Cisco Adaptive Wireless Intrusion Prevention System
|
|
|
- Jeffery Greene
- 10 years ago
- Views:
Transcription
1 Data Sheet Cisco Adaptive Wireless Intrusion Prevention System Product Overview The wireless spectrum is a new frontier for many IT organizations. Like any other networking medium, the wireless spectrum must be properly secured, even if wireless networking is not deployed on site. Cisco Adaptive Wireless IPS (wips) is integrated in the Cisco Unified Wireless Network infrastructure and provides wireless-specific network threat detection and mitigation against malicious attacks, security vulnerabilities, and sources of performance disruption. Cisco Adaptive wips (Figure 1) provides the ability to detect, analyze, and identify wireless threats, and centrally manages mitigation and resolution of security and performance issues. Cisco Adaptive wips also delivers proactive threat prevention capabilities for a hardened wireless network core that is impenetrable by most wireless attacks, allowing customers to maintain constant awareness of their RF environment to minimize legal liability, protect brand reputation, and assure regulatory compliance - including PCI 2.0 standards. Figure 1. Cisco Adaptive wips: System Overview 2011 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 8
2 Overview Cisco Adaptive wips embeds complete wireless threat detection and mitigation into the wireless network infrastructure to deliver the industry's most comprehensive, accurate, and operationally cost-effective wireless security solution. Adaptive wips performs: rogue access point/client and ad hoc connection detection and mitigation, over-the-air wireless hacking and threat detection, security vulnerability monitoring, performance monitoring and self-optimization, network hardening for proactive prevention of threats, and complete wireless security management and reporting. The Power of Integration in the Wireless Network Infrastructure Cisco Adaptive wips is integrated directly into infrastructure components of the Cisco Unified Wireless Network, including Cisco wireless LAN controllers, Cisco access points, the Cisco Mobility Services Engine (MSE), and the Cisco Prime Network Control System (NCS). This integrated wireless threat detection and prevention reduces costs, streamlines operations, and provides comprehensive protection. Integration of wireless IPS into the WLAN infrastructure offers more than just the cost and operational efficiencies delivered by using a single infrastructure for both wireless IPS and WLAN services. Integration enables a superset of capabilities not architecturally possible with standalone, overlay wireless IPS systems. New functionality delivered by the infrastructure-integrated architecture of Cisco Adaptive wips allows network administrators to: See the whole picture: Typical wips solutions rely solely on RF air monitoring for detection. Cisco Adaptive wips builds on RF air monitoring by employing network traffic and anomaly analysis within the access points and WLAN controllers, as well as real-time device inventory analysis and network configuration analysis to detect threats and monitor performance. This approach delivers more accurate and thorough detection. Take corrective action: Cisco Adaptive wips doesn't just detect threats, vulnerabilities and performance issues; it makes it possible to take corrective action. Integration in the WLAN infrastructure enables Adaptive wips to go beyond passive monitoring and reach into the infrastructure to fix security threats and performance issues, and to do so in real time. Take advantage of the entire WLAN footprint: Cisco Adaptive wips can use all the access points in the network for location and mitigation of rogue devices. This increases location accuracy and mitigation scalability. from flexible deployment architectures: Cisco Adaptive wips can use access points dedicated to full-time air monitoring or access points serving WLAN users. This deployment flexibility enables rightsized security models on a site-specific basis. Comprehensive Protection, Accurate Detection Cisco's advanced approach to detection, combining air monitoring, network traffic and anomaly analysis, real-time network device and topology information, and network configuration analysis, delivers a comprehensive view of the event to the Cisco Adaptive wips analysis engine. With that breadth of information, Adaptive wips detects events not traceable with over-the-air signatures alone and makes more accurate detection decisions, thus increasing effectiveness while reducing false positives Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 2 of 8
3 Building upon the core detection capabilities, Cisco Adaptive wips delivers rich attack classification, providing users with flexible rules for automatically classifying and mitigating security events. Automatic classification, coupled with the system's inherent accuracy, greatly reduces the operational expenses associated with manual investigation of potential threats detected by the system. Cisco couples these advanced detection and classification techniques with an extensive attack, vulnerability, and performance detection library. Examples of event classes detected include rogue access points/clients, ad hoc connections, hacker access points such as honeypots and evil twins, network reconnaissance, authentication and encryption cracking, man-in-the-middle attacks such as address/identity spoofing and replay attacks, protocol attacks, denial-of-service (DoS) attacks, over-the-air and network security vulnerabilities, and performance issues such as co-channel interference and coverage holes. Complementing Adaptive wips with Proactive Threat Prevention The best way to secure your network is to design a system that prevents an attack before damage can be done. Network security hardening features embedded in the Cisco Unified Wireless Network complement the Cisco Adaptive wips solution to provide the following proactive threat prevention techniques: Remove security offenders from the network: Client exclusion policies can automatically respond to high levels of user authentication failures and IP address spoofing. Defuse network reconnaissance, spoofing, and man-in-the-middle attacks: Cisco Management Frame Protection, the basis for IEEE w, encrypts and authenticates WLAN management frames to defend against many common over-the-air attacks. Protect against data theft: Strong user authentication and Wi-Fi Protected Access 2 (WPA2) and i encryption standards protect access to your network and data traversing the WLAN. Lock out rogue access points: Using 802.1X wired port authentication on Cisco access points virtually eliminates the possibility that a rogue access point will join the wired network. s and s: Technical Overview The sections below outline each functional area of the Cisco Adaptive Wireless IPS solution and the associated benefits. Rogue Detection, Classification, and Mitigation Cisco Adaptive wips features rogue detection and mitigation as shown in Table 1. Rogue access points and clients can create backdoor access to your network and can be used for data theft from your wireless clients. Adaptive wips detects, auto-classifies based on customizable rules, and mitigates rogue access points, rogue clients, spoofed clients, and client ad hoc connections. Table 1. s and s: Rogue Detection, Classification, and Mitigation Detection On-/Off-Channel Scanning Signature-Based and Network- Analysis-Based Detection Spectrum Intelligence Detects rogue access points, rogue clients, spoofed clients, and client ad hoc connections on all channels in the related spectrum Increases breadth and accuracy of rogue, ad hoc, and spoofing detection, thus decreasing manual threat investigation by staff Detects rogue devices and denial of service in non frequencies, such as Bluetooth, radar, and microwave 2011 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 3 of 8
4 Event Classification Customizable Rogue Event Auto-Classification Rogue Switch-Port Tracing Physical Location of Rogue Device Mitigation Rogue Switch-Port Disable Over-the-Air Mitigation Automatic or Manual Mitigation Auto-classifies the threat level of rogue events-based user-defined classification rules, thus reducing staff intervention Establishes if a detected rogue access point is on the customer network, thus reducing manual staff investigation to assess the threat Plots rogue access points and clients on a floor map, thus helping assess the rogue threat and facilitate removal Remotely disables the Ethernet port to which a rogue access point is connected, thus speeding mitigation Mitigates rogue access points, clients, and ad hoc over-the-air connections using any Cisco access point deployed, thus speeding and scaling mitigation Flexible mitigation actions enable tailoring to customer risk environment and operational model Over-the-Air Attack Detection Cisco Adaptive wips features over-the-air attack detection as shown in Table 2. Over-the-air attacks are launched by hackers adjacent to your RF environment. Since RF signals penetrate walls, an attacker could be someone sitting in the parking lot in front of your office. Attack types include network reconnaissance, authentication and encryption cracking, denial of service, and man-in-the-middle attacks, as well as impersonation attempts and new or unknown attack techniques. Table 2. s and s: Over-the-Air Attack Detection Breadth of Attack Detection Network Reconnaissance and Profiling Detection Authentication and Encryption Cracking Detection Malicious or Inadvertent Denial of Service Detection Man-in-the-Middle Attack Detection Impersonation and Spoofing Detection Zero-Day Attack Detection Ongoing Threat and Vulnerability Research and Detection Development Event Classification and Tuning Default Detection Profiles Knowledge-Base-Driven Tuning Analyzes traffic behavior and performs pattern matching to detect tools and techniques such as Netstumbler, Wellenreiter, Kismet, honeypot access points, and other methods, providing an early alert that a hacker is looking for avenues of attack Analyzes traffic behavior and performs pattern matching to detect tools and techniques such as AirSnarf, AirCrack, ASLEAP, Chop-Chop, and other methods, providing an alert of potential or attempted data theft Analyzes traffic behavior and performs pattern matching to detect tools and techniques such as protocol abuse, AirJack, RF jamming, resource starvation, and other methods, providing an alert of potential or attempted network service disruption Analyzes traffic behavior, performs pattern matching, and applies authentication methods to detect tools and techniques such as replay attacks, fake access points, protocol manipulation, and other methods, providing an alert of potential data theft or unauthorized network access Analyzes traffic behavior, performs pattern matching, and applies authentication methods to detect tools and techniques such as MAC/IP spoofing, fake access points, evil-twin access points, Dynamic Host Configuration Protocol (DHCP) spoiling, and other methods, providing an alert of potential data theft or unauthorized network access Analyzes traffic behavior to detect newly introduced or previously uncategorized attack methods, providing an alert of a potential threat Cisco has a wireless threat and vulnerability research team dedicated to finding out about new attack techniques, as well as proactively analyzing the network for vulnerabilities that could be exploited; the research team helps ensure that Cisco Adaptive wips detection capabilities stay ahead of the threat horizon Default detection tuning profiles, customized by customer type, enable effective operation minutes after system startup and provide a head start in system tuning Detection tuning is tied to a threat knowledge base in NCS, giving operators plain-language descriptions of attack types and detection methods as well as tuning guidance, thus making tuning easier even for novice security operators 2011 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 4 of 8
5 Security Vulnerability Monitoring Cisco Adaptive wips features security vulnerability monitoring as shown in Table 3. Understanding the security posture of the wireless network in real time is the most important aspect of attack prevention. The Cisco NCS management system automatically performs automated 24/7 wireless vulnerability monitoring and assessment by proactively and persistently scanning the wireless network for weak security or out-of-policy configurations. Table 3. s and s: Security Vulnerability Monitoring Automated, 24/7 Configuration Analysis Analyze Against Industry Best Practices or Customer-Specific Security Policies Broad Vulnerability Identification Analyzes all wireless controller, access point, and management interface security configurations; by analyzing actual configurations rather than relying solely on over-the-air vulnerability sniffing, the NCS delivers greater accuracy and depth of vulnerability analysis, such as analysis of management protocol security and analysis of security services operating on the network NCS is pre-populated with industry best practices for wireless security vulnerability assessment; using NCS Config Audit, customers can also analyze configurations against their own specific security policies; this dual approach enables the greatest flexibility and breadth of vulnerability analysis Identifies vulnerabilities that can result in unauthorized management and network access, data theft, manin-the-middle attacks, DoS attacks, and protocol attacks, and advises on security services to run on the wireless network Performance Monitoring and Auto-Optimization Cisco Adaptive wips features performance monitoring as shown in Table 4. A poorly performing network affects network and application availability and can be a result of malicious or accidental means. Utilizing radio resource management (RRM), the system provides unmatched performance and network self-healing. Information about noise and interference, as well as client signal strength and other data, is used to dynamically assign channels and adjust access point transmit power in real time to avoid co-channel interference, to route around failed devices, and to minimize coverage holes. Table 4. s and s: Performance Monitoring and Auto-Optimization Continuous Real-Time Monitoring of Network Health and Performance Automatically Fixes Problems in the RF Domain Complete RF Management without Specialized RF Skills Defends against over-the-air interference, malicious or accidental Remedies issues, such as RF-based denial of service, without administrator intervention, thus increasing network uptime with minimal operational overhead RF management expertise is into the system, thus reducing the burden on operational staff Management, Monitoring, and Reporting Cisco Adaptive wips features complete security management, monitoring, and reporting capabilities as shown Table 5. Adaptive wips management is fully integrated into the Cisco NCS, providing a single, unified tool for both wireless network and wireless security operations. Unification of wireless network and wireless security management reduces challenges by keeping access point and client device inventories and security policies aligned, and by simplifying event management and reporting. Table 5. s and s: Management, Monitoring, and Reporting Single Management Platform for Wireless Network and Security Real-Time Device Inventories Access point and client device inventory is always up-to-date, with no double-entry or cross-vendor management integration issues, thus enabling high accuracy in rogue detection while minimizing administrative overhead 2011 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 5 of 8
6 Virtualized Management Domains No One-Off Management Platforms Integrated with Cisco Unified Wireless Network s Command Authorization and Audit Trails Designed for Enterprise Scalability NCS Security Dashboard Single, At-a-Glance View Wired Security Integration NCS Performance (RRM) Dashboard Single, At-a-Glance View NCS Event Management and Reporting Complete Event Forensics Event Escalation to Staff Per-Admin Reports Report Auto-Scheduling Payment Card Industry (PCI) Reporting Event Storage and Archiving Adaptive wips enables split wireless security management and monitoring from other wireless management roles or geographies All wips and general wireless management is performed from the NCS, thus minimizing staff training and support on disparate platforms wips provides unified workflows integrating general wireless network configuration, wireless security policy definition, and location service operation All management commands can be authorized by authentication, authorization, and accounting (AAA); configuration, investigation, and mitigation actions logged can be traced back to the administrator, enabling accountability The NCS is designed for the highest-scale environments: up to 3000 user-serving or wips access points per NCS instance Single-screen summary of all security events and vulnerabilities presented in a streamlined, at-a-glance format; ability to drill down on classes of events and individual events with a mouse click; eases day-to-day monitoring Malware and hacking events associated with wireless users can be monitored from the NCS security dashboard, thus providing a network-wide view of wireless user activity Single-screen summary of all performance-related events presented in a streamlined, at-a-glance format; ability to drill down on classes of events and individual events with a mouse click; eases day-to-day monitoring Captures all traffic associated with an attack for ease of attack investigation Automatically alerts staff regarding critical events, thus decreasing response time; fully customizable by event type Historical reports can be customized for individual administrators based on their preferences and area of responsibility, thus streamlining event analysis Historical reports can be scheduled to run automatically at specific times, thus streamlining workflows Historical reports may be customized for events pertinent to Payment Card Industry (PCI) compliance, thus streamlining audit-related activities Security attack events are stored in the Cisco Mobility Services Engine for long-term archiving, thus streamlining historical analysis Adaptive Wireless IPS Software Monitor Mode Cisco Adaptive WIPS Monitor Mode software licenses are based on the number of full-time monitoring access points that are deployed in the network. The Cisco 3355 Mobility Services Engine allows for the tracking of up to 3,000 monitoring access points, and the 3310 Mobility Services Engine allows for the tracking of up to 2,000 monitoring access points. The licenses are additive. Monitor Mode SKUs: AIR-WIPS-AP-5: Supports 5 monitor mode Cisco access points AIR-WIPS-AP-25: Supports 25 monitor mode Cisco access points AIR-WIPS-AP-100: Supports 100 monitor mode Cisco access points AIR-WIPS-AP-500: Supports 500 monitor mode Cisco access points AIR-WIPS-AP-2000: Supports 2000 monitor mode Cisco access points 2011 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 6 of 8
7 Enhanced Local Mode Cisco Adaptive wips Enhanced Local Mode software licenses are based on the number of local mode (dataserving) access points that are deployed in the network. The Cisco 3355 Mobility Services Engine allows for the tracking of up to 3000 local mode access points and the Cisco 3310 Mobility Services Engine allows for the tracking of up to 2000 local mode access points. The licenses are additive. Enhanced Local Mode SKUs: AIR-LM-WIPS-5: Supports 5 enhanced local mode access points AIR-LM-WIPS-25: Supports 25 enhanced local mode access points AIR-LM-WIPS-100: Supports 100 enhanced local mode access points AIR-LM-WIPS-500: Supports 500 enhanced local mode access points AIR-LM-WIPS-2000: Supports 2000 enhanced local mode access points The Cisco 3300 Series Mobility Services Engine supports coexistence of multiple mobility services on the same appliance. Both the 3310 and 3355 MSEs support Adaptive Wireless IPS and context-aware services on the same appliance. Standard Components of a Cisco Adaptive wips Are: All Cisco LWAPP access points are supported for Monitor Mode Adaptive wips monitoring All 11n LWAPP access points are supported for Enhanced Local Mode (ELM) wips monitoring Multiple mobility services can coexist with Cisco Adaptive wips on the same Mobility Services Engine (3310 and 3355) Up to 2000 wips access points can be served by a single 3310 MSE Up to 3000 wips access points can be served by a single 3355 MSE Requires Cisco WCS Version 5.2 or later for management, configuration, and reporting A Mobility Services Engine can be managed by a single NCS instance A single NCS instance can manage multiple Mobility Services Engines Licensing and Ordering Information Cisco Adaptive Wireless IPS Software Available with Cisco Mobility Services Engine Software Release 5.2.xxx or later Requires 5.2.xxx or later on Cisco Wireless Control System Requires 5.2.xxx or later on Cisco wireless LAN controllers Release 5.2 and later wireless IPS functionality requires Monitor Mode (that is, non-client-serving) access points Release 7.1.xxx and later wireless IPS functionality requires Enhanced Local Mode (that is, client-serving) access points Cisco Adaptive wips is a licensed software feature set on the Cisco Mobility Services Engine. Table 6 shows the license levels available for Adaptive wips Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 7 of 8
8 Table 6. Cisco Adaptive wips Software Licenses Wireless IPS License, Supporting 5 Cisco Monitor Mode APs Wireless IPS License, Supporting 25 Cisco Monitor Mode APs Wireless IPS License, Supporting 100 Cisco Monitor Mode APs Wireless IPS License, Supporting 500 Cisco Monitor Mode APs Wireless IPS License, Supporting 2000 Cisco Monitor Mode APs Wireless IPS License, Supporting 5 Enhanced Local Mode APs Wireless IPS License, Supporting 25 Enhanced Local Mode APs Wireless IPS License, Supporting 100 Enhanced Local Mode APs Wireless IPS License, Supporting 500 Enhanced Local Mode APs Wireless IPS License, Supporting 2000 Enhanced Local Mode Apes AIR-WIPS-AP-5 AIR-WIPS-AP-25 AIR-WIPS-AP-100 AIR-WIPS-AP-500 AIR-WIPS-AP-2000 AIR-LM-WIPS-5 AIR-LM-WIPS-25 AIR-LM-WIPS-100 AIR-LM-WIPS-500 AIR-LM-WIPS-2000 Service and Support Cisco offers a wide range of services programs to accelerate customer success. These innovative services programs are delivered through a unique combination of people, processes, tools, and partners, resulting in high levels of customer satisfaction. Cisco services help you protect your network investment, optimize network operations, and prepare your network for new applications to extend network intelligence and the power of your business. For more information about Cisco services, visit Cisco Technical Support Services or Cisco Advanced Services. For More Information For more information about Cisco Adaptive wips, visit For more information about the Cisco Mobility Services Engine, visit For more information about the Cisco Unified Wireless Network, visit Printed in USA C / Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 8 of 8
Cisco Adaptive Wireless Intrusion Prevention System
Cisco Adaptive Wireless Intrusion Prevention System Product Overview The wireless spectrum is a new frontier for many IT organizations. Like any other networking medium, the wireless spectrum must be properly
WLAN Security Why Your Firewall, VPN, and IEEE 802.11i Aren t Enough to Protect Your Network
WLAN Security Why Your Firewall, VPN, and IEEE 802.11i Aren t Enough to Protect Your Network 339 N. Bernardo Avenue, Suite 200 Mountain View, CA 94043 www.airtightnetworks.net Executive Summary Wireless
Cisco Wireless Control System (WCS)
Data Sheet Cisco Wireless Control System (WCS) PRODUCT OVERVIEW Cisco Wireless Control System (WCS) Cisco Wireless Control System (WCS) is the industry s leading platform for wireless LAN planning, configuration,
CISCO WIRELESS CONTROL SYSTEM (WCS)
CISCO WIRELESS CONTROL SYSTEM (WCS) Figure 1. Cisco Wireless Control System (WCS) PRODUCT OVERVIEW Cisco Wireless Control System (WCS) Cisco Wireless Control System (WCS) is the industry s leading platform
Closing Wireless Loopholes for PCI Compliance and Security
Closing Wireless Loopholes for PCI Compliance and Security Personal information is under attack by hackers, and credit card information is among the most valuable. While enterprises have had years to develop
Designing, Securing and Monitoring 802.11a/b/g/n Wireless Networks
Designing, Securing and Monitoring 802.11a/b/g/n Wireless Networks The importance of Wireless today Increasingly in the Corporate Environment, Wireless is becoming an enabling technology to facilitate
Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline
Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the
Using AirWave RAPIDS Rogue Detection to Implement Your Wireless Security and PCI Compliance Strategy
Using AirWave RAPIDS Rogue Detection to Implement Your Wireless Security and PCI Compliance Strategy Table of Contents Introduction 3 Using AirWave RAPIDS to detect all rogues on your network 4 Rogue device
Wireless Security and Healthcare Going Beyond IEEE 802.11i to Truly Ensure HIPAA Compliance
Going Beyond IEEE 802.11i to Truly Ensure HIPAA Compliance 339 N. Bernardo Avenue, Suite 200 Mountain View, CA 94043 www.airtightnetworks.net Wireless LANs are prevalent in healthcare institutions. The
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
How To Protect A Wireless Lan From A Rogue Access Point
: Understanding Security to Ensure Compliance with HIPAA Healthcare is a natural environment for wireless LAN solutions. With a large mobile population of doctors, nurses, physician s assistants and other
WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006
WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able
Ensuring HIPAA Compliance in Healthcare
The Intelligent Wireless Networking Choice WHITE PAPER Ensuring HIPAA Compliance in Healthcare Overview Wireless LANs are prevalent in healthcare institutions. The constant need for mobility among doctors,
HP Networking Mobility Security IDS/IPS Series
HP Networking Mobility Security IDS/IPS Series Data sheet Product overview HP RF Manager provides detection and prevention of wireless threats with automated policy-based security and location-tracking
A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model
A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model Table of Contents Introduction 3 Deployment approaches 3 Overlay monitoring 3 Integrated monitoring 4 Hybrid
PCI Wireless Compliance with AirTight WIPS
A White Paper by AirTight Networks, Inc. 339 N. Bernardo Avenue, Suite 200, Mountain View, CA 94043 www.airtightnetworks.com 2013 AirTight Networks, Inc. All rights reserved. Introduction Although [use
WHITEPAPER. Wireless LAN Security for Healthcare and HIPAA Compliance
WHITEPAPER Wireless LAN Security for Healthcare and HIPAA Compliance Wireless LAN Security for Healthcare and HIPAA Compliance Wireless deployments in healthcare institutions have accelerated as mobility
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
Technical Brief. Wireless Intrusion Protection
Technical Brief Wireless Intrusion Protection Introduction One layer of the multi-layer wireless security solution provided by Aruba Wireless Networks is the ability to lock the air using wireless intrusion
Wi-Fi, Health Care, and HIPAA
AN AIRMAGNET TECHNICAL WHITE PAPER Wi-Fi, Health Care, and HIPAA WLAN Management in the Modern Hospital by Wade Williamson WWW.AIRMAGNET.COM This page contains no topical information. Table of Contents
PCI Solution for Retail: Addressing Compliance and Security Best Practices
PCI Solution for Retail: Addressing Compliance and Security Best Practices Executive Summary The Payment Card Industry (PCI) Data Security Standard has been revised to address an evolving risk environment
PCI DSS 3.1 and the Impact on Wi-Fi Security
PCI DSS 3.1 and the Impact on Wi-Fi Security 339 N. Bernardo Avenue, Suite 200, Mountain View, CA 94043 www.airtightnetworks.com 2015 AirTight Networks, Inc. All rights reserved. Table of Contents PCI
Air Marshal. White Paper
White Paper Air Marshal SEPTEMBER 2013 This document discusses potential security threats in a WiFi environment, and outlines how enterprises can use a best-in-class Wireless Intrusion Prevention System
WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks
WHITE PAPER The Need for Wireless Intrusion Prevention in Retail Networks The Need for Wireless Intrusion Prevention in Retail Networks Firewalls and VPNs are well-established perimeter security solutions.
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.
Wireless LAN Attacks and Protection Tools (Section 3 contd.) WLAN Attacks Passive Attack unauthorised party gains access to a network and does not modify any resources on the network Active Attack unauthorised
Best Practices for Outdoor Wireless Security
Best Practices for Outdoor Wireless Security This paper describes security best practices for deploying an outdoor wireless LAN. This is standard body copy, style used is Body. Customers are encouraged
Enterprise A Closer Look at Wireless Intrusion Detection:
White Paper Enterprise A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model Josh Wright Senior Security Researcher Introduction As wireless enterprise networks become
All You Wanted to Know About WiFi Rogue Access Points
All You Wanted to Know About WiFi Rogue Access Points A quick reference to Rogue AP security threat, Rogue AP detection and mitigation Gopinath K. N. Hemant Chaskar AirTight Networks www.airtightnetworks.com
Link Layer and Network Layer Security for Wireless Networks
Link Layer and Network Layer Security for Wireless Networks Interlink Networks, Inc. May 15, 2003 1 LINK LAYER AND NETWORK LAYER SECURITY FOR WIRELESS NETWORKS... 3 Abstract... 3 1. INTRODUCTION... 3 2.
The SIEM Evaluator s Guide
Using SIEM for Compliance, Threat Management, & Incident Response Security information and event management (SIEM) tools are designed to collect, store, analyze, and report on log data for threat detection,
Wireless Security Strategies for 802.11ac and the Internet of Things
339 N. Bernardo Avenue, Suite 200, Mountain View, CA 94043 www.airtightnetworks.com 2014 AirTight Networks, Inc. All rights reserved. The Internet of Things is a double-edged sword. While it confers many
Configuring Security Solutions
CHAPTER 3 This chapter describes security solutions for wireless LANs. It contains these sections: Cisco Wireless LAN Solution Security, page 3-2 Using WCS to Convert a Cisco Wireless LAN Solution from
THE BUSINESS CASE FOR NETWORK SECURITY: ADVOCACY, GOVERNANCE, AND ROI
THE BUSINESS CASE FOR NETWORK SECURITY: ADVOCACY, GOVERNANCE, AND ROI Introduction. I. VULNERABILITIES AND TECHNOLOGIES. 1. Hackers and Threats. Contending with Vulnerability Realizing Value in Security
Don t Let Wireless Detour Your PCI Compliance
Understanding the PCI DSS Wireless Requirements A Whitepaper by AirTight Networks, Inc. 339 N. Bernardo Avenue, Suite 200, Mountain View, CA 94043 www.airtightnetworks.com 2012 AirTight Networks, Inc.
Current IBAT Endorsed Services
Current IBAT Endorsed Services Managed Network Intrusion Prevention and Detection Service SecureWorks provides proactive management and real-time security event monitoring and analysis across your network
Site Survey and RF Design Validation
CHAPTER 8 Site Survey Introduction In the realm of wireless networking, careful planning is essential to ensure that your wireless network performs in a manner that is consistent with Cisco s design and
CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)
CORE Security and the Payment Card Industry Data Security Standard (PCI DSS) Addressing the PCI DSS with Predictive Security Intelligence Solutions from CORE Security CORE Security +1 617.399-6980 [email protected]
Threat Center. Real-time multi-level threat detection, analysis, and automated remediation
Threat Center Real-time multi-level threat detection, analysis, and automated remediation Description Advanced targeted and persistent threats can easily evade standard security, software vulnerabilities
Ensuring HIPAA Compliance in Healthcare
White paper Ensuring HIPAA Compliance in Healthcare Overview Wireless LANs are prevalent in healthcare institutions. The constant need for mobility among doctors, nurses, and staff while remaining connected
How To Protect Your Network From Attack From A Network Security Threat
Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your
Wireless Threats To Corporate Security A Presentation for ISACA UK Northern Chapter
Wireless Threats To Corporate Security A Presentation for ISACA UK Northern Chapter Introduction Who are we? Matt Moore, Senior Consultant @ PenTest Ltd. Mark Rowe, Technical Director @ PenTest Ltd. What
Extreme Networks Security Analytics G2 Vulnerability Manager
DATA SHEET Extreme Networks Security Analytics G2 Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution HIGHLIGHTS Help prevent security breaches by discovering
Security. Security consulting and Integration: Definition and Deliverables. Introduction
Security Security Introduction Businesses today need to defend themselves against an evolving set of threats, from malicious software to other vulnerabilities introduced by newly converged voice and data
Cisco Prime Network Control System
Data Sheet Cisco Prime Network Control System (NCS) Product Overview Cisco Prime Network Control System (NCS), the industry's most comprehensive management platform, delivers converged user, access and
WHITE PAPER. WEP Cloaking for Legacy Encryption Protection
WHITE PAPER WEP Cloaking for Legacy TM Encryption Protection Introduction Wired Equivalent Privacy (WEP) is the encryption protocol defined in the original IEEE 802.11 standard for Wireless Local Area
1.1 Demonstrate how to recognize, perform, and prevent the following types of attacks, and discuss their impact on the organization:
Introduction The PW0-204 exam, covering the 2010 objectives, will certify that the successful candidate understands the security weaknesses inherent in WLANs, the solutions available to address those weaknesses,
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief
RSA Solution Brief RSA envision Platform Real-time Actionable Information, Streamlined Incident Handling, Effective Measures RSA Solution Brief The job of Operations, whether a large organization with
The Cisco Mobility Express Solution
The Cisco Mobility Express Solution A business-grade, affordable mobility solution for small and medium-sized businesses with up to 250 employees. Executive Summary This document presents the Cisco Mobility
DESIGNING AND DEPLOYING SECURE WIRELESS LANS. Karl McDermott Cisco Systems Ireland [email protected]
DESIGNING AND DEPLOYING SECURE WIRELESS LANS Karl McDermott Cisco Systems Ireland [email protected] 1 Agenda Wireless LAN Security Overview WLAN Security Authentication and Encryption Radio Monitoring
Wireless Security with Cyberoam
White paper Cyberoam UTM Wireless Security with Cyberoam Robust, Fault-tolerant security is a must for companies sporting wireless networks. Cyberoam UTM strengthens the existing Wireless Security Architecture
Supporting Municipal Business Models with Cisco Outdoor Wireless Solutions
Supporting Municipal Business Models with Cisco Outdoor Wireless Solutions EXECUTIVE SUMMARY Outdoor wireless networks are playing a vital role in helping municipalities deliver critical services to citizens.
Integrating Wired IDS with Wi-Fi Using Open-Source IDS to Complement a Wireless IDS/IPS Deployment
Integrating Wired IDS with Wi-Fi Using Open-Source IDS to Complement a Wireless IDS/IPS Deployment Table of Contents Introduction 3 Limitations in WIDS monitoring 3 Monitoring weaknesses 3 Traffic analysis
Policy Management: The Avenda Approach To An Essential Network Service
End-to-End Trust and Identity Platform White Paper Policy Management: The Avenda Approach To An Essential Network Service http://www.avendasys.com email: [email protected] email: [email protected] Avenda
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3
Motorola AirDefense Network Assurance Solution. Improve WLAN reliability and reduce management cost
Motorola AirDefense Network Assurance Solution Improve WLAN reliability and reduce management cost The challenge: Ensuring wireless network performance and availability Wireless LANs help organizations
Cisco RSA Announcement Update
Cisco RSA Announcement Update May 7, 2009 Presented by: WWT and Cisco Agenda Cisco RSA Conference Announcements Collaborate with Confidence Overview Cisco s Security Technology Differentiation Review of
Wireless Vulnerability Assessment For: ABC
AIRTIGHT NETWORKS REPORTS Wireless Vulnerability Assessment For: ABC From: Apr 17, 2008 12:55 PM To: Apr 17, 2008 4:55 PM Location: \\ABC Corp A Report by AirTight Networks, Inc. 339 N. Bernardo Avenue,
Wireless Local Area Network Deployment and Security Practices
HIGHLIGHTS AUDIT REPORT Wireless Local Area Network Deployment and April 24, 2014 Report Number HIGHLIGHTS BACKGROUND: The U.S. Postal Service is committed to providing a high quality, secure, and cost-effective
PCI Data Security Standards (DSS)
ENTERPRISE APPLICATION WHITELISTING SOLUTION Achieving PCI Compliance at the Point of Sale Using Bit9 Parity TM to Protect Cardholder Data PCI: Protecting Cardholder Data As the technology used by merchants
ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3
ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3 TO THE Overview EXHIBIT T to Amendment No. 60 Secure Wireless Network Services are based on the IEEE 802.11 set of standards and meet the Commonwealth of Virginia
Cisco Wireless Portfolio
Cisco Wireless Portfolio Access Points Cisco Aironet 3600 Series Access Points with CleanAir Technology Cisco Aironet 3600 Series Access Points with Cisco CleanAir technology are the first 802.11n access
Vulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks.
This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks. Copyright 2009 Meraki, Inc. All rights reserved. Trademarks Meraki
Cisco Wireless Control System (WCS)
Cisco Wireless Control System (WCS) Figure 1. Cisco Wireless Control System (WCS) Product Overview Cisco Wireless Control System (WCS) is the industry's most comprehensive management platform for lifecycle
Security Requirements for Wireless Local Area Networks
Information Technology Security Guidance Security Requirements for Wireless Local Area Networks Overview ITSG-41 March 2013 Foreword The ITSG-41 Security Requirements for Wireless Local Area Networks document
Understanding WiFi Security Vulnerabilities and Solutions. Dr. Hemant Chaskar Director of Technology AirTight Networks
Understanding WiFi Security Vulnerabilities and Solutions Dr. Hemant Chaskar Director of Technology AirTight Networks WiFi Proliferation Global WiFi Radio Chipset Sales 387 307 Millions 120 200 2005 2006
HP RF Manager Release 6.0.177
5998 3768 v6.0.177 HP RF Manager Release 6.0.177 Release Notes www.hp.com/networking Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without
Overview to the Cisco Mobility Services Architecture
Overview to the Cisco Mobility Services Architecture Introduction Business has gone mobile. The number of employees that expect access to network resources to improve productivity has increased significantly
Overlay vs. Integrated Wireless Security The pros and cons of different approaches to wireless intrusion prevention
Whitepaper Overlay vs. Integrated Wireless Security The pros and cons of different approaches to wireless intrusion prevention There are a few different ways to deploy monitoring systems that scan the
Managed Intrusion, Detection, & Prevention Services (MIDPS) Why E-mail Sorting Solutions? Why ProtectPoint?
Managed Intrusion, Detection, & Prevention Services (MIDPS) Why E-mail Sorting Solutions? Why ProtectPoint? Why? Focused on Managed Intrusion Security Superior-Architected Hardened Technology Security
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture
IBM Security QRadar Vulnerability Manager
IBM Security QRadar Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution Highlights Help prevent security breaches by discovering and highlighting high-risk
Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it
Complete and high performance protection where you need it Overview delivers high-performance protection against physical and virtual server downtime with policy based prevention, using multiple protection
Protecting the Palace: Cardholder Data Environments, PCI Standards and Wireless Security for Ecommerce Ecosystems
Page 1 of 5 Protecting the Palace: Cardholder Data Environments, PCI Standards and Wireless Security for Ecommerce Ecosystems In July the Payment Card Industry Security Standards Council (PCI SSC) published
Best Practices in Deploying a Secure Wireless Network
Best Practices in Deploying a Secure Wireless Network CONTENTS Abstract 2 Today s concerns 2 Purpose 2 Technology background 3 Today s challenges 4 Key security requirements of an integrated network 4
CH ENSA EC-Council Network Security Administrator Detailed Course Outline
CH ENSA EC-Council Network Security Administrator Detailed Course Outline Summary Duration Vendor Audience 5 Days hands-on training EC-Council Security Professionals Level Technology Category Advance Ethical
Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.
Table of Contents Section 1: Executive summary...1 Section 2: The challenge...2 Section 3: WLAN security...3 and the 802.1X standard Section 4: The solution...4 Section 5: Security...4 Section 6: Encrypted
Why Migrate to the Cisco Unified Wireless Network?
Why Migrate to the Cisco Unified Wireless Network? Cisco is encouraging our customers to migrate to the Cisco Unified Wireless Network. This paper reviews the advantages of and reasons for migrating to
Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison
CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation
Wireless Network Analysis. Complete Network Monitoring and Analysis for 802.11a/b/g/n
Wireless Network Analysis Complete Network Monitoring and Analysis for 802.11a/b/g/n Comprehensive Wireless Network Management Made Simple From deploying access points to baselining activity to enforcing
Critical Security Controls
Critical Security Controls Session 2: The Critical Controls v1.0 Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter The Critical Security Controls The Critical Security
ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001
001011 1100010110 0010110001 010110001 0110001011000 011000101100 010101010101APPLICATIO 0 010WIRELESS110001 10100MOBILE00010100111010 0010NETW110001100001 10101APPLICATION00010 00100101010WIRELESS110
EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led
EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led Certification: ENSA Exam 312-38 Course Description This course looks at the network security in defensive view.
Link Layer and Network Layer Security for Wireless Networks
White Paper Link Layer and Network Layer Security for Wireless Networks Abstract Wireless networking presents a significant security challenge. There is an ongoing debate about where to address this challenge:
Cisco ASA 5500 Series IPS Solution
Cisco ASA 5500 Series IPS Solution Product Overview Network threats and security compliance mandates continue to increase in number. The Cisco ASA 5500 Series Intrusion Prevention System (IPS) solution
Deploying a Secure Wireless VoIP Solution in Healthcare
Deploying a Secure Wireless VoIP Solution in Healthcare Situation Healthcare is a natural environment for wireless LAN solutions. With a large mobile population of doctors, nurses, physician s assistants
