AirTight Offers SpectraGuard 5.2
AirTight extended its lead over the rest of WIPS industry by announcing SpectraGuard Enterprise 5.2, the new standard for WIPS functionality
MOUNTAIN VIEW, Calif. -- AirTight NetworksT, the leading provider of wireless intrusion prevention solutions, today extended its lead over the rest of WIPS industry by announcing SpectraGuard Enterprise 5.2, the new standard for WIPS functionality. Release 5.2 enhances SpectraGuard's patented wireless threat detection and classification, improves its already more robust threat prevention, augments its highly rated reporting capabilities, and includes FIPS compliance.
The key elements of an effective wireless intrusion prevention system (WIPS) are:
detecting and correctly classifying wireless threats - to catch all threats, while minimizing false alarms
preventing (multiple, simultaneous) wireless threats - while continuing to scan for new ones
accurately locating wireless threats on a floor map - so they can be removed
providing a comprehensive reporting capability for compliance and audit purposes
SpectraGuard Enterprise 5.2 offers new and improved functionality in 3 of these 4 categories, in addition to adopting a FIPS compliant encryption algorithm.
In the detection and classification area, Release 5.2 enhances SpectraGuard by:
offering the industry's best, most granular sensor configuration capabilities - allowing the enterprise to define and group sensors into multiple categories - either geographically and/or functionally. For each of these categories the user specifies which (or all) of 62 different 802.11 channels to monitor - to detect devices and threats across this wireless spectrum. This will allow an enterprise to set different wireless security policies for its data centers in the UK and its retail stores in the US or Asia (as an example).
Improving our detection of pre-standard 802.11n APs. Release 5.2 has adapted its algorithms to detect so-called "super-APs" and "turbo-APs" built on Atheros chipsets, as well as "draft-802.11n APs" from multiple vendors, in addition to the "pre-standard 802.11n APs" that we already detect.
About the Author
You May Also Like