- Use Cases
“After a security breach at the United States Chamber of Commerce last year, the Chamber discovered that its office printer, and even a thermostat in a Chamber-owned apartment, had been communicating with an Internet address in China.” – NY Times
This is a scary example of unknowingly transmitting information to an outside location. However, it’s not alone.
Earlier this month, a hacker was able to jump into dozens of conference rooms around the world through videoconferencing equipment. Fortunately for the companies that were “spied” on, the hacker wasn’t trying to steal information but was looking for security holes. Unfortunately, the companies that were hacked into are well recognized and using the most popular types of videoconference equipment. The automatic acceptance of new callers and participants in video-conferencing allows someone to dial in and look around without being noticed.
Your office may have more participants than you think. The importance of knowing your wireless environment is becoming more significant. What you see is not necessarily all there is. The logical world cannot explain the cyber happenings going on without understanding your entire environment.
Inpixon recently came out with a white paper on “Advanced Persistent Response to Mobile Threats.” In the beginning, Inpixon concentrated on monitoring wireless devices operating on Wi-Fi or cellular frequencies – wireless situational awareness. Now, Inpixon is bringing intelligence into mobile security as we allow you to see who/what is trying to connect to your network, what devices are transmitting that you may not think of (such as the thermostat in the first example) and more – cognitive mobile security. Inpixon is ahead of the game and is enabling the management of mobile devices by changing the operating policy depending on contexts such as location – context-aware computing.
Your adversaries are becoming more resourceful and using tools you already have in place to their advantage. Be ahead of the opponent and be proactive. If you know where your weaknesses are, if you know what your tools are doing without your consent, you’re prepared and protected. Wireless devices are continuing to gain capabilities and today, almost 20% of US adults have a tablet or e-reader on top of their smart cellular device.
Wireless situational awareness. Cognitive mobile security. Context-aware computing. Inpixon.