Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


10:00 AM
Dark Reading
Dark Reading
Products and Releases

Fluke Networks Makes Dynamic Responses to Wireless Threats and True No-Wireless Zones Realities with New Capabilities in AirMagnet Enterprise

For the organizations that need it most, AirMagnet Enterprise provides nonstop detection, location, alerting, mitigation and reporting on cellular and Wi-Fi security breaches

SANTA CLARA, Calif. – February 11, 2015 – Last year, hackers stole roughly 81.5 million records while carrying out more than 740 confirmed data breaches. Many of the attacks targeted household name brands, costing the global economy up to $575 billion annually*, and destroying consumer confidence—all while each company believed its data were secure. To combat this ever-growing threat, Fluke Networks today announced a major upgrade to its market-leading AirMagnet Enterprise wireless security solution. With timely dynamic threat updates, location tracking, and alerting of cellular or Wi-Fi devices, AirMagnet Enterprise is the first wireless intrusion detection and prevention (WIDS/WIPS) solution that enables enterprises and agencies to enforce a 24x7 “No-Wireless” zone. It also helps organizations meet stringent new PCI 3.0 compliance standards, includes a captive portal support for assuring guest wireless networks, and provides 802.11ac detection, location, and blocking of rogue devices.  

As mobile data, mobile devices and security breaches continue their stratospheric climb, the ability to immediately identify all rogue wireless activities, regardless of network type, and enforce a “No-Wireless” zone is critical for organizations that deal with sensitive information and need to secure their vital data centers. AirMagnet Enterprise provides complete unified wireless (802.11a/b/g/n/ac) and cellular (3G, 4G LTE, CDMA) spectrum security across the entire wireless network infrastructure.

David Coffin, CTO of Fluke Networks explains, “AME’s improved event detection helps IT teams actively identify, locate and mitigate cellular and Wi-Fi security threats such as unauthorized cellular and Wi-Fi devices and jammers. It also enforces the implementation of a ‘wireless free zone’. Security and network operations not only have to contend with the inherent dangers and performance impacts of BYOD on their networks, but also the very real risk of espionage, hacking and malicious attacks from inside or outside their corporate boundaries. AirMagnet Enterprise delivers powerful new security capabilities to help IT combat these evolving threats.”


How to mitigate the consequences of “good enough" wireless protection

No organization deliberately ignores security threats, but many believe their precautions are “good enough.” They rely on the security features of access points or other wireless infrastructure components, which are incapable of detecting all types of threats across every channel. The good-enough approach presents several challenges—all of which can be overcome with AirMagnet Enterprise:

Inadequate threat detection - Most access point security features perform only part-time scans of 44 standard Wi-Fi channels, when there are 201 non-standard extended channels where threats can hide

AirMagnet scans all  245 Wi-Fi channels,  protects against more than 230 threats, and rapidly identifies and reacts to security and performance problems

Lengthy threat update cycles – Access Point solutions require firmware updates to respond to new threats, often taking months to release. They also require downtime to install, creating significant security gaps

AirMagnet includes Dynamic Threat Update technology, which enables rapid response to new threat signatures (e.g., AME was the first to provide threat protection for the Enterprise Honeypot AP threat in January 2015) often within 24 hours of identification.

Limited Performance Reporting – Many wireless security solutions provide only cryptic reporting that’s hard to decipher before taking action—increasing the burden on an already overloaded IT administrator

AirMagnet ‘s unique Automated Health Check (AHC) verifies the live client wireless environment for the entire WLAN connection path. It instantly pinpoints outages and slowdowns before users are affected, ultimately eliminating finger pointing and reducing time to resolution.

Minimal forensic analysis – It’s not enough to know a security breach has occurred. IT teams need detailed forensics to identify the root cause and eliminate it fast

AirMagnet offers remote forensic packet capture at the point of event trigger,  which eliminates costly truck rolls and helps IT teams rapidly analyze and archive the exact packet trace which caused the alarm

Hidden monitoring gaps – Many wireless environments comprise multiple access point types and incompatible security features, creating holes in what the IT team believes is a comprehensive security system

AirMagnet works in hybrid wireless architecture environments, which eliminates security gaps and integration issues between disparate APs.

AirMagnet Enterprise also helps organizations that access, store or transmit cardholder data (CHD) and personally identifiable information (PII) by meeting the latest PCI 3.0 regulatory requirements for penetration testing, which went into effect on January 1, 2015.

“As we’ve seen with recent attacks, companies risk long-term damage to their brand and reputation, as well as immediate lost productivity and revenue without thorough detection and mitigation of security threats,” said Coffin. “AirMagnet Enterprise gives organizations the most comprehensive set of wireless security monitoring and protection tools available for IT and security professionals to protect their respective organizations and their customers. Wireless is impossible to see – AME makes our customers’ wireless networks protected and visible to them.”

For complete product details please visit the AirMagnet Enterprise page.


* Center for Strategic and International Studies, Net Losses: Estimating the Global Cost of Cybercrime, June 2014 http://www.mcafee.com/us/resources/reports/rp-economic-impact-cybercrime2.pdf


About Fluke Networks

Fluke Networks is the world-leading provider of network test and monitoring solutions to speed the deployment and improve the performance of networks and applications. Leading enterprises and service providers trust Fluke Networks’ products and expertise to help solve today’s toughest issues and emerging challenges in WLAN security, mobility, unified communications and data centers. Based in Everett, Wash., the company distributes products in more than 50 countries. For more information, visit http://www.FlukeNetworks.com or call +1 (425) 446-4519.

For additional information and updates, follow Fluke Networks on social media.

Twitter: https://twitter.com/FlukeNetWIFI

Facebook: https://www.facebook.com/pages/AirMagnet/44054111550?ref=br_tf

LinkedIn: http://www.linkedin.com/company/fluke-networks

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Look Beyond the 'Big 5' in Cyberattacks
Robert Lemos, Contributing Writer,  11/25/2020
Why Vulnerable Code Is Shipped Knowingly
Chris Eng, Chief Research Officer, Veracode,  11/30/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: I think the boss is bing watching '70s TV shows again!
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-12-02
CAPI (Cloud Controller) versions prior to 1.101.0 are vulnerable to a denial-of-service attack in which an unauthenticated malicious attacker can send specially-crafted YAML files to certain endpoints, causing the YAML parser to consume excessive CPU and RAM.
PUBLISHED: 2020-12-02
Editors/LogViewerController.cs in Umbraco through 8.9.1 allows a user to visit a logviewer endpoint even if they lack Applications.Settings access.
PUBLISHED: 2020-12-02
A security vulnerability has been identified in the HPE Edgeline Infrastructure Manager, also known as HPE Edgeline Infrastructure Management Software. The vulnerability could be remotely exploited to bypass remote authentication leading to execution of arbitrary commands, gaining privileged access,...
PUBLISHED: 2020-12-02
HCL Domino is susceptible to a Buffer Overflow vulnerability in DXL due to improper validation of user input. A successful exploit could enable an attacker to crash Domino or execute attacker-controlled code on the server system.
PUBLISHED: 2020-12-02
An out-of-bounds memory write flaw was found in how the Linux kernel’s Voice Over IP H.323 connection tracking functionality handled connections on ipv6 port 1720. This flaw allows an unauthenticated remote user to crash the system, causing a denial of service. The highest threat ...