Spec Sheet
AIRDEFENSE SOLUTIONS
SECURITY AND COMPLIANCE SOLUTION
4
DISABLE ROGUE DEVICES
Unauthorized devices can behave like a master key to your offices – a single
rogue access point can give an attacker full access to your internal network,
bypassing traditional wired network security controls. The AirDefense Security
and Compliance solution can identifiy and automatically disconnect any rogue
device. By analyzing wireless traffic, the system prioritizes the level of threat that
a potential rogue poses, so your administrators can deal with the most serious
dangers first. While less sophisticated intrusion prevention systems might disable
a neighboring access point by mistake, the AirDefense solution is accurate and
reliable, protecting you against both unwanted intrusion on your network and
unwarranted intrusion on someone else’s.
INVESTIGATE AND ANALYZE
Often, the real impact of a security threat is revealed not in a single significant
event, but in a series of small ones – like a burglar quietly walking around
your building, checking whether all the windows are locked. When it comes
time for forensic investigation of network security, the AirDefense Security
and Compliance solution makes the detective work easier.
The system stores important information such as channel activity, signal
characteristics, device activity and traffic flow – in all, more than 325 data
points per wireless device, per connection, per minute, so you can trace back
through months of history on a device only recently found to be suspicious.
Instead of physically visiting sites, your administrators can investigate
remotely, rewinding and reviewing minute-by-minute records of connectivity
and communication on your network. So investigations that might once have
required hours can be completed in just minutes.
ASSESS VULNERABILITIES
To truly harden your wireless network against malicious attacks, look at it
closely through an attacker’s eyes. The Wireless Vulnerability Assessment
module is a patented testing technology that simulates attacks from a wireless
hacker’s point-of-view. Its extensive scan features lets you validate firewall
and wireless switch policies, while also helping you identify paths of entry to
sensitive wired systems that might be exposed through your wireless network.
The assessment technology works remotely and satisfies requirements
for regulatory compliance, so you can save the costs of sending personnel
or consultants to remote offices and stores to manually conduct required
security audits. Configured to run automatically or on demand, the
assessments can be customized with blacklists to target networks or devices,
validating what should or should not be accessible from the wireless side.
By routinely and automatically assessing potential vulnerability, you can
proactively fortify the security of all your information assets, wired and
wireless, across your entire enterprise.
SECURE LEGACY INFRASTRUCTURE
Wireless security protocols have evolved significantly over time. So some
devices in your wireless infrastructure may not offer the same level of
protection as the rest of your network. The Motorola AirDefense WEP
Cloaking module provides protection for wireless infrastructure secured by
legacy encryption protocols.
Motorola AirDefense WEP Cloaking is the first and only patented technology
to protect retailers and other organizations using the Wired Equivalent Privacy
(WEP) security standard to protect networks from common attempts used to
crack encryption keys. Leveraging the Motorola AirDefense Services Platform,
the WEP Cloaking module uses the same sensors to continuously protect
access points, laptops and portable data terminals, in use by many retailers,
from passive and active attempts to crack WEP encryption keys.
Department of Defense
Directive 8100.2:
The Department of Defense
Directive 8100.2 establishes
policy and assigns responsibilities
for the use of commercial wireless
devices, services and technologies
in the DoD Global Information
Grid. It spells out policies for
deploying secure wireless networks
and requires monitoring of those
wireless networks for compliance.
MEETING COMPLIANCE
STANDARDS FOR RETAIL
Payment Card Industry Data
Security Standard (PCI DSS):
Retailers are subject to
mandates of the Payment
Card Industry (PCI). PCI DSS
requires that card holder
environments change wireless
defaults (passwords, SSIDs,
WEP keys, etc.), analyze and
identify all wireless devices,
restrict physical access to
wireless devices, log wireless
activity and define wireless
usage policies.
MEETING COMPLIANCE STANDARDS FOR
FEDERAL AGENCIES