Comprehensive wireless rogue tracing and containment solution

The new AirMagnet Enterprise 8.1 allows users to trace and block rogue devices that are physically connected to an enterprise network faster and more reliably than any other solution in the industry. The product coordinates complimentary tracing techniques leveraging AirMagnet’s intelligent sensors to perform local tracing of the sensor’s immediate environment, as well as global, centralized tracing performed by the AirMagnet Server. Information is shared between the intelligent sensors and server to build a global view of the network, automatically learning from previous discoveries and traces.

The ability to identify unapproved devices that are physically connected to an organization’s WLAN infrastructure is a critical feature for any WIDS/WIPS solution. Traditionally, tracing could have variable success depending on the techniques used. Some techniques require manually defining all switches in the environment, while others may fail due to an inability to trace across subnets. However, with AirMagnet Enterprise 8.1, it is now possible to leverage multiple tracing mechanisms. This includes the ability to trace centrally or distributed, to trace over the wire or wirelessly over the air, and also to trace manually or automatically based on policy. As the only solution to include all of these mechanisms, AirMagnet Enterprise delivers significant industry improvements in terms of tracing reliability and speed.

AirMagnet Enterprise 8.1 provides a simple, scalable WLAN monitoring solution that enables any organization to proactively mitigate all types of wireless threats, enforce enterprise policies, prevent performance problems and audit the regulatory compliance of all their WiFi assets and users worldwide. In addition, the product offers a complete approach to rogue management with the ability to detect, disable, and document every rogue. Multiple detection mechanisms immediately expose every rogue. An active blocking suite disables the rogue wirelessly or at the wired port. A dedicated documentation page provides profiles of each rogue, including a summary of applied policies and actions taken.




Share this