One-stop shopping for all wireless security administration.
Difficult installation is not for the novice.
A high-quality, industrial-strength product that can be used by any size of business. The console and dashboard approach provides a straightforward, well-organized display.
This is a flexible, robust, very scalable and multi-purpose wireless security solution. It provides rogue detection, troubleshooting, vulnerability assessment, intrusion detection, performance management and usage accounting. It has a standard Windows GUI with an open source Firebird database that includes a secure, password-protected interface, and can be easily configured both for a small business or a large enterprise.
This intrusion protection and wireless network monitoring software offers an intuitive client console with consistent functionality delivered in a seamless manner.
The dashboard view allows a quick overview of the network with drill down as required. It was easy to use the interface to monitor and configure all network places. An exception based view offers many options, including customized views of the network. The console interface was extensive and displayed graphical real-time reporting of the entire wireless network.
The software recognizes rogue devices and access points and allows control of security settings to filter network activity.
Installation was easy at first, but an extensive enterprise skill-set is required to install it. Plug and play installation gives some help, but significant software configuration was needed to begin using the product. This is not for the novice. Network Chemistry's website provided some insight for user support, but was weak in terms of detailed information, although there are useful screen shots. The web-based help was useful with easy navigation. The hardware sensor was easy to install and configure, with configuration maintained through a simple utility (SensorManager).
The RFprotect Server Engine Manager, RFprotect console, SensorManager and Packetyzer (not reviewed) provide integrated or standalone functionality that is flexible and easy to use. It supported wireless security standards, 802.11 a, b and g. WEP is easily decrypted and the software offers a stealthy wireless network that can be configured locally or remotely without functionality sacrifice.