无线网络安全

SECURE YOUR SUCCESS

Mobility gives you your organization the freedom to react to critical changes in your enterprise environment. The AirDefense Security and Compliance solution gives you the confidence that all members of your organization can fully enjoy that freedom, while you protect your valuable and sensitive business data. Take steps now to control your risk of exposure… and ensure that you have all the tools you need to fulfill your mission, now and in the future.

REDUCE REGULATORY RISK

No matter how much you have invested in IT security, a single insecure wireless LAN device can compromise your entire network backbone. The potential financial costs and loss of public confidence of such a security breach are bad enough. But in industries subject to legal oversight, any security lapse can also carry significant legal and regulatory ramifications. The AirDefense Security and Compliance solution is designed to help you not only meet, but clearly demonstrate, your organization’s compliance with the defined policies of regulatory bodies. A straightforward, easy-to-use system helps you define security compliant policies, track your wireless activity, test and audit your wireless network security and routinely report your regulatory compliance.

Compliance

The AirDefense Security and Compliance solution includes the most advanced 24×7 wireless monitoring tools, allowing your IT staff to identify network attacks and vulnerabilities, and to instantly terminate the connection to any rogue device. The system uses collaborative intelligence with secure sensors that work in tandem with a hardened purpose-built server appliance to monitor all 802.11 (a/b/g/n) wireless traffic in real time. As a key layer of security, Motorola AirDefense complements VPNs, encryption and authentication. With the AirDefense Security and Compliance solution, you get complete protection against wireless threats, together with policy and compliance monitoring, in a system that can scale to meet the needs of even the largest global organizations.

LOCK OUT INTRUDERS

One of the most challenging wireless security threats is a malicious intruder – this could be anyone looking to find a weakness in your network before you do. The AirDefense Security and Compliance solution is your 24×7 security force, guarding against wireless intruders. It constantly watches
your network’s daily activity, analyzing existing and day-zero threats in real time against historical data. Using the industry’s most extensive event library, with more than 200 security and performance events, this next-generation wireless protection platform automatically identifies and reports wireless attacks, unusual traffic patterns or other suspicious activity, Sophisticated detection engines minimize false alarms, so only meaningful events come to the attention of your staff.

DISABLE ROGUE DEVICES

Unauthorized devices can behave like a master key to your offices – a single rogue access point can give an attacker full access to your internal network, bypassing traditional wired network security controls. The AirDefense Security and Compliance solution can identifiy and automatically disconnect any rogue device. By analyzing wireless traffic, the system prioritizes the level of threat that a potential rogue poses, so your administrators can deal with the most serious dangers first. While less sophisticated intrusion prevention systems might disable a neighboring access point by mistake, the AirDefense solution is accurate and reliable, protecting you against both unwanted intrusion on your network and unwarranted intrusion on someone else’s.

INVESTIGATE AND ANALYZE

Often, the real impact of a security threat is revealed not in a single significant event, but in a series of small ones – like a burglar quietly walking around your building, checking whether all the windows are locked. When it comes time for forensic investigation of network security, the AirDefense Security
and Compliance solution makes the detective work easier. The system stores important information such as channel activity, signal characteristics, device activity and traffic flow – in all, more than 325 data points per wireless device, per connection, per minute, so you can trace back through months of history on a device only recently found to be suspicious. Instead of physically visiting sites, your administrators can investigate remotely, rewinding and reviewing minute-by-minute records of connectivity and communication on your network. So investigations that might once have required hours can be completed in just minutes.

ASSESS VULNERABILITIES

To truly harden your wireless network against malicious attacks, look at it closely through an attacker’s eyes. The Wireless Vulnerability Assessment module is a patented testing technology that simulates attacks from a wireless hacker’s point-of-view. Its extensive scan features lets you validate firewall and wireless switch policies, while also helping you identify paths of entry to sensitive wired systems that might be exposed through your wireless network. The assessment technology works remotely and satisfies requirements for regulatory compliance, so you can save the costs of sending personnel or consultants to remote offices and stores to manually conduct required security audits. Configured to run automatically or on demand, the assessments can be customized with blacklists to target networks or devices, validating what should or should not be accessible from the wireless side. By routinely and automatically assessing potential vulnerability, you can proactively fortify the security of all your information assets, wired and wireless, across your entire enterprise.

SECURE LEGACY INFRASTRUCTURE

Wireless security protocols have evolved significantly over time. So some devices in your wireless infrastructure may not offer the same level of protection as the rest of your network. The Motorola AirDefense WEP Cloaking module provides protection for wireless infrastructure secured by
legacy encryption protocols. Motorola AirDefense WEP Cloaking is the first and only patented technology to protect retailers and other organizations using the Wired Equivalent Privacy (WEP) security standard to protect networks from common attempts used to crack encryption keys. Leveraging the Motorola AirDefense Services Platform, the WEP Cloaking module uses the same sensors to continuously protect access points, laptops and portable data terminals, in use by many retailers, from passive and active attempts to crack WEP encryption keys.

http://www.motorola.com/web/Business/Products/Software%20and%20Applications/Network%20Design%20Software/AirDefense_Security_Compliance/_documents/Static_files/AirDefense_Security_and_Compliance_Brochure.pdf?localeId=33