Airspace Risk Assessment
sponsored by AirTight Networks, Inc.

This report is the first step towards wireless vulnerability assessment of your network and managing its wireless security posture. The report gives you visibility into your airspace in terms of the number and type of wireless devices in your environment, and records the presence of vulnerabilities and potential threats to your network. Vulnerabilities are classified and ranked in terms of their severity and urgency of response.

The crucial next step is to identify your networks and classify your authorized WiFi devices. The context of which networks and devices are yours will allow the system to identify vulnerabilities and threats more accurately in the future, and recommend most suitable remedial actions for improving your network's wireless security posture.

The results in this report are based on your airspace scanned using AirTight Networks' pre-configured wireless scanners. Wireless vulnerability assessment is done by comparing the scanned data with an up-to-date vulnerability database maintained by AirTight Networks. The Common Vulnerability Scoring System (CVSS) standard has been adapted to assess wireless vulnerabilities.
(THIS RESOURCE IS NO LONGER AVAILABLE.)
 
Available Resources from AirTight Networks, Inc.
See what other users are reading via our Daily Top 50 Report
.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement