SlideShare a Scribd company logo
1 of 2
Download to read offline
PRODUCT SPEC SHEET
MOTOROLA AIRDEFENSE SERVICES PLATFORM
WIRELESS IPS MODULE




 PREVENT COSTLY SECURITY BREACHES



MOTOROLA
AIRDEFENSE
WIRELESS IPS
When wireless LAN devices are insecure, your entire network backbone is left
vulnerable, no matter how much you have invested in IT security. The risk is
much more than financial – a breach can also damage your company’s reputation,
expose proprietary information and compromise customer privacy, leaving you to
face both legal and regulatory fallout.
Securing a wireless LAN is completely different than securing a wired network.
Attacks are transitory, occurring over the air, and you have no physical boundary
as the first line of defense. You need a way to constantly monitor and protect
access ... and Motorola has it.
CONSTANT, AUTOMATIC VIGILANCE                            UNMATCHED ACCURACY
The AirDefense Wireless IPS module detects               Just one insecure access point can let a unauthorized
and prevents attacks on your wireless network,           user or intruder bypass all your traditional wired security
automatically and in real time. By analyzing new and     systems. The AirDefense Wireless IPS module identifies
known threats, the AirDefense platform accurately        rogue devices and can automatically block them from
detects a wide range of threats and suspicious network   your network. Most important, it does so accurately,
activity. Context-aware detection, correlation and       targeting only intruders and rogue devices for termination.
multi-dimensional detection engines ensure that the      Less sophisticated wireless intrusion prevention systems
tool identifies only meaningful security events. Among   can easily disable a neighboring access point by mistake,
comparable systems on the market, AirDefense has the     leaving you open to unwanted liability.
lowest rate of false positive alarms.
PRODUCT SPEC SHEET
MOTOROLA AIRDEFENSE SERVICES PLATFORM
WIRELESS IPS MODULE




The AirDefense system maintains a full and accurate                          HOLISTIC WIRELESS MANAGEMENT                                           FEATURES:
                                                                                                                                                    Rogue Detection
record of its termination actions, so you can reliably                       The AirDefense Wireless IPS module runs on the                         Detect rogue access points and
track and audit them. In addition, the module complies                       AirDefense Services Platform. The AirDefense Services                  rogue clients on the network.
                                                                                                                                                    Identify, locate, and mitigate
with FCC regulations for wireless device termination.                        Platform offers seamless integration of wireless                       rogue threats.
                                                                             security and compliance solutions, WLAN infrastructure
                                                                                                                                                    Wired Network Security
                                                                             management, and remote troubleshooting tools that                      Monitoring
COMPREHENSIVE NETWORK PROTECTION
                                                                             proactively monitor WLAN performance and remedy                        Track critical assets such as point
By responding on both the wireless and wired                                                                                                        of sale systems and monitor
                                                                             connectivity issues. The AirDefense Services Platform                  network location. Identify new
networks, the AirDefense system can stop unauthorized
                                                                             is the industry’s first comprehensive service oriented                 non-wireless devices in static
wireless activity before your network is damaged.                                                                                                   network environments such as
                                                                             platform, designed to dramatically reduce your total                   branch office or stores.
The tool’s constant analysis of your wireless traffic
                                                                             cost of ownership while you achieve quicker return on
automatically determines the potential seriousness                                                                                                  Wireless Termination
                                                                             investment from your WLAN.                                             Mitigate wireless threats, with
of any threat, so you can prioritize resources to deal                                                                                              the AirTermination™ technology,
first with the most serious problems. The AirDefense                         Motorola AirDefense solutions reflect our holistic                     by disabling wireless connections
                                                                                                                                                    between intruders and authorized
solution offers the industry’s most extensive event                          approach to network design, management, security                       devices and ensure offending
library, with more than 200+ security, compliance,                           and network assurance. Motorola delivers both an                       devices are prohibited from
health, and performance alarms. AirDefense can                                                                                                      connecting and communicating on
                                                                             unrivaled indoor/outdoor wireless portfolio and the                    the network.
detect a broad range of wireless threats, including                          software tools you need to build and operate a trusted                 Wired Port Suppression
reconnaissance activities, impersonation attacks, rogue                      high-performance wireless network.                                     Disable connections on switch
exploits, denial of service attacks, extrusions (data                                                                                               ports, to which offending devices
leakage), man-in-the-middle and injection attacks, and                                                                                              are connected, to prevent rogue
                                                                             For more information on Motorola                                       devices from gaining access to
targeted key cracking attacks.                                                                                                                      the network. Wireless ACL
                                                                             AirDefense Solutions, please visit us                                  Control which wireless clients
The Wireless IPS module also has a unique technology                         on the web at motorola.com/wms                                         can access the network through a
                                                                                                                                                    wireless access control list.
for monitoring your wired network, something
                                                                                                                                                    Extensive Threat Detection
particularly important to organizations that must comply                       SYSTEM REQUIREMENTS FOR MOTOROLA AIRDEFENSE SOLUTIONS                Library
with regulatory requirements, such as PCI. AirDefense                           An AirDefense server appliance is required to run the AirDefense
                                                                                                                                                    Detect wireless threats with the
                                                                                                                                                    industry’s most extensive event
can spot both new unsanctioned wired devices and                               Services Platform and all AirDefense modules. The server appliance
                                                                                                                                                    library which includes more than
                                                                               is a true plug-and-play system with a hardened operating system,
devices that have gone missing, such as point of sale                                                                                               200 security, compliance, health,
                                                                               optimized database, and application software included.               and performance alarms.
systems. The ability to track devices is essential in
                                                                               Current model options include:
environments that transmit or store sensitive data,                            •	     Model 1252
                                                                                                                                                    Policy and Compliance
                                                                                                                                                    Reporting
such as credit cards or patient information.                                   •	     Model 3652                                                    Reporting for regulatory mandates
                                                                                                                                                    such as PCI DSS, DoD 8100.2,
                                                                               •	     Model 4250                                                    HIPAA, GLBA and Sarbanes-
COMPLETE REPORTING CAPABILITY                                                  Please see each Motorola AirDefense server appliance specification   Oxley as well as corporate policy
                                                                               sheet for model specs.                                               enforcement.
The Wireless IPS module includes a number of built-in
reports covering a variety of wireless network activity
and compliance requirements from auditors. You
can also build your own highly customized reports in
minutes, using graphs to provide a quick snapshot of
important metrics. The system provides reporting tools
that fully satisfy most current regulatory mandates, such
as PCI DSS, DoD 8100.2, HIPAA, GLBA and Sarbanes-
Oxley, as well as corporate policy enforcement.




motorola.com

Part number G3-22-111. MOTOROLA, MOTO, MOTOROLA SOLUTIONS and the Stylized M Logo are trademarks or registered trademarks of Motorola
Trademark Holdings, LLC and are used under license. All other trademarks are the property of their respective owners. © 2010 Motorola, Inc.
All rights reserved.

More Related Content

What's hot

Axial What We Do
Axial What We DoAxial What We Do
Axial What We Dodmcleodglas
 
Internet of Things Security - Trust in the supply chain
Internet of Things Security  - Trust in the supply chainInternet of Things Security  - Trust in the supply chain
Internet of Things Security - Trust in the supply chainDuncan Purves
 
DSS ITSEC 2012 ForeScout Technical RIGA
DSS ITSEC 2012 ForeScout Technical RIGADSS ITSEC 2012 ForeScout Technical RIGA
DSS ITSEC 2012 ForeScout Technical RIGAAndris Soroka
 
Cat6500 Praesentation
Cat6500 PraesentationCat6500 Praesentation
Cat6500 PraesentationSophan_Pheng
 
Porque cambiar de IPSec a SSL VPN
Porque cambiar de IPSec a SSL VPNPorque cambiar de IPSec a SSL VPN
Porque cambiar de IPSec a SSL VPNaloscocco
 
Refense Security Risk Briefing July 2009
Refense   Security Risk Briefing   July 2009Refense   Security Risk Briefing   July 2009
Refense Security Risk Briefing July 2009apompliano
 
NETWORK SECURITY USING LINUX INTRUSION DETECTION SYSTEM
NETWORK SECURITY USING LINUX INTRUSION DETECTION SYSTEMNETWORK SECURITY USING LINUX INTRUSION DETECTION SYSTEM
NETWORK SECURITY USING LINUX INTRUSION DETECTION SYSTEMIJORCS
 
White Paper: Defense In Breadth
White Paper: Defense In BreadthWhite Paper: Defense In Breadth
White Paper: Defense In BreadthCourtland Smith
 
Ds nsa series_us_10_april10
Ds nsa series_us_10_april10Ds nsa series_us_10_april10
Ds nsa series_us_10_april10Yustinus Malawau
 
Huneed-Cisco Perimeter Security Solution Guide
Huneed-Cisco Perimeter Security Solution GuideHuneed-Cisco Perimeter Security Solution Guide
Huneed-Cisco Perimeter Security Solution GuideGlen Yi
 
Dell sonicwall connected security
Dell sonicwall connected securityDell sonicwall connected security
Dell sonicwall connected securityMotty Ben Atia
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep securityTrend Micro
 
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FIIMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FIIJNSA Journal
 
Datasheet: Umbrella Everywhere Solution Overview
Datasheet: Umbrella Everywhere Solution OverviewDatasheet: Umbrella Everywhere Solution Overview
Datasheet: Umbrella Everywhere Solution OverviewCourtland Smith
 
Cevn Vibert. Thales UK. 28th January
Cevn Vibert. Thales UK. 28th JanuaryCevn Vibert. Thales UK. 28th January
Cevn Vibert. Thales UK. 28th JanuaryUKTI2014
 
Build Redundant and Resilient Networks with Micro-Segmentation
Build Redundant and Resilient Networks with Micro-SegmentationBuild Redundant and Resilient Networks with Micro-Segmentation
Build Redundant and Resilient Networks with Micro-SegmentationWestermo Network Technologies
 
Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...
Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...
Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...Xirrus
 
20090106c Presentation Custom
20090106c   Presentation   Custom20090106c   Presentation   Custom
20090106c Presentation Customgkelley
 

What's hot (20)

Axial What We Do
Axial What We DoAxial What We Do
Axial What We Do
 
Internet of Things Security - Trust in the supply chain
Internet of Things Security  - Trust in the supply chainInternet of Things Security  - Trust in the supply chain
Internet of Things Security - Trust in the supply chain
 
DSS ITSEC 2012 ForeScout Technical RIGA
DSS ITSEC 2012 ForeScout Technical RIGADSS ITSEC 2012 ForeScout Technical RIGA
DSS ITSEC 2012 ForeScout Technical RIGA
 
Cat6500 Praesentation
Cat6500 PraesentationCat6500 Praesentation
Cat6500 Praesentation
 
Porque cambiar de IPSec a SSL VPN
Porque cambiar de IPSec a SSL VPNPorque cambiar de IPSec a SSL VPN
Porque cambiar de IPSec a SSL VPN
 
Refense Security Risk Briefing July 2009
Refense   Security Risk Briefing   July 2009Refense   Security Risk Briefing   July 2009
Refense Security Risk Briefing July 2009
 
NETWORK SECURITY USING LINUX INTRUSION DETECTION SYSTEM
NETWORK SECURITY USING LINUX INTRUSION DETECTION SYSTEMNETWORK SECURITY USING LINUX INTRUSION DETECTION SYSTEM
NETWORK SECURITY USING LINUX INTRUSION DETECTION SYSTEM
 
Network Access Control (NAC)
Network Access Control (NAC)Network Access Control (NAC)
Network Access Control (NAC)
 
White Paper: Defense In Breadth
White Paper: Defense In BreadthWhite Paper: Defense In Breadth
White Paper: Defense In Breadth
 
Ngfw overview
Ngfw overviewNgfw overview
Ngfw overview
 
Ds nsa series_us_10_april10
Ds nsa series_us_10_april10Ds nsa series_us_10_april10
Ds nsa series_us_10_april10
 
Huneed-Cisco Perimeter Security Solution Guide
Huneed-Cisco Perimeter Security Solution GuideHuneed-Cisco Perimeter Security Solution Guide
Huneed-Cisco Perimeter Security Solution Guide
 
Dell sonicwall connected security
Dell sonicwall connected securityDell sonicwall connected security
Dell sonicwall connected security
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep security
 
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FIIMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
 
Datasheet: Umbrella Everywhere Solution Overview
Datasheet: Umbrella Everywhere Solution OverviewDatasheet: Umbrella Everywhere Solution Overview
Datasheet: Umbrella Everywhere Solution Overview
 
Cevn Vibert. Thales UK. 28th January
Cevn Vibert. Thales UK. 28th JanuaryCevn Vibert. Thales UK. 28th January
Cevn Vibert. Thales UK. 28th January
 
Build Redundant and Resilient Networks with Micro-Segmentation
Build Redundant and Resilient Networks with Micro-SegmentationBuild Redundant and Resilient Networks with Micro-Segmentation
Build Redundant and Resilient Networks with Micro-Segmentation
 
Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...
Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...
Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...
 
20090106c Presentation Custom
20090106c   Presentation   Custom20090106c   Presentation   Custom
20090106c Presentation Custom
 

Viewers also liked

GREETINGS FROM ANIRUDH GROUP
GREETINGS FROM ANIRUDH GROUPGREETINGS FROM ANIRUDH GROUP
GREETINGS FROM ANIRUDH GROUPAnirudh CJ
 
부평건마 마포건마 《천안오피》 동탄건마
부평건마 마포건마 《천안오피》 동탄건마부평건마 마포건마 《천안오피》 동탄건마
부평건마 마포건마 《천안오피》 동탄건마sfalzgyc4
 
наша спільна справа ст.6
наша спільна справа ст.6наша спільна справа ст.6
наша спільна справа ст.6Сергей Бойко
 
동탄건마 청주건마 《선릉오피》 분당건마
동탄건마 청주건마 《선릉오피》 분당건마동탄건마 청주건마 《선릉오피》 분당건마
동탄건마 청주건마 《선릉오피》 분당건마sfalzgyc4
 
CBS-reference letter the ward agency
CBS-reference letter the ward agencyCBS-reference letter the ward agency
CBS-reference letter the ward agencyTony Raymond
 
Mechanic_Diploma
Mechanic_DiplomaMechanic_Diploma
Mechanic_DiplomaEric Dube
 
평촌오피 부평오피 목동오피 선릉역오피걸 무료성인자료
평촌오피 부평오피 목동오피 선릉역오피걸 무료성인자료평촌오피 부평오피 목동오피 선릉역오피걸 무료성인자료
평촌오피 부평오피 목동오피 선릉역오피걸 무료성인자료lycttidl6
 

Viewers also liked (13)

K Scott recommendation -signed
K Scott recommendation -signedK Scott recommendation -signed
K Scott recommendation -signed
 
GREETINGS FROM ANIRUDH GROUP
GREETINGS FROM ANIRUDH GROUPGREETINGS FROM ANIRUDH GROUP
GREETINGS FROM ANIRUDH GROUP
 
부평건마 마포건마 《천안오피》 동탄건마
부평건마 마포건마 《천안오피》 동탄건마부평건마 마포건마 《천안오피》 동탄건마
부평건마 마포건마 《천안오피》 동탄건마
 
IDESA_Certificate
IDESA_CertificateIDESA_Certificate
IDESA_Certificate
 
наша спільна справа ст.6
наша спільна справа ст.6наша спільна справа ст.6
наша спільна справа ст.6
 
Sobre o caso da prepotencia
Sobre o caso da prepotenciaSobre o caso da prepotencia
Sobre o caso da prepotencia
 
동탄건마 청주건마 《선릉오피》 분당건마
동탄건마 청주건마 《선릉오피》 분당건마동탄건마 청주건마 《선릉오피》 분당건마
동탄건마 청주건마 《선릉오피》 분당건마
 
CBS-reference letter the ward agency
CBS-reference letter the ward agencyCBS-reference letter the ward agency
CBS-reference letter the ward agency
 
Mechanic_Diploma
Mechanic_DiplomaMechanic_Diploma
Mechanic_Diploma
 
Cs lab viva
Cs lab vivaCs lab viva
Cs lab viva
 
BUS 640 WEEK 1
BUS 640 WEEK 1BUS 640 WEEK 1
BUS 640 WEEK 1
 
평촌오피 부평오피 목동오피 선릉역오피걸 무료성인자료
평촌오피 부평오피 목동오피 선릉역오피걸 무료성인자료평촌오피 부평오피 목동오피 선릉역오피걸 무료성인자료
평촌오피 부평오피 목동오피 선릉역오피걸 무료성인자료
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentation
 

Similar to 12 wireless ips-ss_12-17-10_a

Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...Underwriters Laboratories
 
Wireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your EnterpriseWireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your EnterpriseAirTight Networks
 
Wireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docxWireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docxadolphoyonker
 
Air defense network_assurance_brochure
Air defense network_assurance_brochureAir defense network_assurance_brochure
Air defense network_assurance_brochureAdvantec Distribution
 
The sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work forceThe sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work forceIcomm Technologies
 
Wireless security report
Wireless security reportWireless security report
Wireless security reportMarynol Cahinde
 
Wireless network security threats countermeasure
Wireless network security threats countermeasureWireless network security threats countermeasure
Wireless network security threats countermeasureEdie II
 
Conquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the EnterpriseConquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the EnterpriseAirTight Networks
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless NetworkingGulshanAra14
 
Protect your guest wifi - NOW
Protect your guest wifi - NOWProtect your guest wifi - NOW
Protect your guest wifi - NOWJoshua Sibaja
 
Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level securityChetan Kumar S
 
ClubHack Magazine issue 26 March 2012
ClubHack Magazine issue 26 March 2012ClubHack Magazine issue 26 March 2012
ClubHack Magazine issue 26 March 2012ClubHack
 
Enterprise firewalls feature and benefits
Enterprise firewalls feature and benefitsEnterprise firewalls feature and benefits
Enterprise firewalls feature and benefitsAnthony Daniel
 
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...CSCJournals
 

Similar to 12 wireless ips-ss_12-17-10_a (20)

Ad enterprise datasheet
Ad enterprise datasheetAd enterprise datasheet
Ad enterprise datasheet
 
Wns rogues wp_1011_v3
Wns rogues wp_1011_v3Wns rogues wp_1011_v3
Wns rogues wp_1011_v3
 
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
 
Wireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your EnterpriseWireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your Enterprise
 
Wireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docxWireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docx
 
Air defense network_assurance_brochure
Air defense network_assurance_brochureAir defense network_assurance_brochure
Air defense network_assurance_brochure
 
The sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work forceThe sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work force
 
Wireless security report
Wireless security reportWireless security report
Wireless security report
 
Wlan security
Wlan securityWlan security
Wlan security
 
Wireless network security threats countermeasure
Wireless network security threats countermeasureWireless network security threats countermeasure
Wireless network security threats countermeasure
 
Conquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the EnterpriseConquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the Enterprise
 
Air defense ap_test_spec_sheet
Air defense ap_test_spec_sheetAir defense ap_test_spec_sheet
Air defense ap_test_spec_sheet
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
Protect your guest wifi - NOW
Protect your guest wifi - NOWProtect your guest wifi - NOW
Protect your guest wifi - NOW
 
Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level security
 
ClubHack Magazine issue 26 March 2012
ClubHack Magazine issue 26 March 2012ClubHack Magazine issue 26 March 2012
ClubHack Magazine issue 26 March 2012
 
Enterprise firewalls feature and benefits
Enterprise firewalls feature and benefitsEnterprise firewalls feature and benefits
Enterprise firewalls feature and benefits
 
Sonic wall tz series
Sonic wall tz seriesSonic wall tz series
Sonic wall tz series
 
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
 

More from Advantec Distribution (20)

E pmp for public presentation feb 27 2015
E pmp for public presentation feb 27 2015E pmp for public presentation feb 27 2015
E pmp for public presentation feb 27 2015
 
1 wi ng5_wlan_brochure
1 wi ng5_wlan_brochure1 wi ng5_wlan_brochure
1 wi ng5_wlan_brochure
 
Vx9000 datasheet
Vx9000 datasheetVx9000 datasheet
Vx9000 datasheet
 
Nx7500 datasheet
Nx7500 datasheetNx7500 datasheet
Nx7500 datasheet
 
Nx9500 datasheet
Nx9500 datasheetNx9500 datasheet
Nx9500 datasheet
 
Nx4500 6500 datasheet
Nx4500 6500 datasheetNx4500 6500 datasheet
Nx4500 6500 datasheet
 
Rfs7000 datasheet
Rfs7000 datasheetRfs7000 datasheet
Rfs7000 datasheet
 
Rfs6000 datasheet
Rfs6000 datasheetRfs6000 datasheet
Rfs6000 datasheet
 
Rfs4000 datasheet
Rfs4000 datasheetRfs4000 datasheet
Rfs4000 datasheet
 
Ap8200 datasheet
Ap8200 datasheetAp8200 datasheet
Ap8200 datasheet
 
Ap7181 datasheet
Ap7181 datasheetAp7181 datasheet
Ap7181 datasheet
 
Ap8222 datasheet
Ap8222 datasheetAp8222 datasheet
Ap8222 datasheet
 
Ap8163 datasheet
Ap8163 datasheetAp8163 datasheet
Ap8163 datasheet
 
Ap6562 datasheet
Ap6562 datasheetAp6562 datasheet
Ap6562 datasheet
 
Ap8122 datasheet
Ap8122 datasheetAp8122 datasheet
Ap8122 datasheet
 
Ap8132 datasheet
Ap8132 datasheetAp8132 datasheet
Ap8132 datasheet
 
Ap7532 datasheet
Ap7532 datasheetAp7532 datasheet
Ap7532 datasheet
 
Ap7502 datasheet
Ap7502 datasheetAp7502 datasheet
Ap7502 datasheet
 
Ap7131 datasheet
Ap7131 datasheetAp7131 datasheet
Ap7131 datasheet
 
Ap7522 datasheet
Ap7522 datasheetAp7522 datasheet
Ap7522 datasheet
 

Recently uploaded

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 

Recently uploaded (20)

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 

12 wireless ips-ss_12-17-10_a

  • 1. PRODUCT SPEC SHEET MOTOROLA AIRDEFENSE SERVICES PLATFORM WIRELESS IPS MODULE PREVENT COSTLY SECURITY BREACHES MOTOROLA AIRDEFENSE WIRELESS IPS When wireless LAN devices are insecure, your entire network backbone is left vulnerable, no matter how much you have invested in IT security. The risk is much more than financial – a breach can also damage your company’s reputation, expose proprietary information and compromise customer privacy, leaving you to face both legal and regulatory fallout. Securing a wireless LAN is completely different than securing a wired network. Attacks are transitory, occurring over the air, and you have no physical boundary as the first line of defense. You need a way to constantly monitor and protect access ... and Motorola has it. CONSTANT, AUTOMATIC VIGILANCE UNMATCHED ACCURACY The AirDefense Wireless IPS module detects Just one insecure access point can let a unauthorized and prevents attacks on your wireless network, user or intruder bypass all your traditional wired security automatically and in real time. By analyzing new and systems. The AirDefense Wireless IPS module identifies known threats, the AirDefense platform accurately rogue devices and can automatically block them from detects a wide range of threats and suspicious network your network. Most important, it does so accurately, activity. Context-aware detection, correlation and targeting only intruders and rogue devices for termination. multi-dimensional detection engines ensure that the Less sophisticated wireless intrusion prevention systems tool identifies only meaningful security events. Among can easily disable a neighboring access point by mistake, comparable systems on the market, AirDefense has the leaving you open to unwanted liability. lowest rate of false positive alarms.
  • 2. PRODUCT SPEC SHEET MOTOROLA AIRDEFENSE SERVICES PLATFORM WIRELESS IPS MODULE The AirDefense system maintains a full and accurate HOLISTIC WIRELESS MANAGEMENT FEATURES: Rogue Detection record of its termination actions, so you can reliably The AirDefense Wireless IPS module runs on the Detect rogue access points and track and audit them. In addition, the module complies AirDefense Services Platform. The AirDefense Services rogue clients on the network. Identify, locate, and mitigate with FCC regulations for wireless device termination. Platform offers seamless integration of wireless rogue threats. security and compliance solutions, WLAN infrastructure Wired Network Security management, and remote troubleshooting tools that Monitoring COMPREHENSIVE NETWORK PROTECTION proactively monitor WLAN performance and remedy Track critical assets such as point By responding on both the wireless and wired of sale systems and monitor connectivity issues. The AirDefense Services Platform network location. Identify new networks, the AirDefense system can stop unauthorized is the industry’s first comprehensive service oriented non-wireless devices in static wireless activity before your network is damaged. network environments such as platform, designed to dramatically reduce your total branch office or stores. The tool’s constant analysis of your wireless traffic cost of ownership while you achieve quicker return on automatically determines the potential seriousness Wireless Termination investment from your WLAN. Mitigate wireless threats, with of any threat, so you can prioritize resources to deal the AirTermination™ technology, first with the most serious problems. The AirDefense Motorola AirDefense solutions reflect our holistic by disabling wireless connections between intruders and authorized solution offers the industry’s most extensive event approach to network design, management, security devices and ensure offending library, with more than 200+ security, compliance, and network assurance. Motorola delivers both an devices are prohibited from health, and performance alarms. AirDefense can connecting and communicating on unrivaled indoor/outdoor wireless portfolio and the the network. detect a broad range of wireless threats, including software tools you need to build and operate a trusted Wired Port Suppression reconnaissance activities, impersonation attacks, rogue high-performance wireless network. Disable connections on switch exploits, denial of service attacks, extrusions (data ports, to which offending devices leakage), man-in-the-middle and injection attacks, and are connected, to prevent rogue For more information on Motorola devices from gaining access to targeted key cracking attacks. the network. Wireless ACL AirDefense Solutions, please visit us Control which wireless clients The Wireless IPS module also has a unique technology on the web at motorola.com/wms can access the network through a wireless access control list. for monitoring your wired network, something Extensive Threat Detection particularly important to organizations that must comply SYSTEM REQUIREMENTS FOR MOTOROLA AIRDEFENSE SOLUTIONS Library with regulatory requirements, such as PCI. AirDefense An AirDefense server appliance is required to run the AirDefense Detect wireless threats with the industry’s most extensive event can spot both new unsanctioned wired devices and Services Platform and all AirDefense modules. The server appliance library which includes more than is a true plug-and-play system with a hardened operating system, devices that have gone missing, such as point of sale 200 security, compliance, health, optimized database, and application software included. and performance alarms. systems. The ability to track devices is essential in Current model options include: environments that transmit or store sensitive data, • Model 1252 Policy and Compliance Reporting such as credit cards or patient information. • Model 3652 Reporting for regulatory mandates such as PCI DSS, DoD 8100.2, • Model 4250 HIPAA, GLBA and Sarbanes- COMPLETE REPORTING CAPABILITY Please see each Motorola AirDefense server appliance specification Oxley as well as corporate policy sheet for model specs. enforcement. The Wireless IPS module includes a number of built-in reports covering a variety of wireless network activity and compliance requirements from auditors. You can also build your own highly customized reports in minutes, using graphs to provide a quick snapshot of important metrics. The system provides reporting tools that fully satisfy most current regulatory mandates, such as PCI DSS, DoD 8100.2, HIPAA, GLBA and Sarbanes- Oxley, as well as corporate policy enforcement. motorola.com Part number G3-22-111. MOTOROLA, MOTO, MOTOROLA SOLUTIONS and the Stylized M Logo are trademarks or registered trademarks of Motorola Trademark Holdings, LLC and are used under license. All other trademarks are the property of their respective owners. © 2010 Motorola, Inc. All rights reserved.