Red-M Red-Detect Server
May 05, 2004
- Ease of Use:
- Value for Money:
- Overall Rating:
Setup and configuration were an absolute breeze and the comprehensive range of reports and monitoring tools combine for a very impressive offering.
Red-M does not sell Red-Detect as a standalone unit so companies will have to buy a pre-packaged offering of Red-M's technology.
A comprehensive and well-integrated offering that offers scalable WLAN event monitoring with a wide range of analysis tools.
In addition to the Server tested, a complete Red-M installation has one or more of the firm's Red-Detect Consoles – a standard PC loaded with the company's software so it can act as a user interface to the Server. The system will have one or more of the company's Red-Alert probes (distributed in the enterprise) to monitor wireless activity and report to the Server.
To start this tripartite configuration, we installed the console software on a PC that we designated as the management box. The wizard-based setup went smoothly. We connected the Red-Detect Server directly to the Console PC via a Cat5 crossover patch lead. Having established the physical connection, we started the Console and entered the Server IP address and logged in.
The first time the Server links to the Console management utility, users are prompted to change the default password. We selected the server IP setup option and assigned an IP, subnet and default gateway. After a reboot, the Server and Console were ready to be connected to the target network.
After the easy setup, we were ready to configure the WLAN detection. The deployed Red-Alert probes discover the Red-Detect Server by using an assumed range of DNS names. Each probe must be able to look up the Server's address using an accessible DNS server.
Probes discovered by the network appear in the intuitive probe view of the Red-Detect Console and can be used and managed by the Server. Once the probes are configured, Red-Detect is ready. It registers any wireless activity that occurs within range of the probes. This monitoring suite gives an audit trail of past activity (graphical or tabular) showing wireless events and a network view giving inventory data and a list of the active probes.
SC Webcasts UK
Information Security Manager
Infosec People - Hammersmith, West London
Junior Penetration Tester, Hertfordshire, to £35k + benefits
Infosec People - England, Hertfordshire
Cyber Security Architect
CYBER EXECS - London (Greater)
SOC Analyst, Aldershot, £47-56k + package
Infosec People - Hampshire, England, Aldershot
Senior Security Engineer
Loveworklife Recruitment - United Kingdom
Sign up to our newsletters
SC Magazine UK Articles
- Tesco Bank allegedly ignored warnings of hack from Visa
- Investigatory Powers and Digital Economy Bills could threaten economy
- Updated: A million German routers knocked offline by failed Mirai botnet attack
- Gooligan ad fraud malware infects 1.3M Android users, installs over 2M unwanted apps
- Microsoft update left Azure Linux virtual machines open to hacking
- SC Awards Europe 2016 winners announcements!
- ISIS radicalises 'lone wolves' through strong social media presence
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- 9.2 million medical records for sale on darkweb
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- ICYMI: Tesco warned; IP Bill threatens economy; German routers offline; Azure trojan; Gooligan fraud
- Data centres are on the move - where will they end up?
- 90% of ITDMs believe IAM is crucial to digital transformation success
- Research: Hacked companies could see customer exodus if breached
- Misconfigured drive exposes locations of explosives used by oil industry