Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


10:00 AM
Dark Reading
Dark Reading
Products and Releases

Fluke Networks Makes Dynamic Responses to Wireless Threats and True No-Wireless Zones Realities with New Capabilities in AirMagnet Enterprise

For the organizations that need it most, AirMagnet Enterprise provides nonstop detection, location, alerting, mitigation and reporting on cellular and Wi-Fi security breaches

SANTA CLARA, Calif. – February 11, 2015 – Last year, hackers stole roughly 81.5 million records while carrying out more than 740 confirmed data breaches. Many of the attacks targeted household name brands, costing the global economy up to $575 billion annually*, and destroying consumer confidence—all while each company believed its data were secure. To combat this ever-growing threat, Fluke Networks today announced a major upgrade to its market-leading AirMagnet Enterprise wireless security solution. With timely dynamic threat updates, location tracking, and alerting of cellular or Wi-Fi devices, AirMagnet Enterprise is the first wireless intrusion detection and prevention (WIDS/WIPS) solution that enables enterprises and agencies to enforce a 24x7 “No-Wireless” zone. It also helps organizations meet stringent new PCI 3.0 compliance standards, includes a captive portal support for assuring guest wireless networks, and provides 802.11ac detection, location, and blocking of rogue devices.  

As mobile data, mobile devices and security breaches continue their stratospheric climb, the ability to immediately identify all rogue wireless activities, regardless of network type, and enforce a “No-Wireless” zone is critical for organizations that deal with sensitive information and need to secure their vital data centers. AirMagnet Enterprise provides complete unified wireless (802.11a/b/g/n/ac) and cellular (3G, 4G LTE, CDMA) spectrum security across the entire wireless network infrastructure.

David Coffin, CTO of Fluke Networks explains, “AME’s improved event detection helps IT teams actively identify, locate and mitigate cellular and Wi-Fi security threats such as unauthorized cellular and Wi-Fi devices and jammers. It also enforces the implementation of a ‘wireless free zone’. Security and network operations not only have to contend with the inherent dangers and performance impacts of BYOD on their networks, but also the very real risk of espionage, hacking and malicious attacks from inside or outside their corporate boundaries. AirMagnet Enterprise delivers powerful new security capabilities to help IT combat these evolving threats.”


How to mitigate the consequences of “good enough" wireless protection

No organization deliberately ignores security threats, but many believe their precautions are “good enough.” They rely on the security features of access points or other wireless infrastructure components, which are incapable of detecting all types of threats across every channel. The good-enough approach presents several challenges—all of which can be overcome with AirMagnet Enterprise:

Inadequate threat detection - Most access point security features perform only part-time scans of 44 standard Wi-Fi channels, when there are 201 non-standard extended channels where threats can hide

AirMagnet scans all  245 Wi-Fi channels,  protects against more than 230 threats, and rapidly identifies and reacts to security and performance problems

Lengthy threat update cycles – Access Point solutions require firmware updates to respond to new threats, often taking months to release. They also require downtime to install, creating significant security gaps

AirMagnet includes Dynamic Threat Update technology, which enables rapid response to new threat signatures (e.g., AME was the first to provide threat protection for the Enterprise Honeypot AP threat in January 2015) often within 24 hours of identification.

Limited Performance Reporting – Many wireless security solutions provide only cryptic reporting that’s hard to decipher before taking action—increasing the burden on an already overloaded IT administrator

AirMagnet ‘s unique Automated Health Check (AHC) verifies the live client wireless environment for the entire WLAN connection path. It instantly pinpoints outages and slowdowns before users are affected, ultimately eliminating finger pointing and reducing time to resolution.

Minimal forensic analysis – It’s not enough to know a security breach has occurred. IT teams need detailed forensics to identify the root cause and eliminate it fast

AirMagnet offers remote forensic packet capture at the point of event trigger,  which eliminates costly truck rolls and helps IT teams rapidly analyze and archive the exact packet trace which caused the alarm

Hidden monitoring gaps – Many wireless environments comprise multiple access point types and incompatible security features, creating holes in what the IT team believes is a comprehensive security system

AirMagnet works in hybrid wireless architecture environments, which eliminates security gaps and integration issues between disparate APs.

AirMagnet Enterprise also helps organizations that access, store or transmit cardholder data (CHD) and personally identifiable information (PII) by meeting the latest PCI 3.0 regulatory requirements for penetration testing, which went into effect on January 1, 2015.

“As we’ve seen with recent attacks, companies risk long-term damage to their brand and reputation, as well as immediate lost productivity and revenue without thorough detection and mitigation of security threats,” said Coffin. “AirMagnet Enterprise gives organizations the most comprehensive set of wireless security monitoring and protection tools available for IT and security professionals to protect their respective organizations and their customers. Wireless is impossible to see – AME makes our customers’ wireless networks protected and visible to them.”

For complete product details please visit the AirMagnet Enterprise page.


* Center for Strategic and International Studies, Net Losses: Estimating the Global Cost of Cybercrime, June 2014 http://www.mcafee.com/us/resources/reports/rp-economic-impact-cybercrime2.pdf


About Fluke Networks

Fluke Networks is the world-leading provider of network test and monitoring solutions to speed the deployment and improve the performance of networks and applications. Leading enterprises and service providers trust Fluke Networks’ products and expertise to help solve today’s toughest issues and emerging challenges in WLAN security, mobility, unified communications and data centers. Based in Everett, Wash., the company distributes products in more than 50 countries. For more information, visit http://www.FlukeNetworks.com or call +1 (425) 446-4519.

For additional information and updates, follow Fluke Networks on social media.

Twitter: https://twitter.com/FlukeNetWIFI

Facebook: https://www.facebook.com/pages/AirMagnet/44054111550?ref=br_tf

LinkedIn: http://www.linkedin.com/company/fluke-networks


Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
'BootHole' Vulnerability Exposes Secure Boot Devices to Attack
Kelly Sheridan, Staff Editor, Dark Reading,  7/29/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-08-05
LimeSurvey 4.3.2 allows reflected XSS because application/controllers/LSBaseController.php lacks code to validate parameters.
PUBLISHED: 2020-08-05
USVN (aka User-friendly SVN) before 1.0.9 allows XSS via SVN logs.
PUBLISHED: 2020-08-05
IBM UrbanCode Deploy (UCD),,, and is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 181848.
PUBLISHED: 2020-08-05
CAMS for HIS CENTUM CS 3000 (includes CENTUM CS 3000 Small) R3.08.10 to R3.09.50, CENTUM VP (includes CENTUM VP Small, Basic) R4.01.00 to R6.07.00, B/M9000CS R5.04.01 to R5.05.01, and B/M9000 VP R6.01.01 to R8.03.01 allows a remote unauthenticated attacker to bypass authentication and send altered c...
PUBLISHED: 2020-08-05
Directory traversal vulnerability in CAMS for HIS CENTUM CS 3000 (includes CENTUM CS 3000 Small) R3.08.10 to R3.09.50, CENTUM VP (includes CENTUM VP Small, Basic) R4.01.00 to R6.07.00, B/M9000CS R5.04.01 to R5.05.01, and B/M9000 VP R6.01.01 to R8.03.01 allows a remote unauthenticated attacker to cre...