Wistia - Trusted Wireless Environment

Videos from watchguard's Wistia project

  • Neighbor Access Point0:46

    Neighbor Access Point

    When an authorized client connects to an external neighboring access point, bypassing the company’s perimeter security and security restrictions set by the firewall.

    Watch Video
  • Rogue Client0:55

    Rogue Client

    Any client previously connected to a rogue access point or other malicious access point within the range of a private network is considered a rogue client.

    Watch Video
  • Ad-hoc Network0:53

    Ad-hoc Network

    A peer-to-peer Wi-Fi connection between clients that lets two+ devices communicate with each other directly, circumventing network security policies and making the traffic invisible.

    Watch Video
  • Evil Twin Access Point0:59

    Evil Twin Access Point

    An evil twin access point will mimic a legitimate access point, spoofing its SSID and unique MAC address.

    Watch Video
  • Rogue Access Point1:00

    Rogue Access Point

    A rogue access point is a wireless access point that has been installed on a secure network without explicit authorization from an administrator.

    Watch Video
  • Concurrent Threats0:36

    Concurrent Threats

    Crowded places like conference centers, train stations, airports, and concerts are perfect places for a hacker to take advantage of any and all Wi-Fi attack vectors.

    Watch Video
  • Misconfigured Access Point0:59

    Misconfigured Access Point

    In networks where new access points are being deployed, it can be easy for network administrators to accidentally make a configuration mistake and leave default settings unchanged.

    Watch Video
  • Trusted Wireless Environment 0:41

    Trusted Wireless Environment

    A Trusted Wireless Environment is a framework for building a complete Wi-Fi network that is fast, easy to manage, and most importantly, secure.

    Watch Video
  • loading
    Loading More...