
 
Ita mototrbo dr3000_mtr3000
Ita mototrbo dr3000_mtr3000Ita mototrbo dr3000_mtr3000
Ita mototrbo dr3000_mtr3000
 
Ugps user guide_v_e
Ugps user guide_v_eUgps user guide_v_e
Ugps user guide_v_e
 
Motorola ap 7131 series access point product reference guide
Motorola ap 7131 series access point product reference guideMotorola ap 7131 series access point product reference guide
Motorola ap 7131 series access point product reference guide
 
Rfs7000 spec sheet
Rfs7000 spec sheetRfs7000 spec sheet
Rfs7000 spec sheet
 
Ewlanaag bro 0408
Ewlanaag bro 0408Ewlanaag bro 0408
Ewlanaag bro 0408
 
Tolly report wi_ng5_wlan
Tolly report wi_ng5_wlanTolly report wi_ng5_wlan
Tolly report wi_ng5_wlan
 

Similaire à Ad enterprise datasheet

Air defense services_platform_spec_sheet
Air defense services_platform_spec_sheetAir defense services_platform_spec_sheet
Air defense services_platform_spec_sheetAdvantec Distribution
 
Air defense services_platform_8.0_spec_sheet
Air defense services_platform_8.0_spec_sheetAir defense services_platform_8.0_spec_sheet
Air defense services_platform_8.0_spec_sheetAdvantec Distribution
 
Air defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheetAir defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheetAdvantec Distribution
 
Air defense advanced forensics module spec sheet
Air defense advanced forensics module spec sheetAir defense advanced forensics module spec sheet
Air defense advanced forensics module spec sheetAdvantec Distribution
 
Air defense network_assurance_brochure
Air defense network_assurance_brochureAir defense network_assurance_brochure
Air defense network_assurance_brochureAdvantec Distribution
 
Conquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the EnterpriseConquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the EnterpriseAirTight Networks
 
The sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work forceThe sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work forceIcomm Technologies
 
Wireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docxWireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docxadolphoyonker
 
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...Underwriters Laboratories
 
IRJET - IDS for Wifi Security
IRJET -  	  IDS for Wifi SecurityIRJET -  	  IDS for Wifi Security
IRJET - IDS for Wifi SecurityIRJET Journal
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)Amare Kassa
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless NetworkingGulshanAra14
 
Wireless security report
Wireless security reportWireless security report
Wireless security reportMarynol Cahinde
 
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...CSCJournals
 
TACTiCS_WP Security_Addressing Security in SDN Environment
TACTiCS_WP Security_Addressing Security in SDN EnvironmentTACTiCS_WP Security_Addressing Security in SDN Environment
TACTiCS_WP Security_Addressing Security in SDN EnvironmentSaikat Chaudhuri
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep securityTrend Micro
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
What Happens At The Edge Of Your Network
What Happens At The Edge Of Your NetworkWhat Happens At The Edge Of Your Network
What Happens At The Edge Of Your NetworkGarland Technology
 

Similaire à Ad enterprise datasheet (20)

Air defense services_platform_spec_sheet
Air defense services_platform_spec_sheetAir defense services_platform_spec_sheet
Air defense services_platform_spec_sheet
 
Air defense services_platform_8.0_spec_sheet
Air defense services_platform_8.0_spec_sheetAir defense services_platform_8.0_spec_sheet
Air defense services_platform_8.0_spec_sheet
 
Air defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheetAir defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheet
 
Air defense advanced forensics module spec sheet
Air defense advanced forensics module spec sheetAir defense advanced forensics module spec sheet
Air defense advanced forensics module spec sheet
 
Air defense network_assurance_brochure
Air defense network_assurance_brochureAir defense network_assurance_brochure
Air defense network_assurance_brochure
 
Wlan security
Wlan securityWlan security
Wlan security
 
AirTight Networks - Wireless Security 2011
AirTight Networks - Wireless Security 2011AirTight Networks - Wireless Security 2011
AirTight Networks - Wireless Security 2011
 
Conquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the EnterpriseConquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the Enterprise
 
The sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work forceThe sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work force
 
Wireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docxWireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docx
 
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
 
IRJET - IDS for Wifi Security
IRJET -  	  IDS for Wifi SecurityIRJET -  	  IDS for Wifi Security
IRJET - IDS for Wifi Security
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
Wireless security report
Wireless security reportWireless security report
Wireless security report
 
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
 
TACTiCS_WP Security_Addressing Security in SDN Environment
TACTiCS_WP Security_Addressing Security in SDN EnvironmentTACTiCS_WP Security_Addressing Security in SDN Environment
TACTiCS_WP Security_Addressing Security in SDN Environment
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep security
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
What Happens At The Edge Of Your Network
What Happens At The Edge Of Your NetworkWhat Happens At The Edge Of Your Network
What Happens At The Edge Of Your Network
 

Plus de Advantec Distribution (20)

E pmp for public presentation feb 27 2015
E pmp for public presentation feb 27 2015E pmp for public presentation feb 27 2015
E pmp for public presentation feb 27 2015
 
1 wi ng5_wlan_brochure
1 wi ng5_wlan_brochure1 wi ng5_wlan_brochure
1 wi ng5_wlan_brochure
 
Vx9000 datasheet
Vx9000 datasheetVx9000 datasheet
Vx9000 datasheet
 
Nx7500 datasheet
Nx7500 datasheetNx7500 datasheet
Nx7500 datasheet
 
Nx9500 datasheet
Nx9500 datasheetNx9500 datasheet
Nx9500 datasheet
 
Nx4500 6500 datasheet
Nx4500 6500 datasheetNx4500 6500 datasheet
Nx4500 6500 datasheet
 
Rfs7000 datasheet
Rfs7000 datasheetRfs7000 datasheet
Rfs7000 datasheet
 
Rfs6000 datasheet
Rfs6000 datasheetRfs6000 datasheet
Rfs6000 datasheet
 
Rfs4000 datasheet
Rfs4000 datasheetRfs4000 datasheet
Rfs4000 datasheet
 
Ap8200 datasheet
Ap8200 datasheetAp8200 datasheet
Ap8200 datasheet
 
Ap7181 datasheet
Ap7181 datasheetAp7181 datasheet
Ap7181 datasheet
 
Ap8222 datasheet
Ap8222 datasheetAp8222 datasheet
Ap8222 datasheet
 
Ap8163 datasheet
Ap8163 datasheetAp8163 datasheet
Ap8163 datasheet
 
Ap6562 datasheet
Ap6562 datasheetAp6562 datasheet
Ap6562 datasheet
 
Ap8122 datasheet
Ap8122 datasheetAp8122 datasheet
Ap8122 datasheet
 
Ap8132 datasheet
Ap8132 datasheetAp8132 datasheet
Ap8132 datasheet
 
Ap7532 datasheet
Ap7532 datasheetAp7532 datasheet
Ap7532 datasheet
 
Ap7502 datasheet
Ap7502 datasheetAp7502 datasheet
Ap7502 datasheet
 
Ap7131 datasheet
Ap7131 datasheetAp7131 datasheet
Ap7131 datasheet
 
Ap7522 datasheet
Ap7522 datasheetAp7522 datasheet
Ap7522 datasheet
 

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Dernier (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Ad enterprise datasheet

  • 1. Anywhere, Anytime Wireless Protection Anywhere, Anytime Wireless Protection
  • 2. EXECUTIVE SUMMARY AirDefense Enterprise™ is the most powerful Wireless Intrusion Prevention System (IPS) available. Having pioneered the field of wireless IPS, AirDefense continues to lead in innovation with 27 patents pending or granted. The AirDefense Enterprise solution provides complete protection against wireless threats, policy compliance monitoring, robust performance monitoring and troubleshooting, and location tracking in an appliance that can scale to meet the largest global organizations’ needs. AirDefense uses collaborative intelligence with secure sensors that work in tandem with a hardened purpose-built server appliance to monitor all 802.11 (a/b/g) wireless traffic in real time for the highest level of security, rogue mitigation and policy enforcement. COMPREHENSIVE INTRUSION DETECTION AirDefense Enterprise provides the most comprehensive detection of wireless intrusion attempts. By analyzing existing and day-zero threats in real-time against historical data, AirDefense Enterprise is able to accurately detect all wireless attacks and anomalous behavior. With context-aware detection, correlation and multi-dimensional detection engines, AirDefense detects only meaningful security events and maintains the lowest rate of false positive alarms. This next-generation wireless protection platform offers the industry’s most extensive event library, with more than 200 security and performance events. Wireless vulnerabilities detected include reconnaissance (ad hoc stations, rogue APs, open/misconfigured APs), sniffing (dictionary attacks, leaky APs, WEP/WPA/LEAP cracking), masquerade (MAC spoofing, evil twin attacks/Wi- Phishing attacks), insertion (man-in-the-middle attack, multicast/broadcast injection) and denial-of-service attacks (disassociation, duration field spoofing, RF jamming). AirDefense allows administrators to easily distribute and process alarms in enterprise deployments: • Customized alarm views, notifications and priorities • Flexible querying and filtering • Third-party integration AUTOMATED PROTECTION AirDefense responds automatically to wireless threats by stopping the device involved before it is able to cause damage to the network. By responding on both the wireless and wired networks, AirDefense is the industry’s most secure wireless intrusion prevention solution. AirDefense performs targeted terminations ensuring that only the correct intruders and rogue devices are disconnected. The system maintains a record of termination actions to allow for a reliable audit trail. AirDefense also complies with FCC regulations and eliminates the liability that could be associated with stopping a device wirelessly. AirTermination™ AirDefense can mitigate wireless threats via the air by disabling wireless connections between intruders and authorized devices. AirTermination is extremely precise ensuring that only the offending device is prohibited from operating. Wired-side Termination AirDefense identifies the switch port to which offending devices are connected and turns it off thus preventing the rogue device from accessing the network.
  • 3. ELIMINATE ROGUES CONNECTED TO THE NETWORK Rogue devices are a serious threat to enterprise security. A single rogue access point can allow an attacker to gain full access to the internal network. AirDefense can identify any rogue device and disable it automatically. AirDefense Enterprise identifies rogue devices and determines if they are connected to the internal network. By analyzing wireless traffic, AirDefense can determine the level of threat that a potential rogue poses to the organization. This allows administrators to ignore neighboring devices and focus only on the rogues that present a serious threat. This advanced analysis also ensures that neighboring wireless devices are not misclassified as a rogue. Accuracy is essential as less sophisticated Wireless IPS systems can easily disable a neighboring access point by mistake opening the organization to unwanted liability. Least Risk DEVICE THREAT LEVEL Highest Risk Neighboring AP Connected to Unauthorized AP Connected Station Rogue on Neighboring AP in Building Transferring Data the Network COMPLY WITH ENTERPRISE & REGULATORY POLICIES AirDefense Enterprise allows administrators to define, monitor and enforce wireless LAN policies in the areas of security, performance, usage and vendor types. Organizations can minimize vulnerability by ensuring that wireless devices are using the proper security protocols. Mis-configuration is one of the most common causes for wireless security breaches. When a device is found to be non- compliant, AirDefense notifies the administrator of the exact discrepancy. AirDefense includes a variety of regulatory compliance reports for retail establishments, healthcare organizations, financial service providers and government agencies. There are specific compliance reports for the Payment Card Industry (PCI) Standard, Sarbanes- Oxley (SOX), HIPAA, GLBA, and the Department of Defense 8100.2 Directive. AirDefense administrators can simply print the applicable report to demonstrate the wireless network’s compliance. INVESTIGATE INCIDENTS WITH FORENSIC DATA AirDefense Enterprise provides forensic data that allows administrators to retrace any one device’s steps down to the minute. With forensic research, investigating an event takes minutes instead of potentially hours. Cases that normally would have required administrators to physically visit sites can now be investigated remotely. Administrators can rewind and review minute-by-minute records of connectivity and communication with the network. By storing more than 325 data points per wireless device, per connection, per minute, AirDefense Enterprise allows organizations to view months of historical data on a wireless device that was recently discovered to be suspicious. AirDefense stores important information such as channel activity, signal characteristics, device activity and traffic flow. AirDefense can display time of attack/breach, entry point used, length of exposure, transfers of data and systems compromised.
  • 4. TROUBLESHOOT NETWORK PERFORMANCE LOCATION TRACKING With a real-time view of all WLAN traffic, AirDefense enables network AirDefense Enterprise includes powerful location track- administrators to remotely troubleshoot problems, identify and respond ing technology that allows administrators to minimize the to network mis-configurations, and monitor the network’s availability. amount of time required to find a device when visiting a AirDefense analyzes traffic flow to interpret WLAN performance and site. After importing images of a floor plan and specifying identify usage characteristics, interference from neighboring WLANs, the characteristics of the building, AirDefense is able to channel overlap, and performance degradation. consistently locate devices within four cubicles. AirDefense can help measure network usage & performance by determining over-utilized APs & channels, pinpointing network congestion, finding bandwidth hogs & analyzing utilization & congestion trends. Administrators can drill down into a live, streaming view of devices, BSSIDs, and channels to review: • Remote frame captures • Authentication errors • AP configuration issues • Network interference AIRDEFENSE SENSOR NETWORK AIRDEFENSE DEPLOYMENT AIRDEFENSE SERVER MOBILE WORKFORCE PROTECTION AirDefense Personal, an add-on for AirDefense Enterprise, protects end-user laptops when they travel away from the protection of AirDefense sensors. AirDefense Personal is a software agent that enforces wireless policy for remote users. It quietly monitors for malicious or accidental wireless activities and misconfigurations that may cause security exposures or policy violations. AirDefense Personal provides uninterrupted protection for all mobile employees and their enterprise wireless assets - at work, home, airports or other hotspots. Threats detected include risky configuration, insecure communication, suspicious WLAN settings and risky WLAN connectivity. It integrates with AirDefense Enterprise for: • Centralized policy definitions and analysis • Combined alarm management & reporting • Automated enforcement • Comprehensive reporting
  • 5. INNOVATIVE ADD-ON MODULES WEP Cloaking Spectrum Analysis WEP Cloaking provides protection With Spectrum Analysis, administrators for wireless infrastructure secured by can identify and classify possible WEP encryption. It helps meet PCI sources of non-802.11 interference. requirements by supplementing WEP Interference types detected include encryption and provides protection for microwaves, cordless phones, wireless WEP networks that would otherwise cameras and Bluetooth. Administrators be extremely vulnerable. It leads to can troubleshoot the physical layer tremendous cost savings by enabling a more orderly process of of the WLAN in real-time at remote locations without requiring migrating away from the WEP protocol. specialized hardware. Sensor-less Rogue Detection Centralized Management Console Sensor-less Rogue Detection allows the administrators to detect The Centralized Management Console (CMC) manages settings and eliminate rogue wireless devices without deploying wireless of multiple appliances from one console. Using the CMC, sensors. It is the most cost-effective and easily deployed solution administrators can manage deployments with tens of thousands to identify rogue wireless devices on a large scale and allows for of sensors from one central console. Settings across multiple prioritization of sites in need of additional wireless protection. appliances can be synchronized to ensure a consistent deployment. Advanced Forensics LiveRF The Advanced Forensics module The AirDefense LiveRF module, provides administrators with the ability powered by Motorola technology, to rewind and review detailed records provides the industry’s only real- of wireless activity that can assist in time assessment of wireless network forensic investigations or wireless performance. Administrators can network troubleshooting. It also allows troubleshoot wireless connectivity, trend analysis for network performance view throughput, capacity, coverage and capacity planning. By storing and managing 325 data points holes and interference issues from a central console. With LiveRF, every minute for each wireless device, Advanced Forensics is administrators can visualize the performance of differing wireless the ultimate resource for tracking threats and understanding the applications from simple web browsing to live video without having performance trends of the wireless network. to go out to remote locations. ENTERPRISE CLASS SCALABILITY WITH LOWEST TCO Scalable AirDefense Enterprise’s distributed architecture supports sensors in hundreds of locations reporting back to a centralized appliance. The high-end appliance supports up to 150,000 devices per appliance with over 35,000 devices concurrently active. Centrally-managed Using a single interface for policy enforcement, system/sensor updates & system management, AirDefense Enterprise is easy to use with dashboards and wizards that provide role-based views. Multiple appliances can be managed using the Centralized Management Console. Easily deployed & reliable AirDefense Enterprise is an appliance based solution and uses zero-configuration sensors requiring minimal effort to deploy. For redundancy, a secondary appliance can be deployed. Low bandwidth requirements Patent-pending optimization algorithms to minimize the amount of wired bandwidth to less than 3 Kbps per sensor, while continuing to maintain full, centralized correlation and complete security.
  • 6. ABOUT AIRDEFENSE AirDefense is the market leader in anywhere, anytime wireless security. The company is trusted by more Fortune 500 companies, healthcare organizations and high-security government agencies for enterprise wireless protection than any other company. AirDefense products provide the most advanced solutions for rogue wireless detection, policy enforcement and intrusion prevention, both inside and outside an organization’s physical locations and wired networks. As a key layer of security, AirDefense Enterprise complements wireless VPNs, encryption & authentication. AirDefense Enterprise detects & responds to wireless threats and unauthorized devices on the wireless network using distributed smart sensors (monitoring 802.11 a/b/g) and a secure server appliance. With Common Criteria certification and FIPS compliant cryptography, AirDefense’s enterprise-class products scale to support single offices as well as organizations with hundreds of locations around the globe. MARKET TECHNOLOGY RECOGNIZED LEADER LEADER LEADER • 700+ Customers including • Pioneer of wireless intrusion • Numerous industry awards for market leaders in all major prevention technology & market innovation & growth industries & government • Most advanced solutions for • More than 35 of Fortune 100 mobile worker protection companies depend on regardless of location AirDefense • 27 Patents pending covering • Securing over 10,000,000 fundamentals of wireless wireless devices around the security globe • Common Criteria certified “After completing an exhaustive search of wireless LAN security and management “(AirDefense) enables us at any one time solutions, DeCA concluded that AirDefense to graphically depict all over the world what offers the only enterprise-class solution for access points are communicating with what 24x7, real-time monitoring of the airwaves that (wireless workstations) -- whether there is scales to support a wireless LAN deployment unauthorized policy set on those devices, with more than 1,000 access points around whether there are security or performance the globe.” issues.” Defense Commissary Agency (DeCA) News Corp. “AirDefense provides the peace of mind from knowing that we can identify and eliminate all “With AirDefense, I sleep well at night knowing unsanctioned wireless laptops, APs, ad hoc that my network is protected from rogue wire- networks and application-specific wireless less devices.” devices as they enter our airspace.” University of Utah Health Sciences Center Carilion Health System Alpharetta, GA U.S.A. | 877.220.8301 | www.airdefense.net