AirTight Offers SpectraGuard 5.2

AirTight extended its lead over the rest of WIPS industry by announcing SpectraGuard Enterprise 5.2, the new standard for WIPS functionality

Dark Reading Staff, Dark Reading

February 4, 2007

2 Min Read

MOUNTAIN VIEW, Calif. -- AirTight NetworksT, the leading provider of wireless intrusion prevention solutions, today extended its lead over the rest of WIPS industry by announcing SpectraGuard Enterprise 5.2, the new standard for WIPS functionality. Release 5.2 enhances SpectraGuard's patented wireless threat detection and classification, improves its already more robust threat prevention, augments its highly rated reporting capabilities, and includes FIPS compliance.

The key elements of an effective wireless intrusion prevention system (WIPS) are:

  • detecting and correctly classifying wireless threats - to catch all threats, while minimizing false alarms

  • preventing (multiple, simultaneous) wireless threats - while continuing to scan for new ones

  • accurately locating wireless threats on a floor map - so they can be removed

  • providing a comprehensive reporting capability for compliance and audit purposes

    SpectraGuard Enterprise 5.2 offers new and improved functionality in 3 of these 4 categories, in addition to adopting a FIPS compliant encryption algorithm.

    In the detection and classification area, Release 5.2 enhances SpectraGuard by:

  • offering the industry's best, most granular sensor configuration capabilities - allowing the enterprise to define and group sensors into multiple categories - either geographically and/or functionally. For each of these categories the user specifies which (or all) of 62 different 802.11 channels to monitor - to detect devices and threats across this wireless spectrum. This will allow an enterprise to set different wireless security policies for its data centers in the UK and its retail stores in the US or Asia (as an example).

  • Improving our detection of pre-standard 802.11n APs. Release 5.2 has adapted its algorithms to detect so-called "super-APs" and "turbo-APs" built on Atheros chipsets, as well as "draft-802.11n APs" from multiple vendors, in addition to the "pre-standard 802.11n APs" that we already detect.

AirTight Networks Inc.

About the Author(s)

Dark Reading Staff

Dark Reading

Dark Reading is a leading cybersecurity media site.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like

More Insights