Get full protection against airborne attacks that result in device hijacking using AirEye Dome:
Detect rogue and “Evil Twin” APs
Prevent corporate devices from connecting to rogue APs or Evil Twins
Prevent captive portal/ AP splash screen/ Pineapple “evil portal” attacks
Prevent wireless exploitation of devices by attacks such Ripple20 or Amnesia33
Networks and Device Hijacking
Prevent device takeover via wireless-capable devices within the corporate proximity
The enterprise digital airspace is swarming with wireless devices - a router at the cafe across the street, a security camera in an adjacent building and even a contractor's laptop. According to AirEye’s survey of Access Points (APs) at corporate sites, for each corporate AP, there are 200-250 non-corporate APs in the corporate proximity.
Any of these devices when compromised is a potential “antenna for hire”, a wireless-capable device under the control of an attacker. Such a device becomes an AP to which corporate wireless connections are diverted. An attacker now receives full network access to the corporate machine and may use this access to take over the machine.
With no control over antennae for hire that can affect a corporate’s airspace, organizations are left oblivious to such attacks and helpless to their consequences.