Skip to content
AirEye SecurityAirEye Security
  • The Leader in Network AirspaceControl and Protection (NACP)
  • What is a NACP?
  • Technology
    • Platform
      • How it Works
    • NACP
      • Visibility
      • Control
      • Protection
    • Partners
      • Meraki
  • Solution
    • BY OVER-THE-AIR THREAT
      • Unauthorized Access
      • Data Leakage
      • Segmentation Hopping
      • Device Hijacking
    • By Industry
      • Healthcare
  • About
    • Who We Are
    • In The News
    • Careers
    • Contact Us
  • Blog
  • GET FREE ACCOUNT
Press Release

AirEye delivers a free network airspace security posture report

Posted on July 25, 2022October 13, 2022 by aireye
25
Jul

80% of companies’ wireless activity consists of undiscovered devices and shadow networks, creating the next attack surface

[Tel Aviv, Israel. July 25, 2022]

AirEye, the leader in Network Airspace Control and Protection (NACP) solutions, announced today its free offering of a laborless, hardware-less and immediate network airspace security posture analysis. 

 

Using AirEye’s technology, companies can now, at no cost, immediately receive 100% wireless asset visibility, all unauthorized connections generated by IT, IoT, IoMT, and OT, discovery of shadow networks and shadow devices, wireless network entry points that can be used by remote attackers, misconfigurations of wireless devices, and all other activity in the corporate network airspace.

 

In addition to the network airspace security posture report, network security teams can also obtain a free user account with AirEye.

 

“We opened our service to all companies at no cost including a network airspace posture analysis in response to the new emerging attack surface,” said Shlomo Touboul co-founder and CEO at AirEye. “Using cloud to cloud integration, corporate network security teams can immediately view unmanaged devices, shadow networks, unauthorized wireless connections, and gain full control over the network airspace. Therefore, customers can now eliminate data leakage, ransomware, device hijacking, and company security policy breaches that occur over the wireless networks.”

 

Sarb Sembhi, CISO, Office of the CISO at AirEye noted, “The world has moved on from wired connectivity to wireless, so much so that in most enterprises, wired devices account for 20% or less of all networked devices. Some of this has been led by staff personal devices, but also includes industrial, medical, smart building and other operational security devices. The fact that every new device produced often has more than one way for users to connect to it means that network airspace can no longer be ignored.”

 

According to Bryan Kissinger, VP and CISO at Trace3, “Wireless communications at healthcare organizations have grown exponentially over the last three years. This gave rise to shadow networks, peer to peer networks and networks created by unmanaged devices – all of these are out of their security team’s sight. However, AirEye is the only solution to now provide visibility, control and protection to those assets that would have otherwise flown under the radar of the security team.”


To register for a free company account, please visit: https://aireye.tech/get-free-account/

This entry was posted in Press Release and tagged cloud to cloud integration, free account, Meraki, report, security posture.
AirDrop: The Hackers Tool for Dummies
First-hand Account of an Anatomy of a Wireless Attack/ Hedgehog Security
AirEye Security
The Leader in Network AirspaceControl and Protection (NACP)
AirEye Security
The Leader in Network AirspaceControl and Protection (NACP)

Gartner
X5

  • 2022 Gartner® Cool Vendor in Hybrid Work Security
  • 2022 Market Guide for Medical Device Security Solutions
  • 2022 Market Guide for Operational Technology Security
  • 2022 Emerging Tech Impact Radar: Security
  • 2022 Emerging Tech Impact Radar: Communications

Contact Us

[email protected]

Aireye Linkedin

Aireye FacebookAireye LinkedinAireye Twitter

Aireye FacebookAireye LinkedinAireye Twitter

What is a NACP?

Technology

PLATFORM
How it Works

NACP

Visibility

Control

Protection

Partners

Meraki

Solution

BY OVER-THE-AIR THREAT

Unauthorized Access

Data Leakage

Segmentation Hopping

Device Hijacking

By Industry

Healthcare

About

Who We Are

In The News

Careers

Contact Us

Blog

Aireye Privacy Policy | Cookies Policy
  • GET FREE ACCOUNT
  • What is a NACP?
  • Technology
    • Platform
      • How it Works
    • NACP
      • Visibility
      • Control
      • Protection
    • Partners
      • Meraki
  • Solution
    • BY OVER-THE-AIR THREAT
      • Unauthorized Access
      • Data Leakage
      • Segmentation Hopping
      • Device Hijacking
    • By Industry
      • Healthcare
  • About
    • Who We Are
    • In The News
    • Careers
    • Contact Us
  • Blog