SlideShare a Scribd company logo
2013 ALL RIGHTS RESERVED. ROOTS Communications Pte Ltd www.rootscomm.com
Protect Your
Airspace
You control your
wireless space.
Not others.
A Wireless Intrusion Protection System (WIPS)
protect your WLAN environments –
preventing unauthorized access to WLANs & client devices.
Here we look at Zebra’s AirDefense Services Platform head to
head comparison with other brand in the current market.
Three Important Factors To Consider
when evaluating Wireless Intrusion Protection System (WIPS)
Management
System usability such as
dashboard view, alerts,
user configurations
Three Important Factors To Consider
when evaluating Wireless Intrusion Protection System (WIPS)
Management
System usability such as
dashboard view, alerts,
user configurations
Identify
Analyze & categorize
different types of wireless
threats
Three Important Factors To Consider
when evaluating Wireless Intrusion Protection System (WIPS)
Management
System usability such as
dashboard view, alerts,
user configurations
Identify
Analyze & categorize
different types of wireless
threats
Eliminate
Identify relevant threats &
terminate in the shortest
time
Management
System usability such as dashboard view,
alerts, user configurations
Management
Number of Dashboard
Components
Features
Customizable Dashboard View
Classification Rules
Customizable Dashboard View
Alarm Management
~35 components,
system or site level
Yes
38 filters with “When, If,
Action” logic
Yes
System or site level,
with filter & search
Zebra AirDefense
Management
Number of Dashboard
Components
Features
16 components,
system level
Customizable Dashboard View Yes
Classification Rules
Based on SSID & other
characteristics
Customizable Dashboard View Yes
Alarm Management System level, no
filter or search
~35 components,
system or site level
Yes
38 filters with “When, If,
Action” logic
Yes
System or site level,
with filter & search
Zebra AirDefense Brand A
Identify
Analyze & categorize different types of
wireless threats
Threats
Total numbe of Threats
in Database
Rogue AP Detection
Ad Hoc Network
Detection
Accidental Association
Detection
Policy Compliance
ThreatsZebra AirDefense
Total numbe of Threats
in Database
Rogue AP Detection
Ad Hoc Network
Detection
Accidental Association
Detection
Policy Compliance
199
Yes, automatic
classification
Yes with additional info
Yes
Yes
ThreatsZebra AirDefense Brand A
Total numbe of Threats
in Database
Rogue AP Detection
Ad Hoc Network
Detection
Accidental Association
Detection
Policy Compliance
92
Yes, manual
classification
Yes
No
Yes
199
Yes, automatic
classification
Yes with additional info
Yes
Yes
Eliminate
Identify relevant threats & terminate in
the shortest time
Eliminate
Zebra
AirDefense
Detect & terminate rogue
AP in 1.39 minutes on
the average Rogue AP
Eliminate
Brand A
Detect & terminate rogue
AP in 3.80 minutes on
the average
Zebra
AirDefense
Detect & terminate rogue
AP in 1.39 minutes on
the average Rogue AP
Rogue AP
Security & Compliance | Network Assurance | Infrastructure Management
Contact us now at
enquiry@rootscomm.com
Who is
ROOTS Communications?
Founded in 1997 in Singapore, ROOTS Communications is a value-added
Distributor and Solutions Provider for telecommunication-related
products/systems and engineering.
Visit us at www.rootscomm.com today!
2016 ALL RIGHTS RESERVED. ROOTS Communications Pte Ltd www.rootscomm.com

More Related Content

What's hot

How to improve endpoint security on a SMB budget
How to improve endpoint security on a SMB budgetHow to improve endpoint security on a SMB budget
How to improve endpoint security on a SMB budget
Lumension
 
Achieving Continuous Monitoring with Security Automation
Achieving Continuous Monitoring with Security AutomationAchieving Continuous Monitoring with Security Automation
Achieving Continuous Monitoring with Security Automation
Tripwire
 
OSB140: Want a Safer Network? You Can Remove Local Admin Rights with Ivanti A...
OSB140: Want a Safer Network? You Can Remove Local Admin Rights with Ivanti A...OSB140: Want a Safer Network? You Can Remove Local Admin Rights with Ivanti A...
OSB140: Want a Safer Network? You Can Remove Local Admin Rights with Ivanti A...
Ivanti
 
Werner Schierschmidt
Werner SchierschmidtWerner Schierschmidt
Werner Schierschmidt
NOSA (Pty) Ltd
 
Enterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A BossEnterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A Boss
rbrockway
 
How to Audit Firewall, what are the standard Practices for Firewall Audit
How to Audit Firewall, what are the standard Practices for Firewall AuditHow to Audit Firewall, what are the standard Practices for Firewall Audit
How to Audit Firewall, what are the standard Practices for Firewall Audit
keyuradmin
 
Effective Vulnerability Management
Effective Vulnerability ManagementEffective Vulnerability Management
Effective Vulnerability Management
Vicky Ames
 
SYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionSYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration Introduction
Dsunte Wilson
 
Outpost Network Security Suite 3.0
Outpost Network Security Suite 3.0Outpost Network Security Suite 3.0
Outpost Network Security Suite 3.0
avgsecurity
 
Ransomware
RansomwareRansomware
Preventing zero day cyber attacks
Preventing zero day cyber attacksPreventing zero day cyber attacks
Preventing zero day cyber attacks
Paresh Thakkar
 
Computer viruses and removal techniques
Computer viruses and removal techniquesComputer viruses and removal techniques
Computer viruses and removal techniques
St. Joseph Health System
 
Operating system security
Operating system securityOperating system security
Operating system security
Ramesh Ogania
 
Information security-toolkit-76396-8
Information security-toolkit-76396-8Information security-toolkit-76396-8
Information security-toolkit-76396-8
colleenatrsc
 
OS Security 2009
OS Security 2009OS Security 2009
OS Security 2009
Deborah Obasogie
 
Operating system security
Operating system securityOperating system security
Operating system security
Sarmad Makhdoom
 
Ransomware Prevention Guide
Ransomware Prevention GuideRansomware Prevention Guide
Ransomware Prevention Guide
Brian Honan
 
Auditing Check Point Firewalls
Auditing Check Point FirewallsAuditing Check Point Firewalls
Auditing Check Point Firewalls
Ben Rothke
 
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection CenterSYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
Dsunte Wilson
 
Vulnerability Malware And Risk
Vulnerability Malware And RiskVulnerability Malware And Risk
Vulnerability Malware And Risk
Chandrashekhar B
 

What's hot (20)

How to improve endpoint security on a SMB budget
How to improve endpoint security on a SMB budgetHow to improve endpoint security on a SMB budget
How to improve endpoint security on a SMB budget
 
Achieving Continuous Monitoring with Security Automation
Achieving Continuous Monitoring with Security AutomationAchieving Continuous Monitoring with Security Automation
Achieving Continuous Monitoring with Security Automation
 
OSB140: Want a Safer Network? You Can Remove Local Admin Rights with Ivanti A...
OSB140: Want a Safer Network? You Can Remove Local Admin Rights with Ivanti A...OSB140: Want a Safer Network? You Can Remove Local Admin Rights with Ivanti A...
OSB140: Want a Safer Network? You Can Remove Local Admin Rights with Ivanti A...
 
Werner Schierschmidt
Werner SchierschmidtWerner Schierschmidt
Werner Schierschmidt
 
Enterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A BossEnterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A Boss
 
How to Audit Firewall, what are the standard Practices for Firewall Audit
How to Audit Firewall, what are the standard Practices for Firewall AuditHow to Audit Firewall, what are the standard Practices for Firewall Audit
How to Audit Firewall, what are the standard Practices for Firewall Audit
 
Effective Vulnerability Management
Effective Vulnerability ManagementEffective Vulnerability Management
Effective Vulnerability Management
 
SYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionSYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration Introduction
 
Outpost Network Security Suite 3.0
Outpost Network Security Suite 3.0Outpost Network Security Suite 3.0
Outpost Network Security Suite 3.0
 
Ransomware
RansomwareRansomware
Ransomware
 
Preventing zero day cyber attacks
Preventing zero day cyber attacksPreventing zero day cyber attacks
Preventing zero day cyber attacks
 
Computer viruses and removal techniques
Computer viruses and removal techniquesComputer viruses and removal techniques
Computer viruses and removal techniques
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Information security-toolkit-76396-8
Information security-toolkit-76396-8Information security-toolkit-76396-8
Information security-toolkit-76396-8
 
OS Security 2009
OS Security 2009OS Security 2009
OS Security 2009
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Ransomware Prevention Guide
Ransomware Prevention GuideRansomware Prevention Guide
Ransomware Prevention Guide
 
Auditing Check Point Firewalls
Auditing Check Point FirewallsAuditing Check Point Firewalls
Auditing Check Point Firewalls
 
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection CenterSYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
 
Vulnerability Malware And Risk
Vulnerability Malware And RiskVulnerability Malware And Risk
Vulnerability Malware And Risk
 

Similar to Protect Your Airspace. You control your wireless space. Not others.

Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint Security
Burak DAYIOGLU
 
Securing control systems v0.4
Securing control systems v0.4Securing control systems v0.4
Securing control systems v0.4
CrispnCrunch
 
Network security
Network securityNetwork security
Network security
Fekadu Abera
 
Ccnsp trainer presentation
Ccnsp trainer presentationCcnsp trainer presentation
Ccnsp trainer presentation
Soap MacTavish
 
Ceh v5 module 19 evading ids firewall and honeypot
Ceh v5 module 19 evading ids firewall and honeypotCeh v5 module 19 evading ids firewall and honeypot
Ceh v5 module 19 evading ids firewall and honeypot
Vi Tính Hoàng Nam
 
Understanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loopUnderstanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loop
David Sweigert
 
Eximbank security presentation
Eximbank security presentationEximbank security presentation
Eximbank security presentation
laonap166
 
Threat Modeling
Threat ModelingThreat Modeling
Threat Modeling
keyuradmin
 
Freeware Security Tools You Need
Freeware Security Tools You NeedFreeware Security Tools You Need
Freeware Security Tools You Need
amiable_indian
 
AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011
dma1965
 
SANS 20 Security Controls
SANS 20 Security ControlsSANS 20 Security Controls
SANS 20 Security Controls
Casey Wimmer
 
Advanced Malware Analysis Training Session 3 - Botnet Analysis Part 2
Advanced Malware Analysis Training Session 3 - Botnet Analysis Part 2Advanced Malware Analysis Training Session 3 - Botnet Analysis Part 2
Advanced Malware Analysis Training Session 3 - Botnet Analysis Part 2
securityxploded
 
Attacking antivirus
Attacking antivirusAttacking antivirus
Attacking antivirus
UltraUploader
 
Introduction to DevOps and DevOpsSec with Secure Design by Prof.Krerk (Chulal...
Introduction to DevOps and DevOpsSec with Secure Design by Prof.Krerk (Chulal...Introduction to DevOps and DevOpsSec with Secure Design by Prof.Krerk (Chulal...
Introduction to DevOps and DevOpsSec with Secure Design by Prof.Krerk (Chulal...
iotcloudserve_tein
 
Asset Insight Manager (AIM)
Asset Insight Manager (AIM) Asset Insight Manager (AIM)
Asset Insight Manager (AIM)
Dean Bishop
 
Facilities Show Presentation1
Facilities Show Presentation1Facilities Show Presentation1
Facilities Show Presentation1
Dean Bishop
 
Asset Insight Manager. CAFM
Asset Insight Manager. CAFMAsset Insight Manager. CAFM
Asset Insight Manager. CAFM
Dean Bishop
 
Darktrace_Threat_Visualizer_User_Guide.pdf
Darktrace_Threat_Visualizer_User_Guide.pdfDarktrace_Threat_Visualizer_User_Guide.pdf
Darktrace_Threat_Visualizer_User_Guide.pdf
LeninHernnCortsLlang
 
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
Andris Soroka
 
Cansecwest - The Death of AV defence in depth
Cansecwest - The Death of AV defence in depthCansecwest - The Death of AV defence in depth
Cansecwest - The Death of AV defence in depth
Thierry Zoller
 

Similar to Protect Your Airspace. You control your wireless space. Not others. (20)

Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint Security
 
Securing control systems v0.4
Securing control systems v0.4Securing control systems v0.4
Securing control systems v0.4
 
Network security
Network securityNetwork security
Network security
 
Ccnsp trainer presentation
Ccnsp trainer presentationCcnsp trainer presentation
Ccnsp trainer presentation
 
Ceh v5 module 19 evading ids firewall and honeypot
Ceh v5 module 19 evading ids firewall and honeypotCeh v5 module 19 evading ids firewall and honeypot
Ceh v5 module 19 evading ids firewall and honeypot
 
Understanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loopUnderstanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loop
 
Eximbank security presentation
Eximbank security presentationEximbank security presentation
Eximbank security presentation
 
Threat Modeling
Threat ModelingThreat Modeling
Threat Modeling
 
Freeware Security Tools You Need
Freeware Security Tools You NeedFreeware Security Tools You Need
Freeware Security Tools You Need
 
AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011
 
SANS 20 Security Controls
SANS 20 Security ControlsSANS 20 Security Controls
SANS 20 Security Controls
 
Advanced Malware Analysis Training Session 3 - Botnet Analysis Part 2
Advanced Malware Analysis Training Session 3 - Botnet Analysis Part 2Advanced Malware Analysis Training Session 3 - Botnet Analysis Part 2
Advanced Malware Analysis Training Session 3 - Botnet Analysis Part 2
 
Attacking antivirus
Attacking antivirusAttacking antivirus
Attacking antivirus
 
Introduction to DevOps and DevOpsSec with Secure Design by Prof.Krerk (Chulal...
Introduction to DevOps and DevOpsSec with Secure Design by Prof.Krerk (Chulal...Introduction to DevOps and DevOpsSec with Secure Design by Prof.Krerk (Chulal...
Introduction to DevOps and DevOpsSec with Secure Design by Prof.Krerk (Chulal...
 
Asset Insight Manager (AIM)
Asset Insight Manager (AIM) Asset Insight Manager (AIM)
Asset Insight Manager (AIM)
 
Facilities Show Presentation1
Facilities Show Presentation1Facilities Show Presentation1
Facilities Show Presentation1
 
Asset Insight Manager. CAFM
Asset Insight Manager. CAFMAsset Insight Manager. CAFM
Asset Insight Manager. CAFM
 
Darktrace_Threat_Visualizer_User_Guide.pdf
Darktrace_Threat_Visualizer_User_Guide.pdfDarktrace_Threat_Visualizer_User_Guide.pdf
Darktrace_Threat_Visualizer_User_Guide.pdf
 
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
 
Cansecwest - The Death of AV defence in depth
Cansecwest - The Death of AV defence in depthCansecwest - The Death of AV defence in depth
Cansecwest - The Death of AV defence in depth
 

Recently uploaded

CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
Claudio Di Ciccio
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
FODUU
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
Techgropse Pvt.Ltd.
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 

Recently uploaded (20)

CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 

Protect Your Airspace. You control your wireless space. Not others.

  • 1. 2013 ALL RIGHTS RESERVED. ROOTS Communications Pte Ltd www.rootscomm.com Protect Your Airspace You control your wireless space. Not others.
  • 2. A Wireless Intrusion Protection System (WIPS) protect your WLAN environments – preventing unauthorized access to WLANs & client devices. Here we look at Zebra’s AirDefense Services Platform head to head comparison with other brand in the current market.
  • 3. Three Important Factors To Consider when evaluating Wireless Intrusion Protection System (WIPS) Management System usability such as dashboard view, alerts, user configurations
  • 4. Three Important Factors To Consider when evaluating Wireless Intrusion Protection System (WIPS) Management System usability such as dashboard view, alerts, user configurations Identify Analyze & categorize different types of wireless threats
  • 5. Three Important Factors To Consider when evaluating Wireless Intrusion Protection System (WIPS) Management System usability such as dashboard view, alerts, user configurations Identify Analyze & categorize different types of wireless threats Eliminate Identify relevant threats & terminate in the shortest time
  • 6. Management System usability such as dashboard view, alerts, user configurations
  • 7. Management Number of Dashboard Components Features Customizable Dashboard View Classification Rules Customizable Dashboard View Alarm Management ~35 components, system or site level Yes 38 filters with “When, If, Action” logic Yes System or site level, with filter & search Zebra AirDefense
  • 8. Management Number of Dashboard Components Features 16 components, system level Customizable Dashboard View Yes Classification Rules Based on SSID & other characteristics Customizable Dashboard View Yes Alarm Management System level, no filter or search ~35 components, system or site level Yes 38 filters with “When, If, Action” logic Yes System or site level, with filter & search Zebra AirDefense Brand A
  • 9. Identify Analyze & categorize different types of wireless threats
  • 10. Threats Total numbe of Threats in Database Rogue AP Detection Ad Hoc Network Detection Accidental Association Detection Policy Compliance
  • 11. ThreatsZebra AirDefense Total numbe of Threats in Database Rogue AP Detection Ad Hoc Network Detection Accidental Association Detection Policy Compliance 199 Yes, automatic classification Yes with additional info Yes Yes
  • 12. ThreatsZebra AirDefense Brand A Total numbe of Threats in Database Rogue AP Detection Ad Hoc Network Detection Accidental Association Detection Policy Compliance 92 Yes, manual classification Yes No Yes 199 Yes, automatic classification Yes with additional info Yes Yes
  • 13. Eliminate Identify relevant threats & terminate in the shortest time
  • 14. Eliminate Zebra AirDefense Detect & terminate rogue AP in 1.39 minutes on the average Rogue AP
  • 15. Eliminate Brand A Detect & terminate rogue AP in 3.80 minutes on the average Zebra AirDefense Detect & terminate rogue AP in 1.39 minutes on the average Rogue AP Rogue AP
  • 16. Security & Compliance | Network Assurance | Infrastructure Management Contact us now at enquiry@rootscomm.com
  • 17. Who is ROOTS Communications? Founded in 1997 in Singapore, ROOTS Communications is a value-added Distributor and Solutions Provider for telecommunication-related products/systems and engineering. Visit us at www.rootscomm.com today! 2016 ALL RIGHTS RESERVED. ROOTS Communications Pte Ltd www.rootscomm.com