Home > Fluke Networks releases new signature updates to protect against emerging wireless security threats

Fluke Networks releases new signature updates to protect against emerging wireless security threats

Supplier News
logo
02 88503333

Contact supplier

Your Email * indicates mandatory fields.
image

Fluke Networks has released new threat signature updates for its AirMagnet Enterprise 9.0 wireless intrusion detection and prevention system (WIDS/WIPS).

The new signature updates offer protection against wireless threats and vulnerabilities, including Karmetasploit and Apple’s new AirDrop feature.

AirMagnet’s Intrusion Research Team monitors the latest threats, creates custom signatures and automatically pushes updates to ensure protection for the AirMagnet Enterprise 9.0 customer.

AirMagnet Enterprise uses its proprietary Dynamic Threat Update (DTU) technology to offer a unique wireless LAN (WLAN) security system that can quickly generate signature updates for immediate protection and automatically push them to customers without requiring scheduled downtime or additional IT resources.

According to Jesse Frankel, leader of the AirMagnet Intrusion Research Team, Fluke Networks' ability to immediately update against emerging threats is increasingly critical to its enterprise and government customers given the growth in WiFi networks and cybercrime.

New signature updates for AirMagnet Enterprise 9.0:

AirDrop 

Apple’s Mac OS X Lion includes the new AirDrop feature that lets multiple users share files wirelessly, an action that not only violates company security policies but also creates security risks that could result in protected data being easily transferred to unknown machines outside of the enterprise network while potentially leaving the network vulnerable to other active attacks.

Karmetasploit

An aggressive man in the middle (MitM) style attack that tricks a client into associating with a device masquerading as an access point running KARMA, Karmetasploit lets a hacker gain access to the client machine, capture passwords, harvest data and conduct a wide variety of application exploits.

DHCP Starvation Attack

A DHCP starvation attack run from a wireless client can cause other clients to connect to a malicious network, especially exposing wireless guest networks and unencrypted commercial hotspots to various threats resulting in lost productivity or revenue. 

Fluke Australia represents the Fluke Networks in Australia.

Newsletter sign-up

The latest products and news delivered to your inbox