Wireless Security

With the increased use of mobile technologies and wireless networking organizations are forced to deploy wireless network security systems to protect their networks and users from malicious activity.

SecurEdge builds wireless security solutions that protect the network against wireless threats by incorporating wireless intrusion protection into the network infrastructure. Our solutions provide unmatched wireless network visibility to administrators, and thwarts malicious wireless attacks, impersonations, and intrusions.

SecurEdge Offers:

Integrated Wireless Intrusion or Dedicated Wireless Intrusion Prevention- Clients can choose an integrated wireless intrusion detection and prevention platform to reduce deployment costs and management. Or they can augment an existing wireless deployment with dedicated sensors for IDS/IPS.

Automatic Wireless Threat Protection
- Automatic threat mitigation protects the network from unauthorized clients and ad hoc networking by continuously scanning the network environment, centrally evaluating forensic data, and actively containing rogue access points and locking down device configuration.

Custom Built Security Policies to fit the organizations criteria and security levels.
Customizable security policies allow the flexibility to define organization-specific security policies by criteria such as location, device or configuration.

Automated compliance reporting
- SecurEdge provides automated compliance reporting to meet industry required mandates for PCI, HIPAA, DoD 8100.2, and GBLA which includes fully automated report distribution that is tailored to specific audit requirements.

Wireless Protection For Every Situation.

Intrusion Protection

  • Wireless Intrusion Detection
  • Wireless Intrusion Prevention
  • Client intrusion prevention
  • Denial-of-service (DOS) attack prevention

Rogue AP Protection

  • Rogue threat detection
  • Rogue identification and containment
  • Rule-based rogue classification
  • Wireless containment via tarpitting

Automated Scanning

  • Monitor 2.4-, 4.9- and 5-GHz bands
  • WLAN scanning
  • Granular 5-MHz channel scanning
  • Dynamic dwell times to focus on channels with traffic

Location Tracking

  • Locate Rogue AP's and devices
  • Track assets
  • Locate unauthorized devices

Compliance Reporting

  • Report customization
  • Notifications & Alerts
  • Log assessment

Request a Security Assessment.

Our security experts will discover any areas of improvement in your network security.

Request an Assessment