Wireless Network Security Assessment

Identify and mitigate wireless network vulnerabilities

Next Steps:

Overview

Malicious intruders are constantly probing network access points for misconfigurations, vulnerabilities, and weak security controls, in order to compromise network defenses. The growth in access to networks through wireless technologies has opened the floodgates to potential intruders and increased risk to organizations. This is especially true, since physical boundaries do not necessarily prevent access. McAfee Foundstone has extensive experience identifying access points and rogue devices, analyzing their security configurations, testing for vulnerabilities, and implementing security policies that minimize risk.

Foundstone’s Wireless Network Security Assessment meets the security challenges of business-critical wireless technologies. These technologies pose unique threats because their signals propagate outside physical boundaries and are difficult to control. Misconfigurations and weak security protocols allow for unauthorized eavesdropping and easy access.

Key Benefits

  • Identify vulnerabilities
    Foundstone finds access points and rogue devices, analyzes security configurations, and tests for vulnerabilities.
  • Get next step recommendations
    Implement security policies that minimize risk. Our deliverables include a Wireless Security Assessment Technical Report, an Executive Summary, and a half-day workshop with a Wireless Security Assessment Presentation.

Methodology

Foundstone pioneered cutting-edge techniques for evaluating wireless networks. Understanding how enterprise vulnerabilities are exploited and how to measure subsequent risks allows our experts to create the right solutions to secure your critical assets. Working with your staff, Foundstone security consultants identify and inventory all wireless network access points, identify and exploit weaknesses in the wireless network, and assess the overall exposure of the company to wireless network attacks. The assessment recommends the best methods to secure the environment based on internal business requirements and best practices for wireless security.