Red-Detect is the the first wireless intrusion detection system to monitor wireless activity across Bluetooth and 802.11 bands

September 23, 2003

2 Min Read

LONDON -- Red-M, a leading developer of hardware and software tools for secure wireless control, today unveiled Red-Detect at VARVision in Hollywood. Red-Detect represents a new dimension in wireless security technology by being the first server-based intrusion detection system (IDS) capable of detecting vulnerabilities in both the 802.11 and Bluetooth bands.

Red-Detect not only scans enterprise airspace but also correlates intrusion events across multiple sections of a building. It then aggregates and actively reports unauthorised and unusual wireless transmissions, highlighting threats on the 802.11 and Bluetooth bands. Unusually, Red-Detect also identifies "friendly" peer-to-peer networks, which are created when two laptops talk directly to each other. Red-M says that most network users and even other IDS developers are unaware of the threat posed by such ad hoc networks.

Red-Detect answers the need for a comprehensive view of wireless activity within and surrounding the enterprise. The message from Red-M is clear: no organisation can safely assume that merely setting a "no wireless" policy will protect it from wireless security threats.

"Today, no network can exist in a safe vacuum, free from wireless security risks. All it takes is one wireless device-either within the organisation or on a neighbouring network-to expose corporate data, totally nullifying the investment that has been made in firewall technology," explained Karl Feilder, CEO of Red- M.

Red-Detect provides:

  • Round-the-clock monitoring. Captures events as they occur, 24/7.

  • Centralised event consolidation. Identifies unique attack profiles from multiple probes.

  • Secure policy conformance. Monitors policy breaches and immediately sends alerts.

  • Scaleable system. Scales to support thousands of probes in order to protect large enterprises.

  • Performance monitoring. Detects issues such as airspace overcrowding.

  • Capacity planning. Monitors access points; reports effectiveness of locations.

  • Audit tool. Provides network manager with history of all wireless events.

  • Familiar dashboard display. Presents information in accessible charts and graphs, making it easy to spot trends.

  • Customisable display. Tailors views for network managers based on needs.



Red-M

Subscribe and receive the latest news from the industry.
Join 62,000+ members. Yes it's completely free.

You May Also Like