Wireless Security Assessment


Secure wireless by Design & Continous threat vector analysis

Analysis, testing and scanning delivered as an Assurance model 

Deploying wireless throughout your organisation can offer extensive productivity benefits but it also introduces an additional risk to your security posture. The risk profile has widened in recent years with ageing networks unable to keep in line with newly discovered vulnerabilities and more sophisticated forms of attack.  

SecOps approach is thorough and practical starting with: Design Review, Threat Vector Analysis, Testing and Scanning, Remediation, and Continuous Review.  


final icons-03.png

Why wireless is particularly vulnerable?

- Patching is often delayed or not done at all due to potential outages and resource constraints leaving these devices vulnerable to attack

- Budget and Resource constraints preventing organisations from adopting fully integrated Identity solutions

- Numerous mainstream attack methods: Decryption, Packet Relay, TCP connection hijacking, HTTP content injection and others

- Lack of Visibility due to legacy or basic wireless technologies deployed and in some cases poor design decisions

diagram 2-01.png

Continuous Wireless Security Assurance

The National Institute of Standards and Technology (NIST: US) advises that companies should be aware that maintaining a secure wireless network is an ongoing process that requires greater effort than that required for other networks or systems.

This is why SecOps promotes a Continuous Assurance approach for Wireless ensuring the wireless network meets compliance standards and matches the stated wireless Security policy.