Today’s rapidly changing business environment requires organizations to adopt mobility solutions to support their business strategy, organizational operations and connect more closely with customers, partners and employees while maintaining a secure network infrastructure.
Adopting emerging concepts such as BYOD (Bring Your Own Device) can enhance user productivity, performance and customer experience but also introduce avenues for attack against your users and organizational infrastructure assets.
One of our fundamental principles is “Confidence”
We will verify the security of your Wireless infrastructure and ensure that the proper security policies and controls are in place to prevent potential compromise, disruption or abuse of network resources.
The security assessment of your wireless network consists of evaluating several areas, but not limited to, organizational policy, network segmentation, configuration of wireless access points, protocol security, access and authorization mechanisms (i.e., encryption algorithms, key management, MAC address filtering etc.), testing for channel allocation, ESSID, beacon broadcast frame and recording of broadcast information, evaluation of authentication and encryption modes (i.e., WEP/WPA/WPA2) along with attempts to bypass access point controls/policy (e.g., client MAC address spoofing, MAC filtering bypassing, man-in-the middle).