Cyborg Unplug
I bet this is, at best, somewhat effective at stopping intrusions. Wireless security still sucks because the fundamental problem of "Who should be able to connect," is a bitch without wires.
Select the devices? That implies they have a way of ID'ing what type of devices are around and whether or not their connection is legit. You can hack anything to make it report it's anything else. They could have a fantastic lookup of techie info in their firmware that has the world's greatest hardware and software recognition algorithms on there, but I doubt it. There's also the question of how secure the device is to boot. If you had sufficient rules in place that blocked all IPs and machines except a specific white list, then maybe. In that case, I'd expect a list of allowed devices, not disallowed.
Edited By Malcolm on 1447106661
Step 3
Select the devices you wish to detect and choose which networks you'd like to defend (Territory Mode).
Select the devices? That implies they have a way of ID'ing what type of devices are around and whether or not their connection is legit. You can hack anything to make it report it's anything else. They could have a fantastic lookup of techie info in their firmware that has the world's greatest hardware and software recognition algorithms on there, but I doubt it. There's also the question of how secure the device is to boot. If you had sufficient rules in place that blocked all IPs and machines except a specific white list, then maybe. In that case, I'd expect a list of allowed devices, not disallowed.
Edited By Malcolm on 1447106661
Diogenes of Sinope: "It is not that I am mad, it is only that my head is different from yours."
Arnold Judas Rimmer, BSC, SSC: "Better dead than smeg."
Arnold Judas Rimmer, BSC, SSC: "Better dead than smeg."