There are various types of security threats aimed at security-sensitive wireless date.
Typical threats are Rogue AP, Key Cracking, MITM (Man-In-The-Middle attack), Fake AP, and Firmware Exploit.
Perspective of General Users
As the use of wireless networks increases, existing malicious code infections and hacking attacks
occur more frequently in individuals’ daily lives.
Wireless security should be practiced from the perspective of individual users.
NORMA’s Wi-Fi Care allows users to connect to secure Wi-Fi and pursue a comfortable
and enjoyable life in safe wireless environments without any security threat.
Perspective of Business Users
Various laws and regulations related to wireless security are enforced and gradually strengthened.
Technical security measures for wireless network like ISMS, ISO 27001, wireless security guidelines,
National information security basic guidelines, IT Protecting Businesses’ Best Practices of Financial Companies,
Information Security Operational Rule of Central Governments, Information Security Operational Rule of
Public Institutions, etc. are getting to be mandatory.
It is also required to inspect frequently for fetching and using unauthorized wireless connecting devices.
Integrated analysis solution helping you observe strengthening wireless security regulations
conveniently and systematically is required!
Wireless Security Regulations
Framework Directive of Domestic Information Security
IT Protecting Businesses’ Best Practices of Financial Companies
Information Security Operational Rule of Central Governments
Information Security Guide on Business of Local Governments
Information Security Operational Rule of Public Institutions
ISMS Wireless Security Guidelines
Wireless Security Guideline of ISMS
Wireless Security Guideline of ISO 27001
Obligation of Technical Security
Obligation of constant inspecting
about whether unauthorized
wireless connection equipments
are carried in or utilized
AtEar is a movable wireless network integrated analysis solution developed to make companies comply with
strenghened wireless security regulations conveniently and systematically.
It makes your companies’ wireless network manage securely through
wireless vulnerability analysis and inspecting technology.
Practice wireless security easily and reliably with laptop and smartphone!