Some people think that simply setting a password provides enough security for their industrial wireless networks. But there are others who want their networks locked down behind a multi-layer fortress of security.
In either case – and for any case in between, ESTeem can provide a suitable answer.
But first, let’s talk about why security is necessary. There are intentional and unintentional threats to any industrial wireless network. Intentional breaches can include attempts to enter the network to cause havoc or gain free Internet access, to shut down the network altogether, to steal data or to inject invalid data.
Even if you feel an intentional threat to your network is unlikely, unintentional breaches can still occur. These can include off-frequency hardware, a high level of background radio frequency noise or an excessive number of users on a single wireless channel.
Regardless of the threat source, ESTeem radios provide the necessary flexibility to add the layers of security you want for your industrial wireless network.
ESTeem’s Horizon Series defaults to 128-bit AES-CCMP (Advanced Encryption Standard-Counter Mode CBC-MAC Protocol), the encryption algorithm used in the current IEEE 802.11i and WPA-2 security protocols. The Horizon series can run up to 256-bit AES encryption, as well as counter mode technology that makes it difficult for an attacker to spot patterns (figuring out patterns is one way attackers can access a network).
Our older radios are compatible with WPA and WEP. Even though they operate on different security protocols, all our radio models are able to communicate with each other.
Additional security layers available with ESTeem wireless radios include:
- Access control list (ACL), which allows you to set which devices have access to the network
- Disabling broadcast probes and disabling SSID, which makes the network more difficult to find
- Masquerade mode, which allows your wireless modem to act as a firewall
All of this is in addition to the fact that the communication between the radios is encrypted and works over a proprietary communication link that other wireless hardware can’t access.
Layers of Security
This idea of layers of security is nearly as old as time itself. You can easily see it in the defenses set up around castles, which have an outer wall, moat, drawbridge, portcullis and keep, all providing protection for the castle inhabitants.
In a perfect world, every wireless network would be protected by as many layers as a castle. But, at ESTeem, we understand that the world isn’t perfect. We know that concerns over increased bandwidth requirements or security management demands may prevent some network owners from implementing every security measure.
That’s why we offer a full range of security options, allowing network owners to pick and chose the level of security that best suits their overall situation.