Extreme AirDefense®

Wireless connectivity provides unique opportunities to communicate in new and powerful ways, but it also brings its own set of vulnerabilities, complexities and management challenges. To get the best out of your wireless network without risking security of your users and business, you need the right set of tools.

Extreme AirDefense simplifies the protection, monitoring and compliance of your Wireless LAN networks. Extreme AirDefense continuously safeguards the network from external threats 24x7x365 and notifies IT staff when attacks occur, enabling an immediate response. It also enables compliance with regulations such as PCI-DSS, Sarbanes-Oxley, HIPAA, and GLBA.

  • 24x7x365 WLAN network monitoring for protection against wireless attacks
  • Industry leading threat detection library
  • Centralized aggregation and correlation of sensor data; minimizing false positives
  • Centralized management in large deployments requiring multiple appliances
  • Real-time detection of rogue devices with Automatic rogue termination for rapid response to attacks, protecting your network until the device can be physically removed
  • Locate rogue devices on a floorplan
  • Policy enforcement with instant notification and response based on policy violations
  • Advanced Forensics providing increased visibility to forensic investigations, including location forensics; determine where the device has been
  • Anomalous behavior detection monitors wireless traffic to serve as an early warning indicator
  • Built-in reporting for compliance monitoring (e.g. PCI_DSS, SOX, GLBA etc.) or create custom reports with Report-Builder
  • Liveview provides 25+ summary graphical visualizations, packet capture and decode for analysis of the live network and real-time traffic
  • Spectrum Analysis to monitor and troubleshoot even elusive, intermittent interference sources
  • Wireless Vulnerability Assessment to remotely test for vulnerabilities from the perspective of a wireless hacker
  • Bluetooth Monitoring to detect presence of unexpected BT 2.0 devices to identify potential phishing attacks based on BLE 4.0 tags
  • Enhanced detection of devices with WPA3 security using Secure Authentication of Equals (SAE). Detection of devices using Opportunistic Wireless Encryption (OWE)