Motorola Introduces Wireless LAN Security Solution for Remote Wireless Security Testing
Wireless vulnerability assessment solution helps protect wireless networks from outside threats, reduces third-party consultation costs, and ensures regulatory compliance and reporting
August 21, 2009
PRESS RELEASE
SCHAUMBURG, Ill., Aug. 18 -- The Enterprise Mobility Solutions business of Motorola, Inc. (NYSE: MOT) , today announced the Motorola AirDefense Wireless Vulnerability Assessment solution, a patented wireless security technology aimed at proactively assessing the security posture of wireless networks. This innovative solution provides a completely new method to secure wireless networks against real-world threats by introducing active wireless testing capable of evaluating every deployed wireless access point. Through this revolutionary approach, the Wireless Vulnerability Assessment solution enables IT administrators to remotely find and secure vulnerabilities in their wireless network and automates regulatory compliance reporting, helping customers reduce operating expenses, streamline reporting and increase the resiliency of their wireless networks.
"It's sad but true that the threats against wireless LAN systems are evolving just as rapidly as the underlying wireless and system technologies," said Craig Mathias, a Principal with the wireless and mobile advisory firm Farpoint Group (Ashland, MA). "It's clear that as wireless LANs take on an ever-greater role in mission-critical enterprise, government, and commercial applications, innovative, cost-effective techniques for the proactive and efficient detection, analysis, and remediation of a broad range of threats are essential to long-term success. That's why this announcement is so interesting and exciting - the Motorola AirDefense Wireless Vulnerability Assessment solution brings intelligence and automation to this difficult but vital requirement."
By simulating active attacks from a hacker's point-of-view, the Motorola AirDefense Wireless Vulnerability Assessment solution allows administrators to proactively assess the security of sensitive systems on the wireless network, such as cardholder data systems. The automated Wireless Vulnerability Assessment technology avoids the need to send personnel or consultants to remote offices and stores to manually conduct testing required for PCI DSS 1.2 compliance.
"The ability to test for vulnerabilities across all elements of our network perimeter is critical to ensuring our information and computing resources remain safe," said Jasyn Voshell, enterprise security manager, Textron, Inc. "The Wireless VA tool from Motorola will help in assessing how well perimeter controls are operating and allow validation of this across all our wireless networks."
Featuring an innovative and patented wireless testing technology (US Patent 7,577,424), the Motorola AirDefense Wireless Vulnerability Assessment solution enables security managers to validate the protection of their sensitive systems from users of the wireless network and would-be intruders. Its extensive scan features enables them to validate firewall and wireless switch policies, while also offering unparalleled discovery options to enumerate multiple paths of entry to sensitive systems on the wired side.
Motorola AirDefense Wireless Vulnerability Assessment is an add-on module to the Motorola AirDefense Enterprise Wireless Intrusion Prevention System (Wireless IPS). Leveraging the same sensors used to provide Wireless IPS functionality, customers can simply purchase a Vulnerability Assessment software license for each sensor deployed. By utilizing the radio of the wireless sensor to simulate a wireless client station, the solution enables IT administrators to conduct wireless vulnerability assessments remotely and from a hacker's point of view. Configured to run automatically or on demand, the assessments can be customized to target networks or devices to validate what should or should not be accessible from the wireless side.
"Motorola's long-standing history of innovation in wireless LAN and wireless security technologies continues with yet another industry first," said Amit Sinha, fellow and chief technologist, Enterprise Wireless LAN, Motorola Enterprise Mobility Solutions. "Revolutionizing the method of conducting vulnerability assessments by providing a proactive and comprehensive assessment of wireless security without the need to send assessors to every site, the Wireless Vulnerability Assessment solution gives enterprises the confidence they need to deploy wireless in even the most sensitive networks."
Motorola offers a comprehensive portfolio of WLAN infrastructure solutions designed to enable the truly wireless enterprise, regardless of the size of the business -- from large enterprises with locations all over the world to branch offices and small businesses. Delivering Internet protocol (IP) coverage to virtually all spaces both indoors and outdoors, Motorola's innovative wireless enterprise portfolio includes fixed broadband, mesh, enterprise WLAN and Motorola AirDefense wireless security solutions. With time-proven resiliency, security and performance equal to or greater than that of a wired network, Motorola's solutions substantially reduce network deployment and maintenance costs, and ensure the availability of cost-effective wireless connectivity in every corner of the enterprise. The result is the truly wireless enterprise -- offering full mobility at a fraction of the cost of a traditional wired network.
About Motorola Motorola is known around the world for innovation in communications and is focused on advancing the way the world connects. From broadband communications infrastructure, enterprise mobility and public safety solutions to high-definition video and mobile devices, Motorola is leading the next wave of innovations that enable people, enterprises and governments to be more connected and more mobile. Motorola (NYSE: MOT) had sales of US $30.1 billion in 2008. For more information, please visit www.motorola.com.
________________________________________
You May Also Like
A Cyber Pros' Guide to Navigating Emerging Privacy Regulation
Dec 10, 2024Identifying the Cybersecurity Metrics that Actually Matter
Dec 11, 2024The Current State of AI Adoption in Cybersecurity, Including its Opportunities
Dec 12, 2024Cybersecurity Day: How to Automate Security Analytics with AI and ML
Dec 17, 2024The Dirt on ROT Data
Dec 18, 2024