GUARDIAN AIR™

Wireless Visibility and Security for OT and IoT Environments

Top Challenges Introduced by Wireless Devices

01
Lack of Visibility

Wireless devices may never touch the network yet still communicate with critical assets, exfiltrate data and interfere with control signals, all undetected

02
Device Proliferation

Increasing reliance on wireless communications for logistics, autonomous transport and monitoring expands the attack surface

03
Inherent Vulnerabilities

As both a broadcast and shared medium, wireless signals are susceptible to interception, eavesdropping and Man-in-the-Middle attacks

04
Intermittent Operation

Appearing and disappearing from the RF spectrum makes it hard to baseline normal wireless asset behavior and detect anomalies

05
Accessible from a Distance

Bad actors just need proximity (from a rooftop, vehicle or drone) to bypass perimeter defenses, connect wirelessly and pull off an attack

Wireless Security Features

Broad Visibility

Guardian Air continuously monitors wireless spectrum technologies operating between 800 MHz and 5895 MHz to reveal the prevalence and types of wireless devices in your environment, what protocols they use and their risks.

Protocols monitored include:
  • IEEE 802 .11 (Wi-Fi)
  • Bluetooth, BLE
  • IEEE 802.15.4 (Zigbee, WirelessHART)
  • LoRaWAN
  • Celular
  • Open Drone ID (ODID)
  • Z-Wave
Threats detected include:
  • Deauthentication attacks
  • Brute force Wi-Fi key guessing
  • Bluetooth hijacking
  • Rogue devices
  • Unauthorized access points
  • Fake cell towers
  • Drones in the vicinity

Wireless Threat Detection and Prevention

Detects a wide range of wireless-specific threats, providing security teams with the right data about the electromagnetic spectrum for faster response.

Holistic Threat Correlation and Analysis

Sends data collected from wireless-enabled devices to the Nozomi Vantage platform for analysis and correlation with network and endpoint telemetry that enables you to detect complex threats with multiple vectors.

Prêmios e reconhecimentos

Dê o próximo passo.

Descubra como é fácil identificar e responder a ameaças cibernéticas automatizando a descoberta, o inventário e o gerenciamento de ativos OT e IoT .