Download presentation
2
AirDefense’s Role in Wireless Security
Guards Your Wireless Deployments and Areas without Wireless Protects End-Users as They Travel Barcode Scanner Authorized AP Authorized Station Hacker Rogue AP Probing Laptop Confidential Data Corporate Network Hacker Hotspot
3
Rogue Threat Management & Mitigation
Calculate Threat Index Threat-based Management NEW: Two additional rogue on network detection methods Partitioning of Friendly Neighboring Networks unless they become malicious 2 Detect Rogue Devices / Associations Hardware APs, Soft APs, Wireless ready laptops Specialty Devices Ad-hoc networks/ Accidental/ Malicious Associations NEW: Rogue detection over the wire without requirement for sensors 1 Highest Risk Innocent Neighbor AP Least Risk Connection to Neighbor AP Rogue AP in my building Connection to Rogue AP & transferring data Rogue AP on My Network Terminate Rogue Devices Policy-based & manual termination Via air or port suppression NEW: Follow devices as they roam 5 Analyze Rogue Connections In-depth analysis of the activity level of each rogue Who was connected to the rogue What/ how much data transmitted NEW: 270 forensic details per device per minute 3 Locate Rogue Devices Real-time accurate location tracking of all devices 4 University of Utah Health Sciences Center “What I love about the latest version of AirDefense is its ability to pinpoint if a rogue is on my network and the ability to do something about it immediately.” …. provides the peace of mind from knowing that we can identify & eliminate all unsanctioned laptops, APs, ad hoc networks & application-specific wireless devices.
4
AirDefense Product Family
Sensors Enterprise Server 3 2 4 Wireless LAN Analyzer Bluetooth Analyzer Mobile Worker Security 6 Site-Survey Tool 5 Complete end-user wireless protection regardless of location Real-time snapshot of local wireless networks Security for Bluetooth devices In-field measurements of environments Accurate, pre-deployment design and simulation of W LANs WLAN Design & Simulation 1 Rogue Detection, Analysis & Mitigation Wireless Intrusion Prevention Operational Support Wireless LAN Security & Monitoring
5
AirDefense Solution
6
AirDefense Functionality
Rogue Threat Management & Mitigation RF Rewind with Forensic Analysis 360º Threat Assessment & Response AirDefense IntelliCenter Mobile Workforce Protection Vulnerability Assessment Operational Performance & Troubleshooting Policy Monitoring & Compliance Management Enterprise-class Scalability with Lowest TCO
7
Mobile Workforce Protection
AirDefense Personal is a small software agent that runs on Windows laptops, monitors for wireless exposures, and notifies the user and AirDefense Personal Central Manager. Continuous protection for mobile users on the road or at their office Ensure that wireless protocols prohibited by your policy are not used Policy Profiles are centrally defined & automatically downloaded each mobile user Alert Logs automatically uploaded to AirDefense Enterprise and central reporting & notification Policy Enforcement (automatic turn-off radio) AirDefense Enterprise Appliance AirDefense Personal Alert Logs Turn OFF Radio Policy Profiles “The best way to prevent this is to download free software from a company called AirDefense. The software will let you know if someone is trying to rip off your wireless information.” “Mobile users could get duped by hackers phishing for credentials or other sensitive information at hotspots and must be protected.”
8
Mobile Workforce Protection
Agent Push Policy profile to individual users Central Manager Enterprise-wide Threat Level Summary Alarms Summary Sort agents by user name, threat level or group Policy Violations Summary
9
AirDefense BlueWatch FEATURES Device by Type Detailed Device Info
Monitors air space for Bluetooth devices & their activities to identify security vulnerabilities Runs on Windows XP and 2000 platforms Versions for Laptops & PDAs available Device by Type FUNCTIONALITY Detailed Device Info Identifies different types of Bluetooth device (E.g. Laptops, PDAs, keyboards and cell phones) Provides key attributes of device (E.g. device class, manufacturer and signal strength) Illustrates communication or connectivity among various devices Identifies services available on each device including network access, fax and audio gateway Rogue Devices - Soft APs, Laptops, Specialty devices Shifting Relationships - Accidental & peer associations Probing stations Threats & Attacks -Identity Theft -DoS -Evolving Threats Exposed Wired Network -Open Back door to Wired Network -Protocol Leakage Network & Device Vulnerabilities -Defaults -Misconfigurations -Crackable Encryption/Authentication Operational Issues -Off-hour activity -Interference -Connectivity Problems "Many of our new company-issued devices are Bluetooth enabled. Although this is a convenience for many of our associates, there is a risk that sensitive data may be compromised. AirDefense BlueWatch provides a monitoring solution that we can use to identify and track how and with whom these devices communicate.”
10
Detect Analyze Locate
AirDefense Mobile Real Time Device Discovery & Connection Analysis Advanced Rogue Management with Threat Indicators Real-time Threat Detection & Alarm Expert Help Advanced Location Tracking Live View for Traffic Analysis Wireless Network Usage Statistics & Health Analysis Capture file playback for off-site analysis and reporting Advanced Diagnostics tools for Troubleshooting Detect Analyze Locate Cost-Optimized, Mobile Security Tool Device Tree Device Count Signal Strength Top Devices & Channels Frames & Bytes Transferred Import Authorized Device List from Enterprise to Mobile Synchronization of authorized & rogue wireless devices for specified locations Rogue Device Information can be imported for problem resolution & device tracking Integrated with AirDefense Enterprise Rogue Devices - Soft APs, Laptops, Specialty devices Shifting Relationships - Accidental & peer associations Probing stations Threats & Attacks -Identity Theft -DoS -Evolving Threats Exposed Wired Network -Open Back door to Wired Network -Protocol Leakage Network & Device Vulnerabilities -Defaults -Misconfigurations -Crackable Encryption/Authentication Operational Issues -Off-hour activity -Interference -Connectivity Problems “… allows us to perform security & performance audits to know exactly what is happening within our wireless domain enabling us to distinguish a rogue connected to the internal network from a benign one."
11
Rapid WLAN Design & Management
AirDefense Architect Complete 3D RF design & simulation of WLANs based on building specific environments Industry leading accuracy to optimize AP & sensor coverage Compare site-survey measurements to expected network performance, enabling real-time design modifications Avoid costly retrofits, minimize deployment costs & increase ROI Rapid WLAN Design & Management Simulation & Optimization Step 4 Import Floor plans Step 1 Matl. Characteristics Step 2 3D Building Step 3
12
Wireless Site Surveys Made Easy Integration with AirDefense Architect
AirDefense Survey Site-survey software for measuring the Wi-Fi RF environment Stores and displays collected measurements within a site-specific model of the facility or campus For all detectable access points, Survey measures: Signal strength (RSSI), Noise levels, SSIDs, Channels Provides rich graphical displays of measurements overlaid onto the map Built on AirDefense Architect’s 2D/3D site-specific modeling and WLAN design technology Available for Microsoft Windows PCs, and uses off-the-shelf Wi-Fi PCMCIA cards as the measurement receiver Wireless Site Surveys Made Easy Measured data collected by AirDefense Survey can be used by AirDefense Architect to further improve simulation accuracy Integration with AirDefense Architect
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.