
Pursuit Tracker
Built for cyber security, the Pursuit WiFi tracker actually locates the source of unauthorised WiFi with precision, to within a few centimetres
How it works
Detects and locates the source of WiFi transmission to within a few centimetres – in real-time – and alerts if it’s malicious
- Detect unauthorised WiFi using complex real-time filtering (templates)
- Real-time analysis means you can track and locate the WiFi source with precision
- Directional precision so WiFi sources can be found under the floor, in the ceiling or in a concealed location


Know exactly what WiFi is in your environment
Enumerating a network
Detects, tracks and locates WiFi APs and devices…
- Connected to a WiFi AP
- Communicating through an AP
- Transmitting WiFi in the area
Find specific devices
Detect, track and locate any WiFi transmitting device…
- From drones to mobile phones
- Locate with precision
- Custom templates available
Rogue access point audits, floor walks and WiFi audits
- Detect, track and locate unauthorised and hidden WiFi devices
- Receive alerts in real-time as malicious sources are discovered
- Tag and record important details or add an AP to the built-in safe list
- Log and upload details to the Insights analytics platform for further analysis
- Generate automated reports directly from the Insight analytics platform
WiFi network traffic analysis
- Get an overview of your WiFi network’s behaviour
- Detect transmission types and volumes to determine unusual patterns
-
Drill down to look for any suspicious activity such as a
de-authentication attack
Pursuit tracker in the field

Rogue access point and WiFi audit with an ASX 50 company
During a floor walk with their internal WiFi specialists we put our Pursuit WiFi tracker to the test, and found that we were over 300% more effective than their existing solution for rogue access point and WiFi audits
Features


Want a peek inside our tech?
Enter your details below to receive the Pursuit tracker technical specification