Notice: Undefined index: contact_popup in /data/web/virtuals/168606/virtual/www/temp/latte/templates-Elements-Navbar.latte--d4398ad36f.php on line 81

Notice: Undefined index: items in /data/web/virtuals/168606/virtual/www/temp/latte/templates-Elements-Navbar.latte--d4398ad36f.php on line 131

Warning: Invalid argument supplied for foreach() in /data/web/virtuals/168606/virtual/www/temp/latte/templates-Elements-Navbar.latte--d4398ad36f.php on line 131

Notice: Undefined index: items in /data/web/virtuals/168606/virtual/www/temp/latte/templates-Elements-Navbar.latte--d4398ad36f.php on line 131

Warning: Invalid argument supplied for foreach() in /data/web/virtuals/168606/virtual/www/temp/latte/templates-Elements-Navbar.latte--d4398ad36f.php on line 131

Notice: Undefined index: items in /data/web/virtuals/168606/virtual/www/temp/latte/templates-Elements-Navbar.latte--d4398ad36f.php on line 131

Warning: Invalid argument supplied for foreach() in /data/web/virtuals/168606/virtual/www/temp/latte/templates-Elements-Navbar.latte--d4398ad36f.php on line 131

About us

Contact


Notice: Undefined index: menubox in /data/web/virtuals/168606/virtual/www/temp/latte/templates-Elements-Navbar.latte--d4398ad36f.php on line 195

Audit

The word audit itself causes stress in many of us as soon as we hear it. However, wireless network audit is nothing to be worried about nor avoided. On the contrary, audits should be performed regularly to provide a controlled network that functions the way it is designed to operate proficiently and to the client’s needs. Audits take into consideration the current state of the network which includes possible performance fluctuations in the future (new standards). Because of this, an audit is helpful in predicting these fluctuations and the overall functionality of the network from a long-term perspective.

Another part of the wireless network audit is detailed analysis of the wireless infrastructure which contains the following:

  • Access Points survey  
  • Spectrum analysis
  • Control of security settings to prevent vulnerability to attacks and intrusions
  • Threat assessment of dishonest users (rogue APs)
  • Threat analysis resulting from erroneous infrastructure configuration
  • Penetration testing
  • User policy
  • Subsequent infrastructure control (switches, RADIUS and AD servers etc.)
  • Control of possible non-compliance with the company policy resulting from an erroneous configuration

The audit procedure tracks down possible threats to the company network which result from an erroneous setting, poor security, or a badly proposed original design. These threats could be internal, external or random (guests).

The audit outcome is a detailed report on a list of possible errors that might have occurred in a security setting or in the infrastructure design proposal. The report also includes recommendations how to deal with these issues.

Hexagon
Hexagon