• Overview
  • Resources

Strengthen enterprise wireless security posture by customizing responses to meet your specific needs. Using Meru's extensible signature-based security solution, you can recognize threats and do something about them before they harm your customers, your business, or your reputation. Our built-in database includes signatures for 20 common wireless security threats, and your network managers can easily add more.

  • Fully customize the signatures and actions taken when the system detects a threat.
  • Tailor reports that are automatically generated using Meru’s full logging capability.
  • Uncover rogue wireless access points and back doors, and detect denial of service attacks, hacking, cracking, spoofing, and faking.
  • Leverage integration with the Meru service assurance platform for ease of deployment.

Want to Learn More?

Contact Us Now