SlideShare une entreprise Scribd logo
1  sur  17
2013 ALL RIGHTS RESERVED. ROOTS Communications Pte Ltd www.rootscomm.com
Protect Your
Airspace
You control your
wireless space.
Not others.
A Wireless Intrusion Protection System (WIPS)
protect your WLAN environments –
preventing unauthorized access to WLANs & client devices.
Here we look at Zebra’s AirDefense Services Platform head to
head comparison with other brand in the current market.
Three Important Factors To Consider
when evaluating Wireless Intrusion Protection System (WIPS)
Management
System usability such as
dashboard view, alerts,
user configurations
Three Important Factors To Consider
when evaluating Wireless Intrusion Protection System (WIPS)
Management
System usability such as
dashboard view, alerts,
user configurations
Identify
Analyze & categorize
different types of wireless
threats
Three Important Factors To Consider
when evaluating Wireless Intrusion Protection System (WIPS)
Management
System usability such as
dashboard view, alerts,
user configurations
Identify
Analyze & categorize
different types of wireless
threats
Eliminate
Identify relevant threats &
terminate in the shortest
time
Management
System usability such as dashboard view,
alerts, user configurations
Management
Number of Dashboard
Components
Features
Customizable Dashboard View
Classification Rules
Customizable Dashboard View
Alarm Management
~35 components,
system or site level
Yes
38 filters with “When, If,
Action” logic
Yes
System or site level,
with filter & search
Zebra AirDefense
Management
Number of Dashboard
Components
Features
16 components,
system level
Customizable Dashboard View Yes
Classification Rules
Based on SSID & other
characteristics
Customizable Dashboard View Yes
Alarm Management System level, no
filter or search
~35 components,
system or site level
Yes
38 filters with “When, If,
Action” logic
Yes
System or site level,
with filter & search
Zebra AirDefense Brand A
Identify
Analyze & categorize different types of
wireless threats
Threats
Total numbe of Threats
in Database
Rogue AP Detection
Ad Hoc Network
Detection
Accidental Association
Detection
Policy Compliance
ThreatsZebra AirDefense
Total numbe of Threats
in Database
Rogue AP Detection
Ad Hoc Network
Detection
Accidental Association
Detection
Policy Compliance
199
Yes, automatic
classification
Yes with additional info
Yes
Yes
ThreatsZebra AirDefense Brand A
Total numbe of Threats
in Database
Rogue AP Detection
Ad Hoc Network
Detection
Accidental Association
Detection
Policy Compliance
92
Yes, manual
classification
Yes
No
Yes
199
Yes, automatic
classification
Yes with additional info
Yes
Yes
Eliminate
Identify relevant threats & terminate in
the shortest time
Eliminate
Zebra
AirDefense
Detect & terminate rogue
AP in 1.39 minutes on
the average Rogue AP
Eliminate
Brand A
Detect & terminate rogue
AP in 3.80 minutes on
the average
Zebra
AirDefense
Detect & terminate rogue
AP in 1.39 minutes on
the average Rogue AP
Rogue AP
Security & Compliance | Network Assurance | Infrastructure Management
Contact us now at
enquiry@rootscomm.com
Who is
ROOTS Communications?
Founded in 1997 in Singapore, ROOTS Communications is a value-added
Distributor and Solutions Provider for telecommunication-related
products/systems and engineering.
Visit us at www.rootscomm.com today!
2016 ALL RIGHTS RESERVED. ROOTS Communications Pte Ltd www.rootscomm.com

Contenu connexe

Tendances

How to improve endpoint security on a SMB budget
How to improve endpoint security on a SMB budgetHow to improve endpoint security on a SMB budget
How to improve endpoint security on a SMB budget
Lumension
 
Effective Vulnerability Management
Effective Vulnerability ManagementEffective Vulnerability Management
Effective Vulnerability Management
Vicky Ames
 
Information security-toolkit-76396-8
Information security-toolkit-76396-8Information security-toolkit-76396-8
Information security-toolkit-76396-8
colleenatrsc
 
Operating system security
Operating system securityOperating system security
Operating system security
Sarmad Makhdoom
 

Tendances (20)

How to improve endpoint security on a SMB budget
How to improve endpoint security on a SMB budgetHow to improve endpoint security on a SMB budget
How to improve endpoint security on a SMB budget
 
Achieving Continuous Monitoring with Security Automation
Achieving Continuous Monitoring with Security AutomationAchieving Continuous Monitoring with Security Automation
Achieving Continuous Monitoring with Security Automation
 
OSB140: Want a Safer Network? You Can Remove Local Admin Rights with Ivanti A...
OSB140: Want a Safer Network? You Can Remove Local Admin Rights with Ivanti A...OSB140: Want a Safer Network? You Can Remove Local Admin Rights with Ivanti A...
OSB140: Want a Safer Network? You Can Remove Local Admin Rights with Ivanti A...
 
Werner Schierschmidt
Werner SchierschmidtWerner Schierschmidt
Werner Schierschmidt
 
Enterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A BossEnterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A Boss
 
How to Audit Firewall, what are the standard Practices for Firewall Audit
How to Audit Firewall, what are the standard Practices for Firewall AuditHow to Audit Firewall, what are the standard Practices for Firewall Audit
How to Audit Firewall, what are the standard Practices for Firewall Audit
 
Effective Vulnerability Management
Effective Vulnerability ManagementEffective Vulnerability Management
Effective Vulnerability Management
 
SYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionSYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration Introduction
 
Outpost Network Security Suite 3.0
Outpost Network Security Suite 3.0Outpost Network Security Suite 3.0
Outpost Network Security Suite 3.0
 
Ransomware
RansomwareRansomware
Ransomware
 
Preventing zero day cyber attacks
Preventing zero day cyber attacksPreventing zero day cyber attacks
Preventing zero day cyber attacks
 
Computer viruses and removal techniques
Computer viruses and removal techniquesComputer viruses and removal techniques
Computer viruses and removal techniques
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Information security-toolkit-76396-8
Information security-toolkit-76396-8Information security-toolkit-76396-8
Information security-toolkit-76396-8
 
OS Security 2009
OS Security 2009OS Security 2009
OS Security 2009
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Ransomware Prevention Guide
Ransomware Prevention GuideRansomware Prevention Guide
Ransomware Prevention Guide
 
Auditing Check Point Firewalls
Auditing Check Point FirewallsAuditing Check Point Firewalls
Auditing Check Point Firewalls
 
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection CenterSYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
 
Vulnerability Malware And Risk
Vulnerability Malware And RiskVulnerability Malware And Risk
Vulnerability Malware And Risk
 

Similaire à Protect Your Airspace. You control your wireless space. Not others.

Ccnsp trainer presentation
Ccnsp trainer presentationCcnsp trainer presentation
Ccnsp trainer presentation
Soap MacTavish
 
SANS 20 Security Controls
SANS 20 Security ControlsSANS 20 Security Controls
SANS 20 Security Controls
Casey Wimmer
 
Facilities Show Presentation1
Facilities Show Presentation1Facilities Show Presentation1
Facilities Show Presentation1
Dean Bishop
 

Similaire à Protect Your Airspace. You control your wireless space. Not others. (20)

Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint Security
 
Securing control systems v0.4
Securing control systems v0.4Securing control systems v0.4
Securing control systems v0.4
 
Network security
Network securityNetwork security
Network security
 
Ccnsp trainer presentation
Ccnsp trainer presentationCcnsp trainer presentation
Ccnsp trainer presentation
 
Ceh v5 module 19 evading ids firewall and honeypot
Ceh v5 module 19 evading ids firewall and honeypotCeh v5 module 19 evading ids firewall and honeypot
Ceh v5 module 19 evading ids firewall and honeypot
 
Understanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loopUnderstanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loop
 
Eximbank security presentation
Eximbank security presentationEximbank security presentation
Eximbank security presentation
 
Threat Modeling
Threat ModelingThreat Modeling
Threat Modeling
 
Freeware Security Tools You Need
Freeware Security Tools You NeedFreeware Security Tools You Need
Freeware Security Tools You Need
 
AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011
 
SANS 20 Security Controls
SANS 20 Security ControlsSANS 20 Security Controls
SANS 20 Security Controls
 
Advanced Malware Analysis Training Session 3 - Botnet Analysis Part 2
Advanced Malware Analysis Training Session 3 - Botnet Analysis Part 2Advanced Malware Analysis Training Session 3 - Botnet Analysis Part 2
Advanced Malware Analysis Training Session 3 - Botnet Analysis Part 2
 
Attacking antivirus
Attacking antivirusAttacking antivirus
Attacking antivirus
 
Introduction to DevOps and DevOpsSec with Secure Design by Prof.Krerk (Chulal...
Introduction to DevOps and DevOpsSec with Secure Design by Prof.Krerk (Chulal...Introduction to DevOps and DevOpsSec with Secure Design by Prof.Krerk (Chulal...
Introduction to DevOps and DevOpsSec with Secure Design by Prof.Krerk (Chulal...
 
Asset Insight Manager (AIM)
Asset Insight Manager (AIM) Asset Insight Manager (AIM)
Asset Insight Manager (AIM)
 
Asset Insight Manager. CAFM
Asset Insight Manager. CAFMAsset Insight Manager. CAFM
Asset Insight Manager. CAFM
 
Facilities Show Presentation1
Facilities Show Presentation1Facilities Show Presentation1
Facilities Show Presentation1
 
Darktrace_Threat_Visualizer_User_Guide.pdf
Darktrace_Threat_Visualizer_User_Guide.pdfDarktrace_Threat_Visualizer_User_Guide.pdf
Darktrace_Threat_Visualizer_User_Guide.pdf
 
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
 
Cansecwest - The Death of AV defence in depth
Cansecwest - The Death of AV defence in depthCansecwest - The Death of AV defence in depth
Cansecwest - The Death of AV defence in depth
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

Protect Your Airspace. You control your wireless space. Not others.

  • 1. 2013 ALL RIGHTS RESERVED. ROOTS Communications Pte Ltd www.rootscomm.com Protect Your Airspace You control your wireless space. Not others.
  • 2. A Wireless Intrusion Protection System (WIPS) protect your WLAN environments – preventing unauthorized access to WLANs & client devices. Here we look at Zebra’s AirDefense Services Platform head to head comparison with other brand in the current market.
  • 3. Three Important Factors To Consider when evaluating Wireless Intrusion Protection System (WIPS) Management System usability such as dashboard view, alerts, user configurations
  • 4. Three Important Factors To Consider when evaluating Wireless Intrusion Protection System (WIPS) Management System usability such as dashboard view, alerts, user configurations Identify Analyze & categorize different types of wireless threats
  • 5. Three Important Factors To Consider when evaluating Wireless Intrusion Protection System (WIPS) Management System usability such as dashboard view, alerts, user configurations Identify Analyze & categorize different types of wireless threats Eliminate Identify relevant threats & terminate in the shortest time
  • 6. Management System usability such as dashboard view, alerts, user configurations
  • 7. Management Number of Dashboard Components Features Customizable Dashboard View Classification Rules Customizable Dashboard View Alarm Management ~35 components, system or site level Yes 38 filters with “When, If, Action” logic Yes System or site level, with filter & search Zebra AirDefense
  • 8. Management Number of Dashboard Components Features 16 components, system level Customizable Dashboard View Yes Classification Rules Based on SSID & other characteristics Customizable Dashboard View Yes Alarm Management System level, no filter or search ~35 components, system or site level Yes 38 filters with “When, If, Action” logic Yes System or site level, with filter & search Zebra AirDefense Brand A
  • 9. Identify Analyze & categorize different types of wireless threats
  • 10. Threats Total numbe of Threats in Database Rogue AP Detection Ad Hoc Network Detection Accidental Association Detection Policy Compliance
  • 11. ThreatsZebra AirDefense Total numbe of Threats in Database Rogue AP Detection Ad Hoc Network Detection Accidental Association Detection Policy Compliance 199 Yes, automatic classification Yes with additional info Yes Yes
  • 12. ThreatsZebra AirDefense Brand A Total numbe of Threats in Database Rogue AP Detection Ad Hoc Network Detection Accidental Association Detection Policy Compliance 92 Yes, manual classification Yes No Yes 199 Yes, automatic classification Yes with additional info Yes Yes
  • 13. Eliminate Identify relevant threats & terminate in the shortest time
  • 14. Eliminate Zebra AirDefense Detect & terminate rogue AP in 1.39 minutes on the average Rogue AP
  • 15. Eliminate Brand A Detect & terminate rogue AP in 3.80 minutes on the average Zebra AirDefense Detect & terminate rogue AP in 1.39 minutes on the average Rogue AP Rogue AP
  • 16. Security & Compliance | Network Assurance | Infrastructure Management Contact us now at enquiry@rootscomm.com
  • 17. Who is ROOTS Communications? Founded in 1997 in Singapore, ROOTS Communications is a value-added Distributor and Solutions Provider for telecommunication-related products/systems and engineering. Visit us at www.rootscomm.com today! 2016 ALL RIGHTS RESERVED. ROOTS Communications Pte Ltd www.rootscomm.com