Loch Technology Blog
LOCH provides full and actionable intelligence on all wireless and IoT devices to help organizations improve their security posture, reduce risk, and manage wireless data usage across the enterprise.
The Problem that we solve – 80% of edge computing is wirelessly enabled today across devices, networks, and IoT. This evolution requires a new level of visibility across not only..
802 SECURE, INC.: Developing advanced Technology for securing the internet of things (IoT), combining Software defined Radio with Big Data Analytics
802 Secure is developing solutions to help defend enterprise and government agencies from new attack vectors that cross the broader RF spectrum by offering a defense-in-depth..
802 Secure Honored as Gold and Bronze Winner in the 11th Annual 2015 Security Industry’s Global Excellence Awards
802 Secure’s Wireless Risk Audit Tool (WRAT) offers the industry’s most innovative, cloud-based wireless intrusion detection and deception solution. Unlike existing solutions,..
Shadow IoT – the use of unauthorized internet of things devices and networks – poses a new level of threats for enterprises.Organizations need to broaden their view into these..
Garry Drummond Honored as CEO of the Year in the 2017 Info Security Product Guide – Global Excellence Awards
802 Secure received four other awards (in gold, silver and bronze categories) that brought recognition to their leading product, P25CleanRF. This product was a Gold Winner for..
“802 Secure’s Cyber Physical Security solution effectively fortifies IT and OT networks from IoT risks. By collaborating with 802 Secure, we are combining one of the industry’s..
“The problem goes far above and beyond the potential breach of data or risks to that data. It also has an impact on safety, privacy, and the whole operation of your entire..
Our 2021 finalists and winners have significantly raised the bar when it comes to connecting billions of devices in a truly transformative way,” said Kim Kay, editor-in-chief of..
Recently Mandiant Security disclosed a critical weakness in ThroughTek’s “Kalay” network which is widely used by millions of IoT devices. This work expanded on research disclosed..