Strengthen enterprise wireless security posture by customizing responses to meet your specific needs. Using Meru's extensible signature-based security solution, you can recognize threats and do something about them before they harm your customers, your business, or your reputation. Our built-in database includes signatures for 20 common wireless security threats, and your network managers can easily add more.
- Fully customize the signatures and actions taken when the system detects a threat.
- Tailor reports that are automatically generated using Meru’s full logging capability.
- Uncover rogue wireless access points and back doors, and detect denial of service attacks, hacking, cracking, spoofing, and faking.
- Leverage integration with the Meru service assurance platform for ease of deployment.