& 
present:
Free
network airspace
security posture report
Achieve immediate network airspace visibility, control and protection
through a cloud-to-cloud integration
Just enter your Cisco Meraki API
key, and a whole new world of
visibility, control and protection
opens up to you.
No additional effort is required to benefit from 100% visibility
over your wireless assets – managed and unmanaged, and
all neighboring wireless entities bleeding into your network
airspace.
Discover all your shadow networks, employee hotspots and
other wireless entities that belong to you and you weren’t
aware of until that moment.
Reveal all the unauthorized connection initiations between
your assets and non-corporate networks and vice versa.
It’s time to see it, control it and put an end to your wireless
jungle.
Advantages
Agentless – no agents required
Easy to deploy – a Cloud-to-Cloud integration
Remote deployment – does not require on-site visits
Results in minutes – and continuously
Frictionless – zero changes in network infrastructure
Receive 100% laborless and fֿrictionless visibility
Deep dive into your network airspace, understand the implications and
dynamics through a security-as-a-service offering.
Discover all your shadow networks, dual-connected devices, and
broadcasting peer to peer devices.
Know all the wireless devices bleeding into your network airspace and
the risk they pose to your assets.
AirEye’s data from a typical customer with
1000 Access Points shows that:
of your network consists of undiscovered, unmanaged and shadow networks
External devices penetrating your airspace
See wireless security policy violations in minutes such as
misconfigurations, unauthorized connections to your networks, or
unauthorized connections from your devices to other networks.
Achieve an actionable and implementable program
Implement overall control and protection of the corporate network airspace in an
easy, quick, and prioritized process.
Finally you have the tools to enforce your wireless security policy.
Enterprise wireless security best practices:
1 Audit and enforce that all network
access and configurations are properly
implemented by the networking team
2 Unauthorized devices are
automatically identified and do not
connect to the corporate network
3 Authorized devices should not
connect to non-corporate networks
4 Authorized devices should
connect only to authorized corporate
networks
5 Unauthorized devices should
not connect to authorized devices with
dual-connectivity (such as peer to
peer technologies, e.g. Wi-Fi Direct)
6 Authorized devices should not
establish ad-hoc networks such as
hotspots, file transfer, etc. Automatically
prevent over the air attacks
Need More? Advanced Wireless Attack Protection
AirEye network
airspace analysis
detects and prevents
wireless attacks that
result in:
- Unauthorized Network Access
- Device Hijacking
- Assess how vulnerable your environment is to SSID Stripping
- Segmentation Hopping
The AirEye
platform
also includes
protection
against:
- Rogue Access Point
- Evil Twin Attacks
- FragAttacks
- AWDL Attacks
- Wi-Fi Phishing
- SSID Squatting
How it Works