Cart:

0 item(s)
 Need help? Call 01202 339 840
×

Registration

Profile Informations

Login Datas


Register trade account

Register
First name is required!
Last name is required!
First name is not valid!
Last name is not valid!
This is not an email address!
Email address is required!
This email is already registered!
Password is required!
Enter a valid password!
Please enter 6 or more characters!
Please enter 16 or less characters!
Passwords are not same!
Terms and Conditions are required!
Email or Password is wrong!

Wireless Security Audit

Availability: In stock

Please call for pricing. Ex VAT

Quick Overview

Product Sku: WG-WIRELESS-SECURITY-AUDIT


Your final report will include a detailed explanation of the results and recommendations of the security tests undertaken. It will be broken down into plain English for IT staff and management to fully understand. 

Details

Are you looking for peace of mind with your wireless network security? Security tests are designed to give you a detailed report of the current status of your wireless security level.

Our tests are bespoke to your requirements and can be performed in two ways:

Full Corporation

Full Corporation means that we will run all tests in assistance with your IT staff. All test we be tailored to your specific business needs and will concentrate on security weaknesses that you believe your business suffers from. We will test from outside your wireless network and from within. Results have shown that 80% of network intrusions are from within the network itself.

Unassisted testing

Unassisted testing means that you will allow us to security audit your wireless network and report back to you with the results. This can often be the first line of approach as it reflects a true environment for a possible intruder to your network.

  • Wireless LAN Detection
  • Rogue Access Point detection
  • Frequency scanning
  • Packet capture
  • Encryption analysis
  • Social Engineering

Your Security Report

Your final report will include a detailed explanation of the results and recommendations of the security tests undertaken. It will be broken down into plain English for IT staff and management to fully understand. The report will be in three sections:

  • Tests that were performed and why.
  • Detailed results from tests.
  • Future security recommendations.

What tools will be used by our team?

Unless you require us to use any specific tools we will be using the tools of the preferred hacker, as these tools tend to be freely available on the internet. We will also be using industry standard professional packet capture and analysis software for detailed examination.

Additional Information

Service Type Daily Charge
Manufacturer WIFIGEAR

Attachments

My Cart

You have no items in your shopping cart.