Diagnostic analysis solution WISAS Vulnerability Diagnosis
Spline Network
About This Product
It prevents visualization and optimization support for comfortably use the Wi-Fi environment, and prevents information leakage due to unauthorized and cyber attacks.
By acquiring radio waves of wireless network (Wi-Fi) and analyzing from six security viewpoints, visualize vulnerabilities and problems hidden in the Wi-Fi environment, and prevent threats.
It is also possible to eliminate threats using location analysis (options).
You can see the dangerous Wi-Fi use that is directly linked to the information leak.
A WISAS sensor is installed in the target area, and the survey and analysis are performed from a security perspective by visualizing the Wi-Fi usage status.
Main examples discovered in WISAS vulnerability diagnosis
・ In the important security area, multiple tethering with non -control (private) smartphones are detected
・ Multiple detection of portable Wi-Fi that is not managed (private), the communication destination is a personal cloud storage
・ A certain manufacturer discovered a ultra -small AP connected to the internal network, and it turned out that it was a cause of confidential information leakage from the surveillance camera.
・ It is a regular wireless AP, which detects the existence of honey pot AP and confirms that the regular PC was incorrectly connected.
・ Multiple detection of Wi-Fi Direct that has been enabled intentionally (printer, scanner, etc.)
・ In the data center, the Wi-Fi of the enabled telephone router was detected, and the PWD was default, so it was easy to invade.
・ Discover multiple enabled AP despite outside working hours
Survey and sufficient survey and analysis items to understand the actual situation of Wi-Fi security
The WISAS vulnerability diagnostic service is basically a 24 -hour 1shot service, but its survey analysis is identified from the following six perspectives and security risks.
Vulnerability diagnostic item
◆ Non -approved terminal
Detects the non -licensed terminal (external / uncategorized * 1) connected to the approved AP.
◆ Fraud device
It detects that the licensed terminal has been connected to a non -licensed AP (external / uncategorized / guest).
◆ Narimori AP
Detects the existence of the same SSID as the approved AP.
◆ Mac disguised AP
Detects the existence of the AP disguised as the same Mac Address as the approved AP.
◆ Wi-Fi Direct AP
Detects the AP that transmits the radio wave of Wi-Fi Direct. There are mainly printers, scanners, projectors, etc., but it is one of the intrusion tricks.
◆ Hacking device
Detects dangerous hacking devices that intercept the surrounding Wi-Fi radio waves.
◆ Wireless DOS attack analysis (optional)
Detects a cyber attack that sends a large amount of wireless frames to approved AP and licensed terminals.
◆ Location information analysis (optional)
3 or more sensors are installed in the target area to identify the position of the unauthorized AP and terminals in the principle of three -point surveying.
* 1 Uncategorized is AP and terminals that are no longer detected within 10 minutes after detection. For short-term use and passing radio waves, such as drive recorders and bus Wi-Fi, are not classified.
-
-
Product
Diagnostic analysis solution WISAS Vulnerability Diagnosis