🚗
Automotive & Transport Use
💻
Electronics & Electrical Use
🏥
Medical Industry Use
This product is registered by Spline Network.
About This Product
It is a service that focuses on the Wi-Fi, especially in the WISAS surveillance solution. The wireless network (Wi-Fi) environment automatically detects security threats with two elements, radio strength and staying time, 24 hours a day, 365 days a year, and protects important corporate data. It is also possible to automatically block threats by setting. If a non -control wild AP is discovered, an alert will be issued.
Always monitor the use of wild Wi-Fi that is directly linked to information leaks
・ Installed AP: List of unidentified wireless APs that are always installed and connected devices
・ Temporary use AP: List of unidentified wireless APs used temporarily, usage history, and connected terminals
According to the ranking of the "Information Security 10 Great Threat", which is announced every year by the IPA (Independent Administrative Agency), [Information Leakage due to internal fraud] has been ranked 8th in 2018, 5th in 2019, and 2020 in 2020.
In the past, most of the information leakage using external memory, printed matter, or wired networks was mostly, but recently, the increase in colona dismissal has increased the information leakage using "stray AP" as a whole, such as the tethering of unauthorized private smartphones and the brought pocket Wi-Fi.
WISAS NORA continues to monitor the dangerous "stray AP" 24 hours a day, 365 days a year.
WISAS classifies all Wi-Fi devices into the following three groups:
1. Safe list (approved, guest): List of devices on the Device of the AP / device that does not need to be vigilant
2. block list (fraud): Obviously malicious, list of devices that do not want to operate in the target network
3. Unconfirmed list (external, uncategorized): List of devices that have not been sorted and blocked
In order to ensure Wi-Fi security, it is necessary to thoroughly sort unconfirmed devices, do not allow block devices, and have a clean environment that allows communication only for communication.
As a future operation, new regular Wi-Fi devices required for business will only be registered as safe and permit communication. This is the "Wi-Fi security management method" advocated by WISAS.
In addition, the journal result can be used as a Wi-Fi device management database.
-
-
Product
Always monitoring solution WISAS NORA
-
-
Usage Scenarios
Automotive & Transport Use
/
Electronics & Electrical Use
/
Medical Industry Use
Share this product