34
1 Fortifying Wireless Networks

1 Fortifying Wireless Networks. 2 Server Users Traditional Wired Network Well-Defined Network Edge, Straightforward to Manage and Secure INTERNET SECURE

Embed Size (px)

Citation preview

Page 1: 1 Fortifying Wireless Networks. 2 Server Users Traditional Wired Network Well-Defined Network Edge, Straightforward to Manage and Secure INTERNET SECURE

1

Fortifying Wireless Networks

Page 2: 1 Fortifying Wireless Networks. 2 Server Users Traditional Wired Network Well-Defined Network Edge, Straightforward to Manage and Secure INTERNET SECURE

2

Server

Users

Traditional Wired Network

Well-Defined Network Edge, Straightforward to Manage and

Secure

INTERNET

SECURE INTERNAL NETWORK

Page 3: 1 Fortifying Wireless Networks. 2 Server Users Traditional Wired Network Well-Defined Network Edge, Straightforward to Manage and Secure INTERNET SECURE

3

Users

INTERNET

Trouble Connecting to WLANs

Hacker in Parking Lot

Users Connecting to Neighboring Networks

Rogue AP

Network Edge Blurred, New

Attack Vectors ‘Behind’ the

Firewall

Wireless Changes Everything

Server

Page 4: 1 Fortifying Wireless Networks. 2 Server Users Traditional Wired Network Well-Defined Network Edge, Straightforward to Manage and Secure INTERNET SECURE

4

Electricity Grid in U.S. Penetrated By Spies Wall Street Journal

Cover story: 08/04/2009

WASHINGTON -- Cyberspies have penetrated the U.S. electrical grid and left behind software programs that could be used to disrupt the system, according to current and former national-security officials.

Article By SIOBHAN GORMAN Associated Press

Technology is a Target

Page 5: 1 Fortifying Wireless Networks. 2 Server Users Traditional Wired Network Well-Defined Network Edge, Straightforward to Manage and Secure INTERNET SECURE

5

Wireless – a Critical part of the NetworkThe Reliability Issue

TECHNOLOGYPROBLEMS

Connectivity can be Impacted by Many Outside Factors

Much Wider Variety of Client Settings than Wired Networks

Problems are Transient – Like the Devices

RF is a New Technology forSome Network Engineers

BUSINESS / ORGANIZATIONALPROBLEMS

Wireless is the #1 Culprit – Blamedfor Everything

Too Many Support Calls are Escalated to Wireless Networking Team

Tools Unavailable at Remote Sites Where Issues are Present

Site Visits are Very Expensive

Connectivity ProblemsRoaming Issues

Coverage & CapacityNoise & Interference

Page 6: 1 Fortifying Wireless Networks. 2 Server Users Traditional Wired Network Well-Defined Network Edge, Straightforward to Manage and Secure INTERNET SECURE

6

PROTECTIONFOR ANY

WLAN

Trouble-shooting

Compliance

Security

SECURITYRogue Elimination

Intrusion Detection

Automated Defenses

Forensic Analysis

Legacy Protection

Mobile Protection

COMPLIANCE

24x7 Policy Monitoring

Flexible Definition

Custom Reports

PCI, HIPAA, GLBA, US DoD, SOX Reports

Granular Forensic Records

TROUBLESHOOTING

Solve Issues Remotely

Level 1 Helpdesk

Proactive Monitoring

Spectrum Analysis

Interference Detection

LiveRF Coverage

Remote Packet Capture

Historical Analysis

Wireless Intrusion Prevention Solutions(WIPS)

Page 7: 1 Fortifying Wireless Networks. 2 Server Users Traditional Wired Network Well-Defined Network Edge, Straightforward to Manage and Secure INTERNET SECURE

7

Gartner Group – Wireless / WIPS requirements

From: Gartner Group Marketscope for Wireless Intrusion Prevention Systems John Pescatore, John Girard July 2008

“What you Need

Wireless networks remain a potentially significant vulnerability for enterprises, as a continuing stream of wireless LAN (WLAN)-based security incidents demonstrates. Because most enterprises support WLANs, enterprises must ensure that vulnerability management and intrusion prevention processes are extended o cover wireless and wired networks. WLAN security monitoring is required to ensure that support WLANs are kept secure and the users do not install their technologies where WLAN (or faster technologies, such as 802.11n) are not supported”

Page 8: 1 Fortifying Wireless Networks. 2 Server Users Traditional Wired Network Well-Defined Network Edge, Straightforward to Manage and Secure INTERNET SECURE

8

US DoD – Wireless / WIPS requirements

Wireless Intrusion Detection Systems (WIDS) were then added as a DoD requirement

US DoD Wireless Policy

The Department of Defense (DoD) Directive Number 8100.2 was issued on April 14, 2004. TheDirective covers the use of commercial wireless devices, services, and technologies in the DoDGlobal Information Grid (GIG). The Directive spells out policies for deploying secure wirelessnetworks, and requires monitoring of those wireless networks for compliance. Additionally, theDirective states that wireless networks are banned from use in certain areas, and it coverspolicies for banned and authorized wireless networks.

On June 2, 2006 the DoD issued a supplemental policy and guidance to 8100.2 with the objectiveof enhancing overall security guidance and to create a foundation and roadmap for increasedinteroperability that embraces open standards regarding Wireless LAN (WLAN) technologies.This policy applies directly to IEEE 802.11 based WLAN devices, systems and technologies andexcludes cellular, Bluetooth, WiMax and proprietary RF communication standards.

Page 9: 1 Fortifying Wireless Networks. 2 Server Users Traditional Wired Network Well-Defined Network Edge, Straightforward to Manage and Secure INTERNET SECURE

9

Existing WLAN infrastructure as

overlay

Need to know Security policy is in effect

-- Motorola, Cisco, Aruba, Trapeze…

NEW - Highly cost effective On-board

WLAN/WIPS

Integration AccessPoint und Sensor

Need to know Security policy is in effect

No WLAN Policy

Security policy is NO wireless

But…how do they know?

Issues:Printers, USB WLANs,“Dual Homed Clients”(Ethernet & WLAN),u.a.

Environments needing WIPS

Page 10: 1 Fortifying Wireless Networks. 2 Server Users Traditional Wired Network Well-Defined Network Edge, Straightforward to Manage and Secure INTERNET SECURE

10

Typical WIPS solution Architecture

HEADQUARTERS

WIPS Appliance

Sensor

FIELD OFFICES

FIELD OFFICES

Innovative Add-on Modules

WEP Cloaking

A Migration Step to Protect Legacy

Encryption Protocols. Meet

PCI Requirements While Upgrading to

WPA

Spectrum Analysis

Detect & Classify Common Types of

RF Interference Sources Including

Microwaves, Bluetooth etc.

LiveRFReal-time

Assessment of Wireless Network

Performance. Centrally Analyze & Troubleshoot

Connectivity Issues

Advanced Forensics

Rewind & Review Detailed Wireless Activity Records

for Forensic Investigations & Troubleshooting

Advanced Trouble-shooting

Provides Faster Resolution of

Wireless-related Issues as Well as

Proactive Resolutions

Mobile Workforce Protection

End-point Security to Protect Mobile Users Regardless

of Location

Rogue Detection & Elimination

Intrusion Detection

Automated Termination

Policy Compliance

Wireless Troubleshooting

Forensic Analysis

Location Tracking

Enterprise-class Scalability

Rogue Detection & Elimination

Intrusion Detection

Automated Termination

Policy Compliance

Wireless Troubleshooting

Forensic Analysis

Location Tracking

Enterprise-class Scalability

Page 11: 1 Fortifying Wireless Networks. 2 Server Users Traditional Wired Network Well-Defined Network Edge, Straightforward to Manage and Secure INTERNET SECURE

11

Optimal WIPS Solution Architecture

Centralized, Hardened Appliance

Protection for WLAN Infrastructure and Devices

Secure Layer 3 Connections Between Sensors and Appliance

Minimal WAN Bandwidth Needed by Sensors, < 3Kb/s

Two Types of Sensors:Dedicated Sensors are Separate Devices, Use One for Every 3-5 APs

Integrated Sensors are Built Into Access Points

All Sensors Provide 24x7 Protection for Gap-free Security

NETWORK

Distributed Collaborative Architecture is Highly ScalableDistributed Collaborative Architecture is Highly Scalable

Integrated AP/Sensor

FIELD OFFICE

Central Appliance

Dedicated Sensor

CORPORATE OFFICE

Page 12: 1 Fortifying Wireless Networks. 2 Server Users Traditional Wired Network Well-Defined Network Edge, Straightforward to Manage and Secure INTERNET SECURE

12

Combined AP & SensorOptimal – full-time sensing/WIPS

For years customer have asked for a single device as AP and Sensor

Some solutions were “part-time” – when AP was not busy, would scan some channels. NOT recommended.

New in market – APs with multiple Radios – where 1 radio can be “assigned” a sensor.

Imperative – sensor MUST be full time!

Imperative – if device is sensor and AP – is it scanning all channels?

Reduced Deployment Cost – No Overlay Sensor Deployment

Page 13: 1 Fortifying Wireless Networks. 2 Server Users Traditional Wired Network Well-Defined Network Edge, Straightforward to Manage and Secure INTERNET SECURE

13

Status on – “n”

Requires sensor to have ‘n’ radio – more expensive usually

In the market are some Dual-radio APs to Use One Radio for Dedicated WIPS Sensing – most cost effective option

There are sensors to cover ‘n’

In a no wireless environment ‘n’ can be a new threat

Unless “green-field” ‘n’ – b, g radio sensors will see all traffic

Page 14: 1 Fortifying Wireless Networks. 2 Server Users Traditional Wired Network Well-Defined Network Edge, Straightforward to Manage and Secure INTERNET SECURE

14

Wireless Intrusion Prevention Solutions(WIPS) – what you should require

COMPLIANCE

24x7 Policy Monitoring

Flexible Definition

Custom Reports

PCI, HIPAA, GLBA, US DoD, SOX Reports

Granular Forensic Records

TROUBLESHOOTING

Solve Issues Remotely

Level 1 Helpdesk

Proactive Monitoring

Spectrum Analysis

Interference Detection

LiveRF Coverage

Remote Packet Capture

Historical Analysis

PROTECTIONFOR ANY

WLAN

Trouble-shooting

Compliance

Security

PROTECTIONFOR ANY

WLAN

Trouble-shooting

Compliance

Security

SECURITYRogue Elimination

Intrusion Detection

Automated Defenses

Forensic Analysis

Legacy Protection

Mobile Protection

COMPLIANCE

24x7 Policy Monitoring

Flexible Definition

Custom Reports

PCI, HIPAA, GLBA, US DoD, SOX Reports

Granular Forensic Records

TROUBLESHOOTING

Solve Issues Remotely

Level 1 Helpdesk

Proactive Monitoring

Spectrum Analysis

Interference Detection

LiveRF Coverage

Remote Packet Capture

Historical Analysis

Page 15: 1 Fortifying Wireless Networks. 2 Server Users Traditional Wired Network Well-Defined Network Edge, Straightforward to Manage and Secure INTERNET SECURE

15

Eliminate Rogues on the Network

Differentiate Between Neighbors and Rogue Devices Automatically

Identify Every Type of Rogue Device Connected to the Network

Historical Record of Associations & Traffic

Automatic Elimination

Automatically Finds and Removes All Rogue DevicesAutomatically Finds and Removes All Rogue Devices

REMOTE OFFICE NEIGHBORDETECT - ANALYZE - ELIMINATE

Dedicated Sensor

OpenRogue AP

Encrypted Rogue AP

Rogue APBehind Firewall

Soft AP

Rogue Devices Can be Anywhere on the Network and can be Encrypted

Page 16: 1 Fortifying Wireless Networks. 2 Server Users Traditional Wired Network Well-Defined Network Edge, Straightforward to Manage and Secure INTERNET SECURE

16

Comprehensive Intrusion Detection

Sensors

PROTOCOL ABUSE

ANOMALOUS BEHAVIOR

SIGNATURE ANALYSIS

POLICY MANAGER

Correlation Engines Context-Aware Detection Engines

Broad set of Threats DetectedReconnaissance & Probing

Denial of Service Attacks

Identity Thefts, Malicious Associations

Dictionary Attacks; SecurityPolicy Violations

Minimal False PositivesCorrelation Across Multiple Detection Engines Reduces False Positives

Most Accurate Attack Detection

Powerful Detection with Minimal False PositivesPowerful Detection with Minimal False Positives

DETECTIONDISCOVERY ANALYSIS

Page 17: 1 Fortifying Wireless Networks. 2 Server Users Traditional Wired Network Well-Defined Network Edge, Straightforward to Manage and Secure INTERNET SECURE

17

Automated Wireless Protection

Wireless TerminationTargeted Disruption of Wireless Connections

No Impact to Allowed Network Traffic

Compliant with Applicable Laws & FCC Regulations

Wired Port SuppressionSearch Wired Network to Locate the Switch-port a Rogue Threat is Attached to

Safeguards Ensure Only Threat is Disconnected

Wireless ACLPrevent Wireless Stations from Connecting to the WLAN

Sensor

WIPS Appliance

Switch

Laptop

Neighboring AP

APs

Wireless Station

AP

Terminated: AccidentalAssociation

Port Suppressed: Rogue AP

ACL Enforced: Rogue Station

Comprehensive Threat Mitigation that is Powerful & Safe to UseComprehensive Threat Mitigation that is Powerful & Safe to Use

Page 18: 1 Fortifying Wireless Networks. 2 Server Users Traditional Wired Network Well-Defined Network Edge, Straightforward to Manage and Secure INTERNET SECURE

18

Forensic Analysis

Extensive Forensic DataMonths of Historical Data Accessiblefrom System

325+ Statistics per Device per Minute

Device Connectivity & Activity Logs

Valuable Business InformationAccurate Records for Forensic Analysis & Policy Compliance Reporting

Determine Exact Time & Impact ofAttempted Attacks

Record of Wireless Performance and Connectivity Issues

FORENSIC SUMMARY

ASSOCIATION ANALYSIS

Unrivaled Visibility into Network Activity & Threats

Page 19: 1 Fortifying Wireless Networks. 2 Server Users Traditional Wired Network Well-Defined Network Edge, Straightforward to Manage and Secure INTERNET SECURE

19

SECURITYRogue Elimination

Intrusion Detection

Automated Defenses

Forensic Analysis

Legacy Protection

Mobile Protection

TROUBLESHOOTING

Solve Issues Remotely

Level 1 Helpdesk

Proactive Monitoring

Spectrum Analysis

Interference Detection

LiveRF Coverage

Remote Packet Capture

Historical Analysis

Wireless Intrusion Prevention Solutions(WIPS) – what you should require

PROTECTIONFOR ANY

WLAN

Trouble-shooting

Compliance

Security

SECURITYRogue Elimination

Intrusion Detection

Automated Defenses

Forensic Analysis

Legacy Protection

Mobile Protection

COMPLIANCE

24x7 Policy Monitoring

Flexible Definition

Custom Reports

PCI, HIPAA, GLBA, US DoD, SOX Reports

Granular Forensic Records

TROUBLESHOOTING

Solve Issues Remotely

Level 1 Helpdesk

Proactive Monitoring

Spectrum Analysis

Interference Detection

LiveRF Coverage

Remote Packet Capture

Historical Analysis

PROTECTIONFOR ANY

WLAN

Trouble-shooting

Compliance

Security

PROTECTIONFOR ANY

WLAN

Trouble-shooting

Compliance

Security

Page 20: 1 Fortifying Wireless Networks. 2 Server Users Traditional Wired Network Well-Defined Network Edge, Straightforward to Manage and Secure INTERNET SECURE

20

Regulatory Compliance

RETAIL

FEDERAL HEALTHCARE

CORPORATE

Payment Card Industry (PCI) Data Security Standard (DSS)

Automated Wireless Scanning andRogue Wireless Elimination

Wireless Intrusion Prevention

Encryption Policy Enforcement

Department of Defense 8100.2 Directive

Must have 24x7 Dedicated WIDS

Applicable Regardless ofWLAN Deployment

Common CriteriaCertification Needed

Location Tracking Mandatory

Health Insurance Portability and Accountability Act (HIPAA )

Encryption Validation

Security ConfigurationManagement

HIPAA Compliance Reports

Sarbanes Oxley (SOX) Compliance

Gramm-Leach-Bliley Act (GLBA)

Protect Confidentiality and Integrity of Corporate Data Transmitted Wirelessly

Reporting and Audit Support

DoD Standard Compliance Report

Page 21: 1 Fortifying Wireless Networks. 2 Server Users Traditional Wired Network Well-Defined Network Edge, Straightforward to Manage and Secure INTERNET SECURE

21

Policy Compliance & Reporting

Fully Customizable Reporting and Dedicated Monitoring ofPolicy Compliance and Network Performance

COMPLY

Monitor

Enforce

DefineDEFINE WIRELESS

POLICY

CUSTOMIZABLE REPORTING

Page 22: 1 Fortifying Wireless Networks. 2 Server Users Traditional Wired Network Well-Defined Network Edge, Straightforward to Manage and Secure INTERNET SECURE

22

SECURITYRogue Elimination

Intrusion Detection

Automated Defenses

Forensic Analysis

Legacy Protection

Mobile Protection

COMPLIANCE

24x7 Policy Monitoring

Flexible Definition

Custom Reports

PCI, HIPAA, GLBA, US DoD, SOX Reports

Granular Forensic Records

Wireless Intrusion Prevention Solutions(WIPS) – what you should require

SECURITYRogue Elimination

Intrusion Detection

Automated Defenses

Forensic Analysis

Legacy Protection

Mobile Protection

COMPLIANCE

24x7 Policy Monitoring

Flexible Definition

Custom Reports

PCI, HIPAA, GLBA, US DoD, SOX Reports

Granular Forensic Records

TROUBLESHOOTING

Solve Issues Remotely

Level 1 Helpdesk

Proactive Monitoring

Spectrum Analysis

Interference Detection

LiveRF Coverage

Remote Packet Capture

Historical Analysis

PROTECTIONFOR ANY

WLAN

Trouble-shooting

Compliance

Security

PROTECTIONFOR ANY

WLAN

Trouble-shooting

Compliance

Security

Page 23: 1 Fortifying Wireless Networks. 2 Server Users Traditional Wired Network Well-Defined Network Edge, Straightforward to Manage and Secure INTERNET SECURE

23

PAST PRESENT FUTURE

HISTORICAL TROUBLESHOOTING TOOLS

Detailed Forensics

Scope Forensics

Alarm Forensics

PROACTIVE TROUBLEPREVENTION

AP Testing

Policy Compliance

Performance Policy

REAL-TIME TROUBLESHOOTING TOOLS

LiveView

Connectivity Troubleshooting

AP Testing

Spectrum Analysis

LiveRF

End-user Feedback Performance Alarms & Reports

Centralized WLAN Troubleshooting

Remote Troubleshooting

Page 24: 1 Fortifying Wireless Networks. 2 Server Users Traditional Wired Network Well-Defined Network Edge, Straightforward to Manage and Secure INTERNET SECURE

24

Remote Visibility

Real-time View of WLANTurn Any Sensor into a ‘Sniffer’

Full Layer 2 Frame Capture

Visualize Wireless Traffic Flow

28 Different Graphical Views

Low Network Support CostsReal-time View of Remote WLAN

Advanced Centralized Troubleshooting

Reduced on-site Support Cost

Increased WLAN Uptime

Remote WLAN Troubleshooting with Real-time Analysis

FRAME CAPTURE

REAL-TIME TRAFFIC

CONNECTION ANALYSIS

Page 25: 1 Fortifying Wireless Networks. 2 Server Users Traditional Wired Network Well-Defined Network Edge, Straightforward to Manage and Secure INTERNET SECURE

25

Advanced Troubleshooting

Connection TroubleshootingDesigned for Level 1 Helpdesk

Quickly Determine if it is a Wireless or Wired Network Issue

Simple Debugging of Wireless Issues

Escalation Only if Necessary

Centralized Troubleshooting

AP Connectivity TestProactively Test One or More APs

Find Problems Before Disruption

Analyze Wireless and Wired Network from Clients Perspective

Schedule Automatic Tests

Test Access to Wired Applications

SecureServer

WAN

DHCPServer

ApplicationServer

DATA CENTER REMOTE LOCATION

Page 26: 1 Fortifying Wireless Networks. 2 Server Users Traditional Wired Network Well-Defined Network Edge, Straightforward to Manage and Secure INTERNET SECURE

26

Spectrum Analysis Module

Physical Layer TroubleshootingDetect non-802.11 Interference – Microwaves, Bluetooth, Frequency Hopping Devices etc.

2.4 and 5 GHz Band Support

Remote Real-time Spectrograms

AutomatedInterference DetectionUse Existing Sensors – No Special Hardware Needed

Remote Detection of Interference

Automatic Interference Alarms

Improve Wireless Performance

FULL SCAN

CLASSIFY INTERFERENCE

SOURCES

Page 27: 1 Fortifying Wireless Networks. 2 Server Users Traditional Wired Network Well-Defined Network Edge, Straightforward to Manage and Secure INTERNET SECURE

27

Coverage Mapping

Understand Wireless Coverage & Impact on ApplicationsReal-time RF coverage analysis

Building Aware Prediction of Coverageand Capacity

Application Specific Simulations– Voice, Video, Data

Centralized and Remote Analysis

VIEW SIGNAL COVERAGE FOR APPLICATIONS

COVERAGE CHANGE WITH INTERFERER

Wireless CameraUsed as Interference

Source

Comparison of VoIP Coverage

Page 28: 1 Fortifying Wireless Networks. 2 Server Users Traditional Wired Network Well-Defined Network Edge, Straightforward to Manage and Secure INTERNET SECURE

28

Continuous Rogue Detection – US Dept of Energy (DOE)

– Federal Aviation Administration (FAA)

– US House of Representatives

– Department of Agriculture (USDA)

– Defense Advanced Research Agency (DARPA)

– US Marine Corp

– Defense Information Systems Agency (DISA)

28

Government Usage – No-wireless Policy

DISA FBIDoL DoS DoE

FCC SEC

Page 29: 1 Fortifying Wireless Networks. 2 Server Users Traditional Wired Network Well-Defined Network Edge, Straightforward to Manage and Secure INTERNET SECURE

29

Existing WLAN – WIPS – non-DoD– Department of Energy (DOE)

– Security and Exchange Commission (SEC)

– Veteran Affairs (VA)

– Bureau of Labor Statistics

– Federal Communication Commission (FCC)

– Social Security Administration (SSA)

– National Archives

29

Government Usage – In-building Wireless IDS(US Non-DOD)

DISA FBIDoL DoS DoE

FCC SEC

Page 30: 1 Fortifying Wireless Networks. 2 Server Users Traditional Wired Network Well-Defined Network Edge, Straightforward to Manage and Secure INTERNET SECURE

30

Indoor WLAN – WIPS – DoD– US Army

– Defense Commissary Agency (DeCA)

– Defense Logistics Agency (DLA)

– Joint Forces Command (JFCOM)

– Naval Space and Warfare Command

– Naval War College

30

Government Usage – In-building Wireless IDS(DOD)

DISA FBIDoL DoS DoE

FCC SEC

– Naval Hospital Jacksonville

– DISA Joint Interoperability Test Center (JITC)

– Defense Manpower Data Center

– National Security Agency (NSA)

– National Geospatial Agency (NGA)

Page 31: 1 Fortifying Wireless Networks. 2 Server Users Traditional Wired Network Well-Defined Network Edge, Straightforward to Manage and Secure INTERNET SECURE

31

- Dept of Homeland Security – Customs and Border Protection (CBP)

– FBI

• Securing WLANs of field-deployed tactical units (portable units)

– Navy Pierside Wireless Project

• Securing ship-to-shore wireless bridging at every Naval port

31

Government Usage – Outdoor Wireless IDS(DOD)

DISA FBIDoL DoS DoE

FCC SEC

– Navy Shipboard Wireless

• Securing onboard WLAN for inventory application (barcode readers)

– Wireless Perimeter Video Surveillance – 3 Navy sites, 1 Army site

– Navy Tactical Field-deployed WLAN - air traffic control center – 5 systems

– Naval Shipyard Outdoor WLAN - Securing outdoor WLAN mesh

Page 32: 1 Fortifying Wireless Networks. 2 Server Users Traditional Wired Network Well-Defined Network Edge, Straightforward to Manage and Secure INTERNET SECURE

32

• - Laptop lockdown (no-wireless policy)

• DOD – AirDefense Personal

– Secure Wireless Remote Access

• DISA – AirDefense Personal for telecommuting initiative

• DHS – AirDefense Personal

– Cybercrimes – using AirDefense Mobile for WiFi surveillance

• DHS

• Naval Criminal Investigative Service (NCIS)

– Warwalking – AirDefense Mobile for enforcing no-wireless policy

• Pentagon

• Navy

• National Park Service

32

Government Usage – Mobile Wireless Analyzers and Client based controls

Page 33: 1 Fortifying Wireless Networks. 2 Server Users Traditional Wired Network Well-Defined Network Edge, Straightforward to Manage and Secure INTERNET SECURE

33

Conclusion

WIRELESS SECURITY IS PARAMOUNT

Stating you have no wireless – is not enough!

Several Recent Data Breaches Have Happened Over Wireless

CENTRALIZED WIRELESS MONITORING NEEDED

Rogue Wireless Access and Wireless Attacks on the Rise

Significant OPEX in Resolving WLAN Connectivity and Performance Problems

Expect the most from the solution you select!

Automated Elimination of All types of Rogue Wireless Devices

Detection of 200+ Attacks and Policy Violations

Centralized, Advanced Troubleshooting of Wireless Connectivity Issues

Wireless Compliance Validation and Reporting

Integrated Deployment with WLAN – Common AP + Sensor Hardware, Integrated Management

Page 34: 1 Fortifying Wireless Networks. 2 Server Users Traditional Wired Network Well-Defined Network Edge, Straightforward to Manage and Secure INTERNET SECURE

34

Fortifying Wireless Networks

Thank You

Diane [email protected]

+44 7554 436 939