WiFi Hotspot Analytics

If you run a retail chain or a large services-based organization like a mall or hospital, chances are you provide WiFi hotspot, perhaps with free Internet access, to visitors and guests. With WiFi Hotspot Analytics, you can do more with WiFi users accessing Internet through your infrastructure. For example, you…

Continue reading

Bluetooth Monitoring?

Monitoring the Wi-Fi spectrum for unauthorized connections/probing/intrusion is quite common, but what about the Bluetooth spectrum? Shouldn’t unauthorized connections be monitored there too? Isn’t it possible for a scammer to connect with a Laptop, Computer or handheld device from outside your premises via Bluetooth and steal confidential info like payment…

Continue reading

IEEE 802.11ac & IEEE 802.11ad Wireless Technologies – Think beyond 802.11n!

Earlier, Wireless Networks were slow to catch up with Wired Networks in terms of speed and bandwidth. But with the implementation of IEEE 802.11n Wireless Networks, the equation slightly balanced out. Now, two more Wireless protocols (IEEE 802.11ac & IEEE 802.11ad) are in the making and they supposedly bring gigabit ethernet performance over the wireless network. Let’s learn more about these two protocols in this article.

Continue reading

How secure is your Wireless Access Point?

Wireless networks are very comfortable and easy to use. Hence, a lot of people set up Wi-Fi connections using a wireless router or wireless access points. Even a small business/ SOHO normally has a standard access point to provide wireless network access to its employees. But, how secure is this Wi-Fi connection? Can it be hacked by a determined hacker? How secure is the encryption used in Wi-Fi networks? Let us explore the answers to these questions, in this article.

Continue reading

WiFi Adhoc Networks – What they are & how to mitigate the threats posed by them

An ad-hoc network is enabled by connecting a wi-fi enabled device directly with another wi-fi enabled device over the wireless medium without requiring a wireless router / access point. But how secure is this mode of connection? What can you do to mitigate the threats posed by ad-hoc networks in an enterprise? Let us look at the answers to these questions, in this article.

Continue reading