In announcing the latest version of its enterprise software security product Monday, Newbury said it believes it is the first company to use "precise location technology to deliver intrusion prevention, rogue containment, client protection and intrusion detection with a full set of location-specific security alerts, security-related compliance reports and enhanced graphical views for IT/Security personnel to identify and pinpoint security threats."
In an interview, Newbury Networks' director of product management Brian Wangerien said Wi-Fi wireless networks are growing so rapidly that many organizations institute a "no Wi-Fi policy," because they can't control security on wireless networks.
"Many companies aren't ready to deploy Wi-Fi," he said. "Access points can be all over the place. So some start with 'no Wi-Fi' but then they gradually build out." He added that Wi-Fi Watchdog 5.0 enables IT managers to gradually build out their wireless networks. A network of sensors constantly monitors all access points on networks, establishing RF fingerprinting or RF pattern matching solutions. "Each physical location has a different pattern and (network operators) are able to track them very accurately,"
When an unauthorized person attempts to enter the network he or she is blocked and users who wander off from the network are likewise "sniped" from the network.
Wangerien said the Watchdog product has been successfully used by early adopters including the U.S. Air Force and Boston-based MFS, an investment banking firm. In the Air Force application network operators have tight security over wireless access points ranging from commanders' offices to fighter planes. In the MFS application, control easily moves from different floors, even when non-MFS floors interspersed between MFS offices different floors.
The server-based software Wi-Fi Watchdog 5.0 can stop threats that aren't addressed by authentication and encryption technologies. Wi-Fi Watchdog has long been able to classify the nature of attacks, but by identifying the physical location of attacks, the measure can eliminate false positives in most attacks, the firm noted.
"IT and security personnel can visualize where the threats and attacks are originating in an easy-to-use graphical viewer," Newbury stated. "These alerts and threats are displayed through icons on the actual floor plan within the facility " pinpointing exactly where the attack occurs down to the particular room on a particular floor."