802 Secure
End-to-End IoT Security
- Assess
- Enumerate IoT devices, end-user assets, and infrastructure equipment; as well as identify IoT misconfigurations and vulnerabilities.
- Detect
- Proactively detect suspicious or malicious behaviors before a breach occurs.
- Mitigate
- Fingerprint tools, techniques, and procedures of attackers with a horizontally viewed threat intelligence database.
- Report
- Generate security and compliance reports, forensic analysis, integrate with operational tools and SIEMs, and API access to data.
The 802 Secure AirShield™ Cloud provides comprehensive real-time visibility into both wireless network and IoT security threats through proactive, passive and autonomous wireless network monitoring.
AirShield Architecture
AirShield Sensors listen to IoT radio signals across multiple frequencies and protocols. These sensors proactively expose new IoT devices, assess security posture, identify attacks, and gather other intelligence and securely send it to the cloud.
A decoy network lures attackers into a Deceptive Network to fingerprint an attacker and their TTPs, and adds these adversaries to the cloud database.
The Cloud Portal provides access to an IoT device asset dashboard, IoT security risks, attack alerts, threat intelligence, reporting, and APIs to ensure the customer’s IoT security posture is improving over time.
Identify the numerous, diverse, devices and communications protocols across the broad radio frequency spectrum of the enterprise wireless networking environment. With comprehensive “visibility into the invisible,” proactive vulnerability assessment identifies and prioritizes associated security risks, and remediates issues prior to loss or incident.
Comprehensive Visibility of Vulnerabilities and Risks
Continuous, Proactive Policy Enforcement
Execute continuous, real-time policy enforcement through comprehensive auditing and measuring to identify “what is there” vs. “what is expected.”
Implement signature-less, intrusion deception with a target aware deceptive network that lures attacks into a honeynet environment that contains, tracks, and profiles the entire life-cycle of attacks to gather real threat intelligence.
Next Generation Security to Mitigate Attacks
Exportable Data for Intelligent Forensics
Export auditing data to any security, security information and event management (SIEM) and log management systems for centralized alerts, event management, forensic analysis, or automated policy generation. Enterprises can accelerate incident response, improve policies, and harden wireless networking security.
PCI Compliance
Since a primary motivation for cyber attacks has been financial gains, credit card information has been a leading target for hackers. Naturally, payment card systems have become a favorite for cyber criminals eager to make a quick dollar due to the amount of confidential information they send and receive every single day. Especially in our modern society where online sales dominate and the utilization of wireless/mobile payment systems becoming increasingly popular, it’s become paramount to prioritize your security and gain trust with your customers.
IoT Creates a New Attack Vector
As wireless and IoT technologies became more commonplace, we’re observing a shift in retail from wired to wireless connected devices. From PoS systems to inventory scanners, these devices are all sending confidential information through the airspace now. As retailers adopt IoT to streamline their daily operations and create gains in productivity and convenience, the reality is that many of these IoT and wireless devices weren’t designed with security in mind. They are commonly designed with security as an afterthought, resulting in unknown backdoors and superfluous USB ports that hackers can take easily take advantage of to compromise and gain access to the device. All of this this presents a new challenge to Retailers.