Comprehensive Intrusion Prevention

With more than 200 security and performance events, this next-generation wireless protection platform offers the industry’s most extensive event library, and with context-aware detection engines, the solution detects only meaningful security events. By analyzing existing and day-zero threats in real time against historical data, the solution is able to accurately detect all wireless attacks and anomalous behavior.

Rogue Mitigation
Identifies any rogue device and can automatically remove it from the network. By analyzing wireless traffic, the system can automatically determine the level of threat that a potential rogue poses to the organization, allowing administrators to place a higher priority on the rogues that present a more serious threat to the network.

Forensic Analysis
Provides forensic data that allows you to retrace any one device’s steps down to the minute. With forensic research, investigating an event takes minutes instead of potentially hours.

Policy and Compliance Reporting
Includes built-in reports covering a variety of wireless network activity and compliance requirements from auditors. Administrators can also build their own highly customized reports in minutes and use graphs to provide a quick snapshot of important metrics. The system provides reporting tools for various regulatory mandates such as PCI DSS, DoD 8100.2, HIPAA, GLBA and Sarbanes-Oxley as well as corporate policy enforcement.

Wireless Vulnerability Assessment
Provides remote wireless testing of the network’s security posture. Administrators can identify sensitive systems exposed to the wireless network with a simple series of tests.


Mobile Workforce Protection
Provides the ability to enforce corporate security policies and defend mobile wireless clients from attacks that happen outside the secure enterprise perimeter. AirDefense Personal is a software agent that runs on Windows PCs and monitors for malicious or accidental wireless activity, as well as wireless device mis-configurations that may cause security exposures or policy violations.