Network Airspace Control and Protection

Right Out of the Box
Continuous network airspace monitoring to enforce the wireless security policy and prevent wireless attacks

Map all your wireless devices and access points under your control

The AirEye Dome is the only platform that delivers network airspace situational awareness.

This is the understanding of all active communications, identification of unauthorized and authorized communications, lack of communication controls, and the presence of unauthorized devices at every single moment in time within the network airspace.

The AirEye Dome is the only platform that delivers network airspace situational awareness.

This is the understanding of all active communications, identification of unauthorized and authorized communications, lack of communication controls, and the presence of unauthorized devices at every single moment in time within the network airspace.

1 MONITOR

Continuously monitor and analyze all wireless communication channels broadcasting in your corporate airspace in real time.

AirEye Dome maps all entities within the network airspace over time. These include Access Points (APs), stations, hotspots, Peer-to- Peer services, and others. AirEye Dome also maps the interactions between these entities.

In parallel to AirEye’s monitoring technology which creates a persistent map of all entities and their interactions, AirEye provides real-time continuous monitoring of such interactions.

Together, the ongoing mapping with the real-time tracking, feed the identification and detection mechanisms of the AirEye Dome.

2 IDENTIFY

Identify the different entities mapped in the airspace. Classify the entities and their interactions.

In particular, the AirEye Dome differentiates between corporate networks and stations, aka Wireless Receptors, and networks generated by non-corporate assets and non-corporate stations, aka Antenna for Hire.

AirEye Dome further adds additional attributes and characteristics to the different entities based on technical aspects of their communication and their behavior.

AirEye does this by employing protocol analysis tools as well as Machine Learning algorithms.

3 CONTROL

Enforce a corporate wireless security policy over the network airspace by identifying threats and detecting unauthorized interactions.

AirEye Dome issues an alert when a threat to corporate assets is identified per a corporate policy. These include rogue APs, Evil Twin, hotspots on corporate networks and more. All of which may result in unauthorized network access, device hijacking, segmentation hopping or data leakage.

The AirEye Dome detects and alerts in real-time when an interaction between a non-corporate device and a corporate entity is either part of a wireless attack or in violation of corporate wireless security policy. Such interactions may include corporate workstations connecting to external hotspots, sensitive devices connecting to Guest networks, or external stations communicating with corporate Peer-to-Peer services.

4 PREVENT

Automatically terminate any violating interactions between entities involved.

When the AirEye Dome identifies a violating interaction attempt, it stops that single precise interaction. All other communications continue as usual.

Only the violating connection is terminated. AirEye does not jam networks, nor is there any impact to any other networks.

SaaS, non-intrusive, laborless

AirEye Dome’s architecture allows continuous monitoring of the corporate network airspace without any additional network configuration or integrations into the corporate’s networking systems.

AirEye Dome does not impact any corporate network communications.

The AirEye Dome provides multiple built-in reports for executives and operations managers on blocked wireless attacks and prevented policy violations

Reporting

The AirEye Dome provides multiple built-in reports for executives and operations managers on blocked wireless attacks and prevented policy violations.

Attack-related reports provide the full attack story, including when the attack happened, what happened, how it happened and devices involved.

Violation-related reports include company wireless security policy violations as well as adherence to wireless-related aspects of industry standards and regulations such as PCI-DSS.

Meraki User?
See AirEye Dome in Action

Apply for a free
account now

Apply Now