Risk Defenders will review your wireless network implementation. Risk Defenders will perform an onsite assessment using automated tools to evaluate your wireless security mechanisms. Risk Defenders will also work with your network team and/or stakeholders to understand implementation of procedures and administration of the wireless technology.
This assessment includes the following components:
-
Review of your wireless infrastructure design, implementation and guest network segmentation.
- Review of your wireless corporate policy and procedures.
- Ensure that your wireless network deployment maps to your corporate policy and procedures.
- Automated testing and manual validation of network and security controls.
- Inventory of authorized access points and connections, including wireless printers and rogue access point identification.
- Identify wireless system vulnerabilities.
- Analyze wireless traffic, verify encryption, confirm and standardize SSIDs.
Benefits:
-
Mitigates network security risks by identifying and remediating vulnerabilities in the network.
- Validates your security requirements against industry best practices.
- Prevents disruption to business operations as a result of a down network following a breach.
- Reduces cost and improves longevity of network security infrastructure through regular assessments and improvements.