LONDON -- Red-M, the leading developer of hardware and software tools for secure wireless control, today unveiled Red-Alert Pro, the first standalone wireless probe in the world to detect the presence of Bluetooth and the 802.11 a, b and g WLAN bands. With this intrusion detection system (IDS), Red-M advances wireless security detection to a new level of capability.
Red-Alert Pro can be attached anywhere to the network to scan multiple channels around the clock. It detects unauthorised users trying to access confidential corporate data with wireless devices such as laptops, PDAs and mobile phones. Using custom written software Red-Alert Pro intelligently scrutinises network environments for known attack profiles and other security irregularities, and proactively alerts the IT department in real-time to intrusion attempts. It simultaneously monitors for the presence of Bluetooth-enabled wireless devices and non-conformance to existing wireless encryption protocol (WEP).
With a detection range of between 1,000 and 10,000 feet (depending on the construction of the building around it), Red-Alert Pro offers a high degree of flexibility in deployment and use. For organisations that have a no-wireless policy Red-Alert Pro can be used on their wired networks to detect unauthorised wireless activity. Unlike other IDS tools, Red-Alert Pro identifies peer-to-peer networks, created when two laptops talk directly to each other.
The release of Red-Alert Pro has come just weeks after the company released its server-based IDS, Red-Detect. "These two products entrench Red-M's leadership position in detection tools for the wireless world, " said Karl W Feilder, CEO of Red-M. "Both tools are fully effective in both wired and wireless environments and are ideal for moving safely to a wireless environment. The next step is protection and we'll be releasing at least two more groundbreaking products before the end of this year, both of them intrusion protection system (IPS) tools."
Feilder said that security was the key barrier to wireless networking. "Wireless technology demands a new approach to network security and even organisations that don't plan to deploy wireless technology any time soon need to mitigate against the risks of rogue access points."
Red-M