AirTight Networks Offers Service To Protect Wireless Networks From Attacks - InformationWeek
IoT
IoT
News
News
5/25/2005
02:55 PM
50%
50%
RELATED EVENTS
Building Security for the IoT
Nov 09, 2017
In this webcast, experts discuss the most effective approaches to securing Internet-enabled system ...Read More>>

AirTight Networks Offers Service To Protect Wireless Networks From Attacks

Businesses could be harboring rogue access points or unauthorized client connections to neighboring networks without realizing it, AirTight's CEO and chairman says.

Protecting wireless networks against security breaches and other vulnerabilities is a top priority for many businesses. In response, AirTight Networks Inc. introduced a service Wednesday to help businesses identify threats against their Wi-Fi networks, such as rogue access points and clients, ad hoc networks, and denial-of-service attacks.

"CIOs are becoming more aware about security and accessing corporate systems through wireless networks," Yankee Group analyst Roberta Wiggins says. But whether they have Wi-Fi networks or not, businesses could be harboring rogue access points or unauthorized client connections to neighboring networks without realizing it, says David King, AirTight's CEO and chairman.

To increase awareness among businesses about what's happening inside their networks, AirTight launched its free trial Wireless Threat Vulnerability Analysis service. As part of the service, AirTight systems engineers will perform an assessment of a company's networks and will remove any existing rogue access points or unauthorized client connections through AirTight's firewall and performance-management software, SpectraGuard Enterprise 3.0, which AirTight is selling for $7,500.

Additionally, AirTight will simulate Wi-Fi attacks, such as man-in-the-middle, Evil Twin, and denial of service, to analyze network response. The vendor also will provide recommendations for strengthening network security against Wi-Fi vulnerabilities.

AirTight is trying to raise awareness about the importance of site planning, which can help prevent hacking into corporate wireless networks and the potential loss of confidential data. King says: "We believe that if you've had a rogue access point, or are afraid you have them and don't know about them, you'll want to know where they are in your building."

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
2017 State of IT Report
In today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking the balance between new initiatives and cost control? Download our report to learn about the biggest challenges and how savvy IT executives are overcoming them.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll