AirEye

Overview

Overview

Overview

With AirEye, banking and financial institutions, healthcare delivery organizations, manufacturing plants, retail and hospitality organizations, as well as enterprises build and enforce their wireless security policy.

 

This policy ensures that the organization’s IT and IoT devices do not connect to available networks such as Guest or a random hotspot, potentially leaking sensitive data and violating security regulations and standards.

 

Through its protection mechanism, AirEye ensures that any organizational wireless device does not expose the organization’s private wired and wireless networks to unauthorized network access, device hijacking, ransomware and other malware, segmentation hopping as well as data leakage. This also includes protection for the organization’s shadow networks - wireless connections generated by corporate devices that connect to, generate, and/ or open their own Wi-Fi networks or Peer to Peer connections.

 

Unlike solutions that focus only on the corporate network, such as WIDS/ WIPS, network security or IoT security solutions, AirEye looks at the complete organizational airspace. This includes shadow networks and non-owned wireless devices (such as security cameras, smartphones and IoT devices) and identifies legitimate connections versus those that do not comply with the security policy and protects the organization’s managed and unmanaged devices from unauthorized connections.

Features and Benefits

Use Case - Visibility

Visibility into all your network airspace

Use Case - Policy Violation

Authorized and unauthorized wireless connections

Use Case - Policy Violation Alert

Alert details, including forensics and timeline

Use Case - Dual-Connectivity Alert

A P2P network, unknown to the security team