Proactive, Intelligent Wireless Fencing – detect, assess, and prevent risk for IoT devices.
IoT has created the world’s largest attack surface, and the sheer volume of IoT enablement in retail environments has created new risks for organizations. Retailers must now contend with the invisible RF espionage threat of unsecured and misconfigured Shadow IoT, as well as unknown Zero-day IoT attacks.
Only through the use of LOCH’s Wireless Machine Vision platform can you detect, assess and prevent risk across new wireless frequencies like LORA, SigFox, and Bluetooth, which are currently in retail use.
Wireless is now the new network. Retailers are now using smart devices and numerous wireless technologies to communicate, including LTE, 5G, broad-spectrum IoT, CBRS as well as satellite communications, making them even more vulnerable to cyber-attacks. POS attacks have been common in the past, but new attacks on inventory management and supply chain at data centers or warehouses can be catastrophic.
AirShield for Retail
AirShield protects your organization from wireless and IoT wireless threats using wireless deep packet inspection, situational awareness, zero trust, anomaly detection, and behavioral analysis.
Asset Visibility and
Asset Configuration Management and Security Posture Monitoring
Remote Wireless Performance and Reliability Troubleshooting and Alerting
Risk Management and Compliance including PCI, HIPAA, and NIST
Data Loss Protection and protection against breaches
Attack Detection and Zero Trust Policy Violations
Threat Mitigation through Air Isolation and Deceptive Networking
Incident Response and Forensics through DVR-like capabilities
Solution Benefits for Next Generation Retailers
AirShield is built on the next generation LOCH Wireless Machine Vision platform, and provides broad-spectrum IoT wireless, CBRS and cellular security asset visibility across all retail locations to stave off liability from malicious malware and other IoT attacks like spy cameras and rogue cell towers. AirShield also provides effective performance monitoring and cost management.
Delivering intrinsic value with AirShield:
- Asset visibility and device classification
- Continuous IoT security
- Monitoring of environment
- Stop wireless attacks in the path with real-time CPE notifications
- Risk management and compliance, including PCI
- Data loss protection – prevent data from being stolen over wireless networks through the use of Air Termination or firewall block commands
- Zero Trust policy enforcement and alert notifications for violations
- Incident response and forensics through DVR-like capabilities
What Our Clients Say
“Having been in the information security business for over 20 years, I can honestly say its refreshing to buy a solution that simple just works. I am responsible for all aspects of information security, like Point of Sale, Inventory Management, PCI the list goes on. 802 Secure has helped us check the wireless IoT security box and beyond so I can move on to other things.”
Chief Information Security office, Leading Retailer
AirHook is best-in class cellular IoT security service providing organizations with a multi-layered approach to managing cellular risks, costs, and threats in real-time.Download data sheet
Wireless Machine Vision
The LOCH Wireless Machine Vision Platform provides actionable intelligence and insight for all 5G cellular and broad-spectrum wireless IoT devices.Download Solution Brief
Invisible Threats. Visible Protection.
Make AirShield part of your critical security decision making and prevent risk from the invisible RF espionage threat.
Protect the wireless WiFi 6 and 5G mobile edge by gaining visibility into IoT security blind-spots through passive monitoring of the air-space.
Take a proactive stance on IoT security with comprehensive asset discovery and visibility, risk analysis and mitigation, event detection, and response. Accurately quantify wireless and IoT risks – prior to loss or incident occurring. Accelerate wireless troubleshooting and optimize the performance of your wireless networks to prevent threats and avoid downtime.
Monitor for your IoT security’s first, second and third line of defense: a) gain alert notifications for any deviation of policy; b) identify and fix any unacceptable IoT vulnerabilities; and c) automate mitigation and response with Air Termination or Firewall block commands.