Malicious intruders are constantly probing network access points for misconfigurations, vulnerabilities, and weak security controls, in order to compromise network defenses. The growth in access to networks through wireless technologies has opened the floodgates to potential intruders and increased risk to organizations. This is especially true, since physical boundaries do not necessarily prevent access. McAfee Foundstone has extensive experience identifying access points and rogue devices, analyzing their security configurations, testing for vulnerabilities, and implementing security policies that minimize risk.
Foundstone’s Wireless Network Security Assessment meets the security challenges of business-critical wireless technologies. These technologies pose unique threats because their signals propagate outside physical boundaries and are difficult to control. Misconfigurations and weak security protocols allow for unauthorized eavesdropping and easy access.
Foundstone pioneered cutting-edge techniques for evaluating wireless networks. Understanding how enterprise vulnerabilities are exploited and how to measure subsequent risks allows our experts to create the right solutions to secure your critical assets. Working with your staff, Foundstone security consultants identify and inventory all wireless network access points, identify and exploit weaknesses in the wireless network, and assess the overall exposure of the company to wireless network attacks. The assessment recommends the best methods to secure the environment based on internal business requirements and best practices for wireless security.