Wireless Networks. Keeping your network running smooth and secure with the latest security and site analyses

Similar documents
WHITE PAPER. WEP Cloaking for Legacy Encryption Protection

Designing AirPort Extreme Networks

Wi-Fi, Health Care, and HIPAA

Barcoding, Incorporated

ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3

Mobile Solutions. Mobile Solutions RFID AIDC. auto ID. mobility. labeling. data collec tion. software development

RFID 101: Using RFID to Manage School Assets and Achieve Huge Savings

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

Potential Security Vulnerabilities of a Wireless Network. Implementation in a Military Healthcare Environment. Jason Meyer. East Carolina University

Wireless Network Analysis. Complete Network Monitoring and Analysis for a/b/g/n

Your reliable source for barcode scanning solutions

Protecting the Palace: Cardholder Data Environments, PCI Standards and Wireless Security for Ecommerce Ecosystems

Wireless Threats To Corporate Security A Presentation for ISACA UK Northern Chapter

Network Instruments white paper

Efficient Asset Tracking: From Manual to Automated

Testing a Wireless LAN

Observer Analyzer Provides In-Depth Management

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ ITMC TECH TIP ROB COONCE, MARCH 2008

ROGUE ACCESS POINT DETECTION: AUTOMATICALLY DETECT AND MANAGE WIRELESS THREATS TO YOUR NETWORK

Wireless in the Data Centre becomes best practice!

CDW Standard Image Deployment Service Customer Guide

Frequently Asked Questions

AXIS 207W Network Camera Technical Information

Mechanic Handheld Wireless Access Point Setup Guide

Troubleshooting Slow Internet Common Causes

Robust security is a requirement for many companies deploying a wireless network. However, creating a secure wireless network has often been

Motorola AirDefense Network Assurance Solution. Improve WLAN reliability and reduce management cost

Wireless Network Standard and Guidelines

Closing Wireless Loopholes for PCI Compliance and Security

Access Point Configuration

Lab Configuring Access Policies and DMZ Settings

10 Hidden IT Risks That Might Threaten Your Business

Best Practices for Deploying Wireless LANs

Wireless Mobile Workforce

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

MSP Service Matrix. Servers

Computer Networking. Definitions. Introduction

A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model

Information Technology Asset Management: Control and Compliance

ADM:49 DPS POLICY MANUAL Page 1 of 5

CDW Advanced Image Deployment Service Customer Guide

SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005

Taxonomy of Intrusion Detection System

Enterprise A Closer Look at Wireless Intrusion Detection:

A Barcode Primer for Manufacturers Dr. Peter Green BellHawk Systems Corporation

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

54M/150M/300Mbps USB WIRELESS ADAPTER. User s Manual Version 2.0

Laydown Yard Asset Tracking for Heavy Civil Construction

Installation Guide Wireless 4-Port USB Sharing Station. GUWIP204 Part No. M1172-a

Networking. General networking. Networking overview. Common home network configurations. Wired network example. Wireless network examples

SCHOOL DISTRICT OF MARION COUNTY JOB CLASSIFICATION DESCRIPTION LEVEL/POSITION: COMPUTER NETWORK SPECIALIST 4.78

N600 WiFi USB Adapter

The IT Guide to RFID Solutions for Schools. UHF RFID Technology: The Basics. The Technology, Applications, and Benefits

Best Practices for Outdoor Wireless Security

Technical and Troubleshooting. Guide AIRAVE 2.5

RFID in Document Tracking

No Wires. No Waiting. No Worries. NETWORKS WITHOUT WIRES Agoura Road, Suite 110 Calabasas, California 91302

Information Technology Services

The evolution of data connectivity

Chapter 15: Advanced Networks

Remote Services. Managing Open Systems with Remote Services

PCI Wireless Compliance with AirTight WIPS

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Nokia Siemens Networks. CPEi-lte User Manual

IEEE b WLAN PC Card

The next generation of knowledge and expertise Wireless Security Basics

54M/150M/300Mbps USB WIRELESS ADAPTER. User s Manual Version 1.8

What is Penetration Testing?

Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.

Cloud-based Wireless LAN for Enterprise, SMB, IT Service Providers and Carriers. Product Highlights. Relay2 Enterprise Access Point RA100 Datasheet

Compulink Advantage Cloud sm Software Installation, Configuration, and Performance Guide for Windows

Avaya TM G700 Media Gateway Security. White Paper

References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household

How Cisco Tracks RFID with Active RFID and Wireless LANs

Cyber Security: Beginners Guide to Firewalls

SUMMIT ASSET MANAGEMENT DATASHEET

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP

Network Documentation Checklist

IDD-213T User Manual. (Rev. 1.0) China Aerospace Telecommunications Limited

Database Security Guideline. Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Advantages of Managed Security Services

This KnowledgeShare document addresses the main types of wireless networking today based on the IEEE standard.

Active RFID Solutions for Asset Tracking and Inventory Management

Pronto Cloud Controller The Next Generation Control

Wireless g CF Card User Manual

Boosting Business Mobility and Responsiveness with the Cisco Unified Wireless Network

10 Hidden IT Risks That Might Threaten Your Law Firm

GMS NETWORK ADVANCED WIRELESS SERVICE PRODUCT SPECIFICATION

Transcription:

Wireless Networks Keeping your network running smooth and secure with the latest security and site analyses

A wireless network can be one of the most important features of your business, creating efficiencies, enhancing mobility, and allowing for real-time communication. To derive those benefits, there are two major aspects to wireless networks that require constant observation, security and performance. Both the security of your wireless network and optimization of its performance can have serious effects to the bottom line. However, Barcoding s years of wireless network experience will give your company the tools and knowledge necessary to keep your wireless network secure and fully optimized. Wireless Security Just as you don t want unwelcome visitors in your facility, the same holds true for your wireless network. Should someone gain access to your network, that person could possibly have access to all of your files and business information, as well as have the ability to infect your system with viruses and worms. A wireless network s security can be compromised by weak encryption of data packets, rogue access points, and RF coverage outside of your facility. Additionally more often than not, companies will go too long without re-evaluating their wireless infrastructure. Wireless Maintenance The Solution Many times, additional handhelds, laptops, PDA s, and access points are added to the network to fulfill a short-term demand. While this temporary solution may solve the immediate needs, over time, the overlapping of these solutions can cause interruptions in connectivity, dead spots, and/or unnecessary redundancies. Additionally, changes in the physical infrastructure of the facility, coupled with uninstalled firmware and software upgrades, can make your wireless network perform much differently than it has in the past. Barcoding Inc. has developed a process for checking both the efficiency and the security of your wireless network. This process begins with a preliminary consultation and results in your IT staff having the knowledge and tools to properly maintain and secure your network. The wireless network analysis takes stock of your facility s wireless network and evaluates the efficiency of your network. The wireless security analysis uses security auditing tools to uncover any possible security leaks in your network. Wireless Network Analysis vs. Wireless Security Audit Which do I need? While both services are similar in their structure and set-up, they produce different results. The network analysis gives you information about how well your network is performing, if you are getting the most out of each access point, and also analyzes the equipment that is connected to your network. Are your batteries giving you full-day coverage, and can an additional access point bring better coverage to lacking areas? The security analysis gives you information about how easy it is to gain access to your network, especially from unwanted individuals. Is your network reaching its security potential or are you allowing unwanted visitors to gain access to your network?

Wireless Network Analysis 1 2 3 4 5 Preliminary consultation - Before the analysis of your wireless network, a wireless RF systems engineer will sit with you to gain an understanding of your network, expectations, needs, and requirements. This ensures that the work we do will meet your standards and expectations. Here the engineer will go over how your network was designed, where you want your coverage to be, how strong you need your coverage and what problems you are having with your network. Spectrum analysis of your wireless network - A Barcoding Inc. wireless RF systems engineer will walk through your facility with a handheld Spectrum Analyzer to determine the exact radio propagation at each strategic location. This activity will give a good description of possible trouble spots and uncover any objects that might interfere with your network. Validation of infrastructure layout - At this stage, the systems engineer will review the physical hook-up of each access point, as well as review the cabling throughout your facility. This ensures proper connection of your access points, hubs, switches, and routers. Access point audit - In this step, the systems enginner reviews your access points, ensuring they are up to date on firmware revisions, as well as validating their configuration. The access points are also analyzed to determine the signal propagation and threshold. RF terminal audit (handheld & vehicle mount) - At this point in the evaluation, the systems engineer will review all firmware, making sure it is up to date, validate configuration settings, and check open issues against known fixes in newer versions. The engineer will also check to make sure keyboards are functioning, and any vehicle mounts are securely in tact. Most importantly, the engineer will check to ensure the device has good communication with your wireless network. Sample Topology Diagram - a color coded AP coverage diagram illustrating redundancies, overlap, no-coverage zones (if any) and signal strengths as measured throughout the facility is part of the complete report you receive after the wireless site survey and security audit. Along with looking at the device, the engineer will also inspect the batteries. (It is not uncommon for batteries to start losing their ability to hold a charge.) The Barcoding Inc. RF systems engineer will review the batteries in your hardware devices, making sure the contacts are clean, and they can still hold their charge. A software package can be placed on each hardware terminal to monitor the charge of each device from a centralized location.

1 2 3 4 Wireless Security Audit Preliminary consultation - Similar to the preliminary consultation of the network analysis, a wireless RF security engineer will discuss the security aspect of your network, what measures have been put in place to ensure network security, how secure you need your network, what type of encryption is running and what type you need. Here your expectations, needs, and requirements will be discussed. Security audit of your wireless network - A Barcoding Inc. RF security engineer will walk around your facility using security auditing tools that essentially try to gain access to your wireless network without authorization. This step is important in understanding how secure your network currently is, as well as determining radio propagation at strategic locations. Rogue access point detection - Rogue access points are access points that are on the network without authorization from the IT department. While they generally don t interfere with the efficiency of your wireless network, any security measures put in place can be completely compromised by rogue access points. They are typically the entry point for outsiders to gain access to your network. As in many cases, they are installed with default configurations that lack any type of security technology. Wireless security analysis - Barcoding Inc. has developed many installation methods and integration techniques to ensure your wireless network is as secure as possible. Barcoding Inc. security engineers take security one step further by understanding the intricacies of radio propagation throughout your facility. A security engineer will walk around both the inside and outside of your facility with a spectrum analyzer and security auditing tools to detect possible threats, as well as look for any vulnerabilities in your wireless network. In the end, an audit of your wireless network from Barcoding Inc. will make all the difference in the world. Intrusion Detection System Barcoding has developed an intrusion detection system for monitoring your wireless network, its usage, as well as any outside devices that are trying to gain access to your network. The intrusion detection system sets up a network of drones to monitor activity on your wireless network. Wireless drones are strategically placed throughout your facility. Inside these drones are antennas that transmit radio signals back to your server. At the server location, you can see what IP and MAC addresses are trying to gain access to your network, which access points are being used and by what equipment. With this software solution, you can tell when someone is trying to access your network. With the GPS addition, you can physically pinpoint the location of the intruding device. This system will also detect rogue access points if they are ever added to your network. A standard web interface allows a single user to monitor network usage, and uses e-mail and pop-up alerts to signal possible intrusions of the network. Using this system you can blacklist any MAC address to prevent unwanted individuals from jumping on your network.

Intrusion Detection System Wireless Devices Wireless devices, such as laptops, PDAs, portable data collectors, fax machines, and other equipment can connect to your network through a series of access points strategically placed throughout your facility. Wireless Drones Wireless drones monitor radio frequency activity on your network. They send data back to the intrusion detection system; this data includes what IP and MAC addresses are connected to your wireless network as well as the amount of activity and usage on your network. Access Points The access point takes the information from your wireless devices and transmits it to the wireless switch which then connects to your server. The access points also send data from the server to your wireless devices. Wireless Switch The wireless switch is the central hub for all information that is transmitted between your access points and your server. GPS Attachment Intrusion Detection System The Intrusion detection system gathers the data that is sent to it from the drones and passes that data on to the server. The system can either connect directly to the server or connect to your wireless switch, which would then pass the data on to the server. With the GPS addition, the location of the intruding device can be detected. The Server The server is the main piece of your network; the server stores and transmits data between both your hard-wired network and wireless network. It is not uncommon for many software programs to run directly from a server and to be emulated on wireless devices using terminal emulation. Monitoring Station The information from the Intrusion Detection System can be viewed and monitored from a central computer. Here, e-mail and pop-up alerts can inform your IT staff of possible intruders and vulnerabilities in your network.

About Barcoding Inc. Barcoding Inc. works with companies to streamline their operations through the implementation of automatic identification and data collection (AIDC) systems. Barcoding is a specialist in the design, development, and support of data collection application systems for the manufacturing, distribution, retail, and service sectors. Barcoding is committed to improving the productivity and service quality of its customers through automated data capture technology. Barcoding s expertise as a systems integrator, a software designer, and a professional services provider, allows a level of flexibility unattainable by other companies in its field. With sales offices located in Pennsylvania, Maryland, Virginia, Georgia, Florida, Illinois, Colorado, Connecticut, and Europe, Barcoding can fulfill your requirements in the Auto ID marketplace with local attention. Solutions begin at Barcoding Inc. because its sales professionals have over 150 years of combined experience in the data collection industry. In addition, Barcoding s relationships with industry leading AIDC hardware and software manufacturers ensure that its customers benefit from the most reliable, state-of-the-art technology. Below are the areas of expertise that Barcoding can bring to your business: Data Collection Terminals Scanners and Readers (Laser, CCD, Imager, Corded, Wireless, Stationary, Industrial, Long Range, High Visibility, and 2D) Barcode Printers (Zebra, O Neill, Printronix, and others) Consumables (Labels, Tags, Ribbons, and Print heads) Professional Services (Project Management, Installation, and Training) Custom Application Development (Web, Pocket PC, Palm OS, and DOS) Radio Frequency Data Collection Projects (Site Survey to Full Implementation) WLAN Systems (Wireless Computing and Voice-over-IP solutions) Maintenance Options (On-site, Depot, Flat Rate, and T&M) Leasing and Renting Programs (Handheld Terminals, Printers, Scanners, and more) From hardware and software integration to post-implementation training and support, Barcoding works with its customers every step of the way. Coordinating these functions to provide dependable, reliable, turnkey solutions is what makes Barcoding the industry leader. Look to Barcoding Inc. to provide you a positive return on your AIDC investment. For more information contact: Barcoding Inc. 2220 Boston Street Baltimore, MD 21231 888.860.SCAN (7226) info@barcoding.com www.barcoding.com