Wireless Security Consulting of NORMA

As the number of smart devices and the use of wireless network increased recently,
more cases of damage by hacking has been reported,
With expertise and technology, NORMA Inc. is offering wireless vulnerability inspecting service to secure customers'
wireless network.

Innovation of NORMA Consulting Service

First, we have superior technology of developing worldwide wireless vulnerability inspecting solution ‘AtEar’ .
Second, you can grasp correctly the current state of wireless devices through automatic Wi-Fi device classification
Third, we ensure confident inspection with our professional experts who obtained international wireless security qualifications such as CWNA, CWSP, etc.
Fourth, we have a penetration testing know-how through wireless network and smartphone.

Grasping Network Status of Clients
  • Grasp configuration of wireless network
  • Configuration of wired network connection
  • Wireless network’s equipment information and location of installation
  • Wireless network users’ device information
  • Inspection of security policy that is set now
Monitoring by Sites
  • Site Survey
  • Check whether registered AP works or not
  • Check clients that is using AP
  • Check whether there is any unregistered AP
  • Check whether there is any Hotspot / Ad-Hoc network
  • Measure monitoring capability from 24 hours to a week
  • Grasp connection status by traffic and AP
  • Grasp wireless network status when Burst
Penetration Testing
  • Try hacking such as penetration testing
  • Attack directly AP
  • Attack directly clients
  • Try wiretapping on wireless network
Classifying Risk Level
  • Qualifying risks that is known now
  • Degree of exposure, easy of approach, and degree of risk about existent vulnerability
  • Qualifying by considering various factors like easy of attack
Security Policy Suggestion
  • Analyze vulnerabilities of security policy applied now
  • Analyze requirements by security level
  • Suggest security policies reflecting user’s environment and requirements
  • Suggest implementable solutions and methods
  • Suggest management method according to the new security policy application
Providing Results
  • Consulting result reporting
  • Analyze the current state
  • Analyze vulnerability through pen-testing
  • Evaluate degree of risk for current status
  • Suggest security policy and implementation plan
  • Attach pen-testing and its result