AirEye
Categories
AirEye
AirEyeOverview
Overview
With AirEye, banking and financial institutions, healthcare delivery organizations, manufacturing plants, retail and hospitality organizations, as well as enterprises build and enforce their wireless security policy.
This policy ensures that the organization’s IT and IoT devices do not connect to available networks such as Guest or a random hotspot, potentially leaking sensitive data and violating security regulations and standards.
Through its protection mechanism, AirEye ensures that any organizational wireless device does not expose the organization’s private wired and wireless networks to unauthorized network access, device hijacking, ransomware and other malware, segmentation hopping as well as data leakage. This also includes protection for the organization’s shadow networks - wireless connections generated by corporate devices that connect to, generate, and/ or open their own Wi-Fi networks or Peer to Peer connections.
Unlike solutions that focus only on the corporate network, such as WIDS/ WIPS, network security or IoT security solutions, AirEye looks at the complete organizational airspace. This includes shadow networks and non-owned wireless devices (such as security cameras, smartphones and IoT devices) and identifies legitimate connections versus those that do not comply with the security policy and protects the organization’s managed and unmanaged devices from unauthorized connections.