Solution

Get full protection against airborne attacks that result in device hijacking using AirEye Dome: 

  • Detect rogue and “Evil Twin” APs

  • Detect SSID-Squatting

  • Prevent corporate devices from connecting to rogue APs or Evil Twins

  • Prevent captive portal/ AP splash screen/ Pineapple “evil portal” attacks

  • Prevent wireless exploitation of devices by attacks such Ripple20 or Amnesia33

Networks and Device Hijacking

Prevent device takeover via wireless-capable devices within the corporate proximity 

Problem

The enterprise digital airspace is swarming with wireless devices - a router at the cafe across the street, a security camera in an adjacent building and even a contractor's laptop. According to AirEye’s survey of Access Points (APs) at corporate sites, for each corporate AP, there are 200-250 non-corporate APs in the corporate proximity. 

Any of these devices when compromised is a potential “antenna for hire”, a wireless-capable device under the control of an attacker. Such a device becomes an AP to which corporate wireless connections are diverted. An attacker now receives full network access to the corporate machine and may use this access to take over the machine. 

With no control over antennae for hire that can affect a corporate’s airspace, organizations are left oblivious to such attacks and helpless to their consequences.

Ready to see AirEye Dome in action?

Schedule a demo now