AirTight extended its lead over the rest of WIPS industry by announcing SpectraGuard Enterprise 5.2, the new standard for WIPS functionality
MOUNTAIN VIEW, Calif. -- AirTight NetworksT, the leading provider of wireless intrusion prevention solutions, today extended its lead over the rest of WIPS industry by announcing SpectraGuard Enterprise 5.2, the new standard for WIPS functionality. Release 5.2 enhances SpectraGuard's patented wireless threat detection and classification, improves its already more robust threat prevention, augments its highly rated reporting capabilities, and includes FIPS compliance.
The key elements of an effective wireless intrusion prevention system (WIPS) are:
detecting and correctly classifying wireless threats - to catch all threats, while minimizing false alarms
preventing (multiple, simultaneous) wireless threats - while continuing to scan for new ones
accurately locating wireless threats on a floor map - so they can be removed
providing a comprehensive reporting capability for compliance and audit purposes
SpectraGuard Enterprise 5.2 offers new and improved functionality in 3 of these 4 categories, in addition to adopting a FIPS compliant encryption algorithm.
In the detection and classification area, Release 5.2 enhances SpectraGuard by:
offering the industry's best, most granular sensor configuration capabilities - allowing the enterprise to define and group sensors into multiple categories - either geographically and/or functionally. For each of these categories the user specifies which (or all) of 62 different 802.11 channels to monitor - to detect devices and threats across this wireless spectrum. This will allow an enterprise to set different wireless security policies for its data centers in the UK and its retail stores in the US or Asia (as an example).
Improving our detection of pre-standard 802.11n APs. Release 5.2 has adapted its algorithms to detect so-called "super-APs" and "turbo-APs" built on Atheros chipsets, as well as "draft-802.11n APs" from multiple vendors, in addition to the "pre-standard 802.11n APs" that we already detect.
About the Author(s)
You May Also Like
The fuel in the new AI race: Data
April 23, 2024Securing Code in the Age of AI
April 24, 2024Beyond Spam Filters and Firewalls: Preventing Business Email Compromises in the Modern Enterprise
April 30, 2024Key Findings from the State of AppSec Report 2024
May 7, 2024Is AI Identifying Threats to Your Network?
May 14, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024