ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Some facts about the Motorola ADSP AirDefense solutions. Wireless Intrusion Prevention Systems (IPS)

Updated on November 28, 2012

Why should you secure wireless?

Fixed wired networks use cables or fibre that meet at a switch. The switch then distributes these signals only to where they are needed... again through wires. So if you can physically secure the wires, then the chance that someone taps into it is lowered.

Wireless systems must use a broadcast technique and it is more like a speaker standing on a box in a public park compared to the relative privacy of fixed wires. Because of this, anyone within listening range can monitor your wireless signals.

Of course the instant reaction to this threat is to use strong encryption. However, any given organisation has no visibility of deviations from the standards laid down for wireless. Many employees could add an access point (AP) without the knowledge of the security team. In that situation, there is no guarantee that it will be configured securely.

Additionally, when a new AP is added to a system, it can be like letting multiple people talk at once inside a lift. The extra wireless transmission can easily interfere with the designed sections of the network.

Even with strong encryption, there are ways to infiltrate a system, especially if the passwords are weak. Someone can gather data from outside your building, and use brute-force methods or dictionary-based attacks to try and break into the system.

Sometimes, legitimate users within the organisation can accidentally or purposefully connect to a neighbouring system. This situation is very undesirable.

Finally, even those organisations who have a "no wireless" policy cannot possibly know if that policy is enforced unless the airwaves are monitored.

The ADSP (AriDefense Services Platform) gives you the ability to monitor all of these situations, and more.

Three key functions


Apart from security, monitoring your system lets you run reports that illustrate such due diligence. Therefore the ADSP helps to provide documentation for government and Payment Card Compliance (PCI). Normally, with PCI for example, an audit conducted every year, six months or three months is required for organisations that are processing credit cards. Failure to be compliant can attract big fines, and having a security breach is extremely disruptive and expensive. The audits are expensive too. Also, because they are periodic, the typical audit is only a snapshot. What you really need is 24x7 monitoring, and the ability to illustrate compliance at the push of a button when needed. This ability to generate ad-hoc reports and continuous monitoring saves money on expensive audits.

When you have continuous monitoring, then the next logical thing to do with the data is to generate alerts when something out of the ordinary happens. The ADSP will do this.

Infrastructure management

To manage a network, you need visibility, and central control; but since it's common to find multiple vendors and multiple versions within a network, this becomes difficult. The ADSP is already in a position to observe all the wireless devices on the network (It's vendor agnostic) so it is in a perfect position to be a central management station. So from one platform, you can manage:

  • Configuration
  • Firmware
  • Operational Status
  • Faults
  • Statistics
  • Reporting

Network Assurance

With a wired network, when someone uses a microwave oven, that oven will not interfere with the signals in the wire. However, since a microwave oven uses the same frequency spectrum (2.4GHz) as wireless signals for 802.11, then it can easily disrupt performance. The ADSP has a tool to chart outside interference from a microwave, or heavy machinery, electrical arc welding, and any other source of noise. For email transmission a few minutes delay would not be a proble, but today, many organisations demand high availability for use with Voice Over Internet Protocol (VOIP) equipment. When the board is conducting an international digital conference, then the combined salaries over a five minute period of disruption can accumulate to a lot of money. To have visibility of the noise levels in a system is to have the power to prevent or fix it rapidly.

When someone uses a laptop in wireless-mode and cannot connect, finding a problem is difficult. In some cases, a wireless engineer might be flown across the country to diagnose a fault with an AP, only to find that the problem exists in the laptop. The ADSP give you the ability to temporarily convert one of the sensors into a clone of the laptop and diagnose the problem from head-office. The potential saving for operational events like this is huge.

When it's time to call the cops...

In the unpleasant situation where a suspected or confirmed security breach in play, you need reliable data for a forensic investigation.

The ADSP stores information and you can draw on that to assist a forensic and evidence gathering activity. Every minute it stores 325 data points for each identified wireless device.

While a problem is still current, it will also give you complete visibility of what the devices are doing. This is called "Live View".

Just where IS that device?

Since wireless devices are often mobile, it's not possible to track their location using traditional paper-based accounting methods or their electronic equivalent.

The ADSP can locate devices to within a 10m radius in real time. It can do this when there are at least three sensors arranged roughly in a triangle. The method used is to estimate the bearing and signal strength of a mobile device from three points. It then makes a triangulation calculation and estimates where this device is placed. The data is recorded so you can track it over time. The data is available as a 2 dimensional heat-map.


    0 of 8192 characters used
    Post Comment

    • profile image


      3 years ago

      Од 21 November, 2012 - 6:19 amWow, superb blog laoyut! How long have you been blogging for? you make blogging look easy. The overall look of your web site is excellent, let alone the content!. Thanks For Your article about ž ½ ¾ ² hotspot ¾ !!! | ž 9d 90 .


    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at:

    Show Details
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the or domains, for performance and efficiency reasons. (Privacy Policy)
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)