AtEar [Wireless Network Vulnerabilities Check Movable Solution] - Product

 Seoul  -  South Korea
AtEar [Wireless Network Vulnerabilities Check Movable Solution]
  • AtEar [Wireless Network Vulnerabilities Check Movable Solution]
  • AtEar [Wireless Network Vulnerabilities Check Movable Solution]
Related Keyword
Security, Wireless, IoT, Internet of Things, Substitutional goods of WIPS, Vulnerability, Scanner, AtEar, NORMA, MoVIi, Mobile Vaccine, CCTV, ISS

"AtEar is Wireless Network Vulnerabilities Check Movable Solution
AtEar is movable inspecting solution that detects threats whil...

Description of the Product

Related Keyword
Security, Wireless, IoT, Internet of Things, Substitutional goods of WIPS, Vulnerability, Scanner, AtEar, NORMA, MoVIi, Mobile Vaccine, CCTV, ISS

"AtEar is Wireless Network Vulnerabilities Check Movable Solution
AtEar is movable inspecting solution that detects threats while monitroing wireless network security, And it checks wireless network security environment through Pen-testing.
- Wireless Device Management
- Wireless Vulnerability Inspection
- Tracking and Removing Unauthorized AP
- Offering Establishment Material of Wireless Security
- Utilizing Solution for Education
- Utilizing Penetration Testing Solution
  

AtEar Enterprise Pro Server - Server 
AtEar Enterprise Pro - Linux Software 
AtEar Enterprise Pro Mobile - Mobile Application
  

-Korea-
SAMSUNG, KT, 
"The National Police Agency", "Korea Rail Network Authority" "Korea Hydro & Nuclear Power" etc 

Price of the Product

Price not indicated

Technical Details

1) AP, Station Type Classification Through MAC DB Technology
  
* MAC DB :
Classify types of device (AP Type: H/W, Mobile Hotspot AP, Egg, Soft AP, etc. (15 types of device)) by company's own wireless device distinguishing technology. It can distinguish not only devices' manufacturer but also their model name (About 40 million devices). It is utilized in WIPS and NAC manufacturer and easy to understand current state of wireless network
  
2) Wireless Attack Detection, WIPS Malfunction, Shadow Area Detection
3) Analysis of Activity by Internal Wireless Users via link to Personnel Database
4) Minimization of Environment Influence through Diverse Monitoring Options
5) ISMS, ISO 27001, NORMA Policy authority
6) Easily Operated Automatic Simulated Hacking Functions.
7) Re-establishing connections with Unreachable Environments
8) With AtEar Mobile, you can track and remove unauthorized AP though sound/ vibration according to signal intensity
9) You can do integrated analysis by each branch or building and understand current wireless network environment easily through specific report

Ask for information