Mobile and wireless threat detection and management system

AirPatrol launched the AirPatrol Wireless Locator System 3.0 (WLS). WLS 3.0 is the only wireless intrusion detection system which allows security administrators to manage both 802.11 WLAN Device and Cellular Device security with a single system. WLS 3.0 precisely detects, locates and characterizes 802.11 WLAN and cellular devices within security administrators’ areas of interest on a 24 x 7 basis, including cellular broadband devices and smart phones. The system also includes a wide range of automated alert functions to notify security administrators when wireless security events occur.

WLS 3.0 features a new Forensic Database plug-in that records and archives both 802.11 WLAN device and cellular device event information. The WLS Forensic Database gives security administrators the ability to revisit wireless threat events that occurred hours, days or months ago.

Security administrators can review detailed wireless threat information such as:

  • Precise locations of cellular devices and 802.11 WLAN devices within the monitored area
  • Start times and stop times of cellular device events (e.g. voice calls, emails, SMS text messages) and 802.11 WLAN device events
  • MAC addresses, SSIDs and association states of 802.11 WLAN devices
  • Transmit frequencies and cellular protocol type for cellular devices.

Implemented using the HTTPS protocol, the WLS Forensic Database satisfies a wide range of user scenarios, including secure remote access from across the Internet. Its architecture gives security administrators secure access to historical security data and enables them to configure the WLS server using Internet Explorer.

The historical playback functionality allows users to track 802.11 WLAN and cellular activity from a previous date and time on a graphical floor plan, enabling centralized review of data from multiple geographically dispersed locations. Remote configuration of WLS parameters, including alerts and reporting settings for the WLS application, is also available through the Web browser, yielding centralized management of database functions.

Don't miss