Successfully reported this slideshow.
Your SlideShare is downloading. ×

Protect Your Airspace. You control your wireless space. Not others.

Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad

Check these out next

1 of 17 Ad

Protect Your Airspace. You control your wireless space. Not others.

Download to read offline

A Wireless Intrusion Protection System (WIPS)
protect your WLAN environments – preventing unauthorized access to WLANs & client devices.

Here we look at Zebra’s AirDefense Services Platform head to head comparison with other brand in the current market.

A Wireless Intrusion Protection System (WIPS)
protect your WLAN environments – preventing unauthorized access to WLANs & client devices.

Here we look at Zebra’s AirDefense Services Platform head to head comparison with other brand in the current market.

Advertisement
Advertisement

More Related Content

Slideshows for you (20)

Similar to Protect Your Airspace. You control your wireless space. Not others. (20)

Advertisement

Protect Your Airspace. You control your wireless space. Not others.

  1. 1. 2013 ALL RIGHTS RESERVED. ROOTS Communications Pte Ltd www.rootscomm.com Protect Your Airspace You control your wireless space. Not others.
  2. 2. A Wireless Intrusion Protection System (WIPS) protect your WLAN environments – preventing unauthorized access to WLANs & client devices. Here we look at Zebra’s AirDefense Services Platform head to head comparison with other brand in the current market.
  3. 3. Three Important Factors To Consider when evaluating Wireless Intrusion Protection System (WIPS) Management System usability such as dashboard view, alerts, user configurations
  4. 4. Three Important Factors To Consider when evaluating Wireless Intrusion Protection System (WIPS) Management System usability such as dashboard view, alerts, user configurations Identify Analyze & categorize different types of wireless threats
  5. 5. Three Important Factors To Consider when evaluating Wireless Intrusion Protection System (WIPS) Management System usability such as dashboard view, alerts, user configurations Identify Analyze & categorize different types of wireless threats Eliminate Identify relevant threats & terminate in the shortest time
  6. 6. Management System usability such as dashboard view, alerts, user configurations
  7. 7. Management Number of Dashboard Components Features Customizable Dashboard View Classification Rules Customizable Dashboard View Alarm Management ~35 components, system or site level Yes 38 filters with “When, If, Action” logic Yes System or site level, with filter & search Zebra AirDefense
  8. 8. Management Number of Dashboard Components Features 16 components, system level Customizable Dashboard View Yes Classification Rules Based on SSID & other characteristics Customizable Dashboard View Yes Alarm Management System level, no filter or search ~35 components, system or site level Yes 38 filters with “When, If, Action” logic Yes System or site level, with filter & search Zebra AirDefense Brand A
  9. 9. Identify Analyze & categorize different types of wireless threats
  10. 10. Threats Total numbe of Threats in Database Rogue AP Detection Ad Hoc Network Detection Accidental Association Detection Policy Compliance
  11. 11. ThreatsZebra AirDefense Total numbe of Threats in Database Rogue AP Detection Ad Hoc Network Detection Accidental Association Detection Policy Compliance 199 Yes, automatic classification Yes with additional info Yes Yes
  12. 12. ThreatsZebra AirDefense Brand A Total numbe of Threats in Database Rogue AP Detection Ad Hoc Network Detection Accidental Association Detection Policy Compliance 92 Yes, manual classification Yes No Yes 199 Yes, automatic classification Yes with additional info Yes Yes
  13. 13. Eliminate Identify relevant threats & terminate in the shortest time
  14. 14. Eliminate Zebra AirDefense Detect & terminate rogue AP in 1.39 minutes on the average Rogue AP
  15. 15. Eliminate Brand A Detect & terminate rogue AP in 3.80 minutes on the average Zebra AirDefense Detect & terminate rogue AP in 1.39 minutes on the average Rogue AP Rogue AP
  16. 16. Security & Compliance | Network Assurance | Infrastructure Management Contact us now at enquiry@rootscomm.com
  17. 17. Who is ROOTS Communications? Founded in 1997 in Singapore, ROOTS Communications is a value-added Distributor and Solutions Provider for telecommunication-related products/systems and engineering. Visit us at www.rootscomm.com today! 2016 ALL RIGHTS RESERVED. ROOTS Communications Pte Ltd www.rootscomm.com

×