Bluetooth Monitoring?

Monitoring the Wi-Fi spectrum for unauthorized connections/probing/intrusion is quite common, but what about the Bluetooth spectrum? Shouldn’t unauthorized connections be monitored there too? Isn’t it possible for a scammer to connect with a Laptop, Computer or handheld device from outside your premises via Bluetooth and steal confidential info like payment card numbers, etc.? Especially when it is common for people to accidentally leave Bluetooth On.

That’s why, when I came across the Motorola AirDefense Bluetooth Monitoring solution, I was surprised why I was not aware of it earlier, and why they are the only ones providing such a solution.

Think of it – Bluetooth enables one to create a fairly advanced wireless network quickly, nowadays. Some (Class I Bluetooth devices, for example) even offer a decent connectivity range – about 100m. So why not be able to monitor it for leaks, especially in areas like busy retail stores where sensitive info like Payment Card Information is stored and updated regularly?

The Motorola solution integrates Bluetooth monitoring with its Wireless LAN solution. One can buy certain USB-based Bluetooth adapters and connect it to the USB port of (some of) their Access Points. With the help of their centralized Wi-Fi (and Bluetooth) monitoring software, it is possible to store a database of MAC addresses of authorized Bluetooth devices, and check for mismatches with all devices found in the network.

They say that it is possible to categorize Bluetooth devices into sanctioned, neighbor and unsanctioned (rogue), based on predetermined criterion. It is even possible to generate alarms upon discovery of unsanctioned Bluetooth devices across a particular location or over a particular time frame. This solution can monitor both the Bluetooth spectrum and Wi-Fi spectrum, and even help reduce the interference in the Wi-Fi spectrum due to Bluetooth connections.

Don’t you think that’s interesting?

excITingIP.com

You could stay up to date on Computer Networking/IT Technologies by subscribing to this blog with your email address in the sidebar box that says, ‘Get email updates when new articles are published’.




Comments are closed