Airtight WIPS non-controller architecture Enterprise Wireless network security solution

Source: Internet
Author: User

airtight WIPS650) this.width=650; "Src=" http://s3.51cto.com/wyfs02/M02/6C/76/ Wkiom1vju1hbxnasaab0rvstraq709.jpg "style=" float:right; "title=" QQ picture 20150506145158.png "alt=" Wkiom1vju1hbxnasaab0rvstraq709.jpg "/>

Infrastructure attacks on wireless local area networks (WLANs) are one of the most important and immediate threats to the current enterprise network. To make things worse, the demand for Wi-Fi for personal smartphones and tablets is hitting businesses like floods, inadvertently violating network security boundaries and risking organizations that don't have wireless deployments. Airtight WIPs provides enterprises with continuous and comprehensive protection against current and emerging wireless threats.

Gartner evaluates to "Strong Positive"

Airtight has been named the industry's best wireless Intrusion Prevention system (WIPS), in Gartner's annual Wireless LAN IPs market assessment Report, airtight for many years to obtain the highest rating "special affirmation", And airtight is also the only supplier on the top of the Gartner wireless IPs evaluation. Easy-to-use, automated device classification, accurate threat detection, and reliable threat defense make Airtight's wips/wids solutions ahead of other competitors. Relying on extraordinary wireless intrusion detection and protection patented technology, airtight WIPs provides the enterprise's wireless environment with full-day visibility and complete protection.

Automatic equipment classification 650) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M00/6C/76/wKiom1VJu2HhtgWzAABfAmUFm3k561.jpg "style=" Float:right, "title=" QQ picture 20150506145251.jpg "alt=" Wkiom1vju2hhtgwzaabfamufm3k561.jpg "/>

With Airtight's patented tag grouping technology, WIPs can automatically and quickly divide wireless devices in Wi-Fi environments into three categories, such as authorization (Authorized), Rogue (Rogue), and external (External). As a result, he eliminates false positives and eliminates the ability of security administrators to use complex rules to identify rogue wireless devices or hand-tested work. This is different from the error-prone device classification technology of most WLAN solutions, which relies on slow and uncertain cam table lookup and MAC address correlation, signature, or passive wired network sniffing techniques.


Integrated wireless Threat Detection

Airtight WIPs provides the most comprehensive protection for all types of wireless threats, including rogue APs, Soft APs, Honeypots, Wi-Fi DoS, Ad-hoc Networks, Client misassociations, and mobile hotspots. Security administrators do not need to develop complex verification codes to detect threats, airtight wips with its unique technology to protect the time and with unknown network attacks.

Automatic threat Defense 650) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M01/6C/71/wKioL1VJvQXh3DM6AABJoLLOMSY428.jpg "style=" Float:right, "title=" QQ picture 20150506145355.jpg "alt=" Wkiol1vjvqxh3dm6aabjollomsy428.jpg "/>

Most wireless intrusion detection/defense systems often improperly disrupt their own or neighboring Wi-Fi networks, while airtight can truly and correctly differentiate whether a threat is coming from a neighboring wireless Wi-Fi device, Effectively allow users who use airtight to guard against and block any threats that misuse Wi-Fi or violate corporate security policies. Airtight intelligently judges all types of wireless network threats and can block multiple security threats across multiple channels in the 2.4 GHz and 5 GHz bands.


Precise positioning and tracking 650) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M02/6C/76/wKiom1VJu6fyHw16AABvUQogets204.jpg "style= "Float:right;" title= "QQ picture 20150506145442.jpg" alt= "Wkiom1vju6fyhw16aabvuqogets204.jpg"/>

With the introduction of a planar structure diagram with physical address information, airtight can provide location information in real-time or past queries to help security administrators quickly track vulnerable or compromised devices and take action to eliminate security risks. Main Features:

·  rely on airtight patented technology: Probabilistic RF Fingerprint identification technology (probabilistic RF fingerprinting) to increase positioning accuracy to the foot level.

·  The WIPs sensor has a self-calibrating function without manual adjustment.

·  The influence of the RF obstacle, antenna direction and equipment transmitting power on the instantaneous signal change is comprehensively calculated, and the location information can be processed stably.

Secure BYOD Policy execution 650) this.width=650; "Src=" http://s3.51cto.com/wyfs02/M01/6C/71/wKioL1VJvS6j-WxPAABQyQBqyzg392.jpg " Style= "float:right;" title= "QQ picture 20150506145529.jpg" alt= "Wkiol1vjvs6j-wxpaabqyqbqyzg392.jpg"/>

Airtight WIPs is able to automatically analyze the types of smartphones and tablets that try to access the corporate network (Android, BlackBerry, IPhone, IPad, Windows Mobile, etc.) and classify the categories of access and denial of access according to the policy. At the same time, you can easily integrate with virtually any mobile device management (MDM) through the API provided by airtight. Main Features:

·  automatically analyze the type of smartphones and tablets.

·  prevent unauthorized access to personal devices.

·  detects and blocks mobile WiFi hotspots.

Centralized management system based on "location-aware". 650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/6C/71/wKioL1VJvUrSaN-ZAABWeisn-8s250.jpg "style=" float: right; "title=" QQ picture 20150506145617.jpg "alt=" Wkiol1vjvursan-zaabweisn-8s250.jpg "/>

Airtight region-based policy management architecture, can greatly simplify the area management, easy to expand from dozens of to tens of thousands of wireless users; Through this architecture, enterprises can define role-based management mechanisms, each administrator can only manage their own areas and functions, thus avoiding the management of "out of Bounds" And the occurrence of improper management. Other related features, such as: inherited and customized policies, dashboards, device and alert lists, statistics and reports, and more. Main Features:

·  a unified management console.

·  region-based hierarchical policy customization and inheritance.

·  role-based management.

Intelligent forensics 650) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M02/6C/76/wKiom1VJu-mgfASfAAAz4mkbS4w293.jpg "style=" Float:right, "title=" QQ picture 20150506145711.jpg "alt=" Wkiom1vju-mgfasfaaaz4mkbs4w293.jpg "/>

Airtight's intelligent forensics capabilities make it easy to audit multiple wireless events so that security administrators can make faster and better decisions. Main Features:

·  Configurable forensics time and other parameters.

·  You can filter or sort events, devices, durations, and so on.

·  provides real-time and historical location tracking.

·  the behavior that the audit trail takes (for example, alert notifications, confirmed events or devices, automatic or manual isolation, and so on).

Beijing Hongtai co-creation Technology Co., Ltd. is a company focused on wireless network security and intelligent interconnection solutions. In the industry has a good corporate image, the company in particular in the wireless network security and cloud connectivity in the forefront of the industry. Beijing Hongtai co-creation Technology Co., Ltd. in the product has made the international brand Air tight Trust, now has become the air tight Beijing, the sole general agent.

Beijing Hongtai co-creation Technology Co., Ltd. Recruitment Division Agents, sincerely hope you come to my company, Beijing Hongtai co-creation Technology Co., Ltd. welcome you to join. Beijing Hongtai co-creation Technology Co., Ltd. with your hand to go to a better connected world.



Airtight WIPS non-controller architecture Enterprise Wireless network security solution

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.