Counter the Risk of Wireless Threats with
EnGenius Security Access Points

AirGuard™
WIPS/WIDS

Zero-wait
DFS
DFS

Spectrum
Analysis
Analysis

BLE
Capability
Capability
AirGuard™ WIPS/WIDS to Secure Your WLAN
AirGuard™ is an intelligent wireless security system built in to the EnGenius Cloud security AP to protect the airspace from rogue devices and wireless threats 24/7. Using dedicated scanning radios, AirGuard security APs continuously scan the environment for rogue APs and other threats without degrading network speed at all.
Detect
AirGuard™ continuously monitors and detects the radio spectrum used by
wireless LANs for the presence of unauthorized, rogue APs and wireless
threats.

Categorize
The system finds and auto-categorizes suspicious APs and SSIDs, as well
as potential wireless attacks like "evil twins," de-auth attacks, and RF
jamming.

Advice
The AirGuard™ system will send notifications to the administrator whenever security issues are found and make recommendations for troubleshooting.

AirGuard uses a dedicated radio to continuously scan radio frequencies in the background and detect unauthorized access points as well as legitimate devices exhibiting suspicious behavior.
Rogue Access Points
Whether simply unauthorized or intentionally malicious, rogue access points bring risks and can often mimic legitimate SSIDs, tricking users into connecting to them.
Man-in-the-Middle
The man-in-the-middle AP can hijack the wireless connection between the client and application and obtain all the sensitive information transmitted by the two parties.
Valid SSID Misuse
An unauthorized AP uses the same SSID as a legitimate SSID in an authorized network, so the client might connect to the malicious AP and causes a security breach.
The AirGuard system can recognize potential attacks based on intelligent algorithms or user-defined rules and then categorize them.
Evil Twin Attack
The “evil twin” attack makes the rogue AP look virtually identical to the legitimate AP so that, when clients connect to the imposter AP, hackers can steal their data.
RF Jamming
Hackers can use the RF jammer tool to continually generate data packets or RF signals that congest the network and hog resources, forcing the busy network to drop client devices.
Malicious Attack
A hacker can impersonate a legitimate AP and send a de-auth frame to a client (or vice versa) using the de-authentication feature of the 802.11 Wi-Fi protocol, causing client devices to disconnect from the AP.
Real-Time Diagnostics to Ensure Air Quality
The security AP comes with a diagnostic toolset to monitor real-time radio interference, channel utilization, and device status. System admins can then find potential issues and adjust device settings to improve user experience and network performance.

Diagnostics Tool with Meter for Real-Time Troubleshooting
The system admin can use the built-in, real-time diagnostics tool to find potential issues, show channel utilization, and detect system loading to troubleshoot effectively.

Spectrum Analysis While Maintaining Performance
The security AP can perform real-time spectrum analysis of its environment with dedicated radio scanning without decreasing performance. It's helpful to know the interference strength for all wireless channels, especially when you are in an environment with lots of non-Wi-Fi devices sending out radio signals.
Previous slide
Next slide
Diagnostics Tool with Meter for Real-Time Troubleshooting
The system admin can use the built-in, real-time diagnostics tool to find potential issues, show channel utilization, and detect system loading to troubleshoot effectively.

Spectrum Analysis While Maintaining Performance
The security AP can perform real-time spectrum analysis of its environment with dedicated radio scanning without decreasing performance. It's helpful to know the interference strength for all wireless channels, especially when you are in an environment with lots of non-Wi-Fi devices sending out radio signals.

Zero-Wait DFS to Avoid Disrupting Client Connection
The EnGenius zero-wait DFS feature helps the security AP avoid connection disruption from radar detection, providing an uninterrupted change of DFS channels when needed.
CAC Can Cause
Loss of Connection
Loss of Connection
To comply with DFS standards, an access point must perform a channel availability check (CAC) and wait a while before connecting to a DFS channel. The disruption creates a poor user experience.
How Zero-Wait DFS Works
Security APs use dedicated radios to continuously scan all DFS channels in the background and maintain a list of available DFS channels—preventing client devices from being temporarily disconnected and ensuring immediate connection to a new DFS channel.
BLE Capability for Location-Based Application
Equipped with a built-in BLE sensor, security APs can scan and obtain information from Bluetooth devices. EnGenius also provides BLE APIs for vendors who want to communicate with and retrieve data from any IoT or location-based application.


Cloud Security Access Point Models
Access Points
Wi-Fi Standard
Radio Chains
Max Data Rates (2.4 GHz)
Max Data Rates (5 GHz)
WIDS/WIPS
Real-time Spectrum Analysis
Zero-wait DFS
BLE 5.0 capability
Cloud Security Access Point Models
ECW220S
Wi-Fi Standard
Wi-Fi 6 (11ax)
Radio Chains
2 x 2:2
Max Data Rates (2.4 GHz)
600 Mbps
Max Data Rates (5 GHz)
1,200 Mbps
WIDS/WIPS
Yes
Real-time Spectrum Analysis
Yes
Zero-wait DFS
Yes
BLE 5.0 capability
Yes
ECW230S
Wi-Fi Standard
Wi-Fi 6 (11ax)
Radio Chains
4 x 4:4
Max Data Rates (2.4 GHz)
1,200 Mbps
Max Data Rates (5 GHz)
2,400 Mbps
WIDS/WIPS
Yes
Real-time Spectrum Analysis
Yes
Zero-wait DFS
Yes
BLE 5.0 capability
Yes
Request
more information
Interested in how the EnGenius Security Access Point solution can help your business network?
Just fill up this simple form, and we will contact you for more information. Build an intelligent network for your business with EnGenius Security Access Points today!
Please be advised that this form is used for demo purposes. We collect the information only for the demo program contacts. If you have any questions about personal data protection, please refer to our Privacy Policy first.