Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec

Perimeter defence for wireless networks

Meru Networks : 28 July, 2008  (New Product)
Car park attack on wireless networks are a thing of the past with RF barrier which prevents unauthorized entry from outside the perimeter
Meru Networks has introduced RF Barrier, the first IEEE 802.11-based technology for proactively defending wireless networks against eavesdroppers and 'parking lot' attackers, who attempt to record and observe network traffic from outside a building's perimeter in order to steal sensitive and valuable information.

RF Barrier uses wireless LAN technology to block the radio-frequency (RF) signals from the corporate network as they exit the building, without disrupting internal WLAN operation. This limits an attacker's ability to eavesdrop on data and perform offline analysis.

'Parking lot' attacks take advantage of wireless propagation, or bleed-through, from within a building through the perimeter and out to a parking lot or other surrounding area. These attacks are entirely passive in nature, generating no network traffic or other sign they are occurring, and are therefore undetectable by conventional wireless intrusion prevention systems (WIPS). In an activity known as 'wardriving,' attackers drive around the perimeters of enterprises and retail sites, looking for vulnerable or exposed networks. A number of successful and costly parking lot attacks have been perpetrated, one of the most notable involving the theft of millions of users' credit-card records.

RF Barrier is the first solution using exclusively 802.11 technology to offer wireless perimeter protection for organizations with regulatory requirements or policies regarding data privacy, such as retailers, financial and government institutions, manufacturers and health-care organisations. RF Barrier protects clients with legacy security mechanisms, such as handhelds and scanners equipped only with WEP or WPA/TKIP, as well as modern WPA2- and EAP-based networks, where it helps prevent the exposure of potentially exploitable information such as user identities. Furthermore, it provides physical wireless security in remote branch offices where no IT personnel are present to detect or stop an attack from outside the site's physical boundaries.

'Previously, both wireless security and infrastructure vendors have focused on protecting the connection and the back-end network, while the perimeter - where attacks cannot be detected - has remained undefended,' said Joe Epstein, Meru's senior director of technology. 'RF Barrier mounts a strong defence by blocking signals from the designated wireless network from being effectively decoded outside the perimeter. For example, a retailer need no longer worry about the 'bleeding' of its financial data beyond the walls of the building from legacy devices that don't support the newest and most advanced security standards. As the first solution to provide cost-effective perimeter wireless protection, RF Barrier can greatly expand the network manager's confidence in the security of both legacy and modern wireless networks.'

Chicago-based produce wholesaler Anthony Marano Company has tested RF Barrier and plans to deploy it later this year. Chris Nowak, chief technology officer, said the company was seeking to protect its Wi-Fi voice infrastructure, which supports virtually all of its communication with customers and vendors.

'Our Nokia Wi-Fi smart phones handle sensitive voice calls as well as confidential emails and contact information,' Nowak said. 'With our warehouse adjacent to an interstate highway and other major roads, no one is comfortable with blasting a Wi-Fi signal all over the place. RF Barrier lets us decide exactly where we want to draw the border around the coverage area, and we know that the information stops right here. And we can keep our infrastructure tuned to maximum power without worrying about the consequences of signal bleeding. RF Barrier dramatically reduces the risk of parking lot-type security attacks - and means we won't have to make excuses to management later.'

RF Barrier (patent pending) is installed by mounting a Meru Networks wireless access point along the inside perimeter of a building, and an advanced external antenna outside the perimeter. RF Barrier technology inspects the traffic in real time to determine which part belongs to the
WLAN (and is therefore designated as sensitive) and uses the external antenna to block outbound traffic at the RF layer. Would-be attackers are limited in their ability to see useful packet information about the internal network.

Because RF Barrier uses directional antennas and selective enforcement technology, it has no impact on signals within the building or from other networks. Internal clients connect normally, with enterprise access points serving them at full speed. RF Barrier can be turned on and off as needed, giving enterprises the flexibility to allow access at certain times of day while restricting it at others.

RF Barrier is the latest addition to Meru's comprehensive security solution, which provides security across all four of the major areas subject to active wireless threats: perimeter defence, connection defense, network defense and remote threat defense. Other components of the Meru security portfolio are:.

* Rogue prevention, which detects and identifies rogues based on the wired network to which a rogue is connected as well as its over-the-air signaling.

* AirFirewall, based on Meru physical security technology that can eliminate, rather than just contain or mitigate, rogue access points and evil twins attackers.

* Per-user, per-application stateful firewall to allow policy enforcement based on both the user's identity and the nature of the traffic.

* Signature-based firewalling, for enforcing policies on peer-to-peer applications such as Skype, as well as application flows within end-to-end encrypted VPN tunnels.

* Location-based policy enforcement, which implements security decisions based on the location from which an unauthorised user is accessing the network

* Comprehensive voice and video security, which prevent the introduction of local or network-wide vulnerabilities in the presence of voice, video or heavy data traffic

* FIPS 140-2-certified algorithms, with military-grade encryption and key negotiation, including EAP-TLS and AES-CCMP using 802.11i.

* Secure remote access points, which extend enterprise security policies and network to the home offices of telecommuters and hotel rooms for mobile employees.

Bookmark and Share
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo