1 / 12

AirDefense’s Role in Wireless Security

Authorized AP. Barcode Scanner. Hacker. Authorized Station. AirDefense’s Role in Wireless Security. Guards Your Wireless Deployments and Areas without Wireless. Protects End-Users as They Travel. Rogue AP. Probing Laptop. Confidential Data. Corporate Network. Hacker. Hotspot.

Télécharger la présentation

AirDefense’s Role in Wireless Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Authorized AP Barcode Scanner Hacker Authorized Station AirDefense’s Role in Wireless Security Guards Your Wireless Deployments and Areas without Wireless Protects End-Users as They Travel Rogue AP Probing Laptop Confidential Data Corporate Network Hacker Hotspot

  2. Detect Rogue Devices / Associations • Hardware APs, Soft APs, Wireless ready laptops • Specialty Devices • Ad-hoc networks/ Accidental/ Malicious Associations • NEW: Rogue detection over the wire without requirement for sensors 1 5 2 3 4 • Calculate Threat Index • Threat-based Management • NEW: Two additional rogue on network detection methods • Partitioning of Friendly Neighboring Networks unless they become malicious Highest Risk Least Risk Rogue APon MyNetwork Innocent Neighbor AP Rogue AP inmy building University of Utah Health Sciences Center Connection to Neighbor AP Connection toRogue AP & transferring data • Locate Rogue Devices • Real-time accurate location tracking of all devices • Analyze Rogue Connections • In-depth analysis of the activitylevel of each rogue • Who was connected to the rogue • What/ how much data transmitted • NEW: 270 forensic details per device per minute Terminate Rogue Devices • Policy-based & manual termination • Via air or port suppression • NEW: Follow devices as they roam Rogue Threat Management & Mitigation “What I love about the latest version of AirDefense is its ability to pinpoint if a rogue is on my network and the ability to do something about it immediately.” …. provides the peace of mind from knowing that we can identify & eliminate all unsanctioned laptops, APs, ad hoc networks & application-specific wireless devices.

  3. Sensors Enterprise Server Wireless LAN Security & Monitoring • Rogue Detection, Analysis & Mitigation • Wireless Intrusion Prevention • Operational Support 1 Mobile Worker Security Wireless LAN Analyzer Bluetooth Analyzer Complete end-user wireless protection regardless of location Security for Bluetooth devices Real-time snapshot of local wireless networks 2 3 4 Site-Survey Tool WLAN Design & Simulation In-field measurements of 802.11 environments Accurate, pre-deployment design and simulation of W LANs 6 5 AirDefense Product Family

  4. AirDefense Solution

  5. AirDefense Functionality Rogue Threat Management & Mitigation RF Rewind with Forensic Analysis 360º Threat Assessment & Response AirDefense IntelliCenter Mobile Workforce Protection Vulnerability Assessment Operational Performance & Troubleshooting Policy Monitoring & Compliance Management Enterprise-class Scalability with Lowest TCO

  6. Mobile Workforce Protection AirDefense Personal is a small software agent that runs on Windows laptops, monitors for wireless exposures, and notifies the user and AirDefense Personal Central Manager. • Continuous protection for mobile users on the road or at their office • Ensure that wireless protocols prohibited by your policy are not used • Policy Profiles are centrally defined & automatically downloaded each mobile user • Alert Logs automatically uploaded to AirDefense Enterprise and central reporting & notification • Policy Enforcement (automatic turn-off radio) AirDefense Enterprise Appliance AirDefense Personal Turn OFF Radio Policy Profiles Alert Logs “The best way to prevent this is to download free software from a company called AirDefense. The software will let you know if someone is trying to rip off your wireless information.” “Mobile users could get duped by hackers phishing for credentials or other sensitive information at hotspots and must be protected.”

  7. Mobile Workforce Protection Agent Push Policy profile to individual users Central Manager Enterprise-wide Threat Level Summary Alarms Summary Sort agents by user name, threat level or group Policy Violations Summary

  8. AirDefense BlueWatch • Monitors air space for Bluetooth devices & their activities to identify security vulnerabilities • Runs on Windows XP and 2000 platforms • Versions for Laptops & PDAs available FEATURES Device by Type FUNCTIONALITY Detailed Device Info • Identifies different types of Bluetooth device (E.g. Laptops, PDAs, keyboards and cell phones) • Provides key attributes of device (E.g. device class, manufacturer and signal strength) • Illustrates communication or connectivity among various devices • Identifies services available on each device including network access, fax and audio gateway "Many of our new company-issued devices are Bluetooth enabled. Although this is a convenience for many of our associates, there is a risk that sensitive data may be compromised. AirDefense BlueWatch provides a monitoring solution that we can use to identify and track how and with whom these devices communicate.”

  9. Detect  Analyze  Locate • Real Time Device Discovery & Connection Analysis • Advanced Rogue Management with Threat Indicators • Real-time Threat Detection & Alarm Expert Help • Advanced Location Tracking • Live View for Traffic Analysis • Wireless Network Usage Statistics & Health Analysis • Capture file playback for off-site analysis and reporting • Advanced Diagnostics tools for Troubleshooting Device Tree Device Count Frames & Bytes Transferred Integrated with AirDefense Enterprise Signal Strength • Import Authorized Device List from Enterprise to Mobile • Synchronization of authorized & rogue wireless devices for specified locations • Rogue Device Information can be imported for problem resolution & device tracking Top Devices & Channels AirDefense Mobile Cost-Optimized, Mobile Security Tool “… allows us to perform security & performance audits to know exactly what is happening within our wireless domain enabling us to distinguish a rogue connected to the internal network from a benign one."

  10. Rapid WLAN Design & Management • Complete 3D RF design & simulation of WLANs based on building specific environments • Industry leading accuracy to optimize AP & sensor coverage • Compare site-survey measurements to expected network performance, enabling real-time design modifications • Avoid costly retrofits, minimize deployment costs & increase ROI Step 3 3D Building Step 1 Step 2 Import Floor plans Matl. Characteristics Step 4 Simulation & Optimization AirDefense Architect

  11. Wireless Site Surveys Made Easy • Site-survey software for measuring the Wi-Fi RF environment • Stores and displays collected measurements within a site-specific model of the facility or campus • For all detectable access points, Survey measures: • Signal strength (RSSI), Noise levels, SSIDs, Channels • Provides rich graphical displays of measurements overlaid onto the map • Built on AirDefense Architect’s 2D/3D site-specific modeling and WLAN design technology • Available for Microsoft Windows PCs, and uses off-the-shelf Wi-Fi PCMCIA cards as the measurement receiver Integration with AirDefense Architect • Measured data collected by AirDefense Survey can be used by AirDefense Architect to further improve simulation accuracy AirDefense Survey

More Related