wireless network

Home / Tag: wireless network

Secure Decisions releases MeerCAT® Pro Version 4.1

NORTHPORT, NY, April 16, 2013 – The Secure Decisions Division of Applied Visions has released a new version of its wireless network security visualization tool, MeerCAT®-Pro Version 4.1. MeerCAT®, a visualization tool to help identify wireless vulnerabilities and threats, and assess the risks to an organization was developed as part of a DARPA-funded research effort. It has helped many security professionals – including information security auditors, penetration vulnerability testers, and computer network defenders – conduct post-hoc analysis of data acquired from wireless site surveys and security audits. The data analyzed by MeerCAT® is typically collected using “wardriving” software such as Flying Squirrel or Kismet that discover, identify, and locate wireless transmitters. MeerCAT® integrates wireless discovery data with a geographic information system (GIS) to provide a unified view of detected wireless devices, with their vulnerabilities and [...]

Secure Decisions releases MeerCAT® Pro Version 4.0

NORTHPORT, NY, August 15, 2012 – The Secure Decisions Division of Applied Visions has released a new version of its wireless network security visualization tool, MeerCAT®-Pro Version 4.0. MeerCAT®, a visualization tool to help identify wireless vulnerabilities and threats, and assess the risks to an organization was developed as part of a DARPA-funded research effort. It has helped many security professionals – including information security auditors, penetration vulnerability testers, and computer network defenders – conduct post-hoc analysis of data acquired from wireless site surveys and security audits. The data analyzed by MeerCAT® is typically collected using “wardriving” software such as Flying Squirrel or Kismet that discover, identify, and locate wireless transmitters. MeerCAT® integrates wireless discovery data with a geographic information system (GIS) to provide a unified view of detected wireless devices, with their vulnerabilities and [...]

Go to Top