fbpx

Vision Continuous Monitoring

Continuously monitor for unauthorised WiFi in your environment

Built specifically for cyber security, Vision continuous monitoring sensors detect unauthorised WiFi and alert security management systems in real-time

How it works

Provides real-time continuous detection, alerts, forensics and source location (when used in conjunction with the Pursuit tracker)

How the HackHunter vision continuous monitoring sensors work. With continuous 360 degree scanning, our sensors will show you what WiFi is in your network in real time, 24/7.

Enumerating a network

Continuously detects and reports WiFi APs and devices…

Insight analytics platform

WiFi network traffic analysis

Track it to the source

Use in conjunction with the Pursuit tracker to track and locate the WiFi source with precision

Vision continuous monitoring in the field

Features

Vision continuous monitoring features. Small, easy to conceal. Wide range, covers the same area as a WiFi access point. Undetectable, does not transmit during normal use (transmits when updating firmware, licenses or transferring files). The sensor can come by itself or with an integrated host. The sensor is lightweight, weighing less than 20 grams and requires a host connection via USB for power and connectivity. The integrated host sensor is lightweight weighing less than 160 grams and uses a POE connection for power and connectivity.
Vision continuous monitoring features. Small, easy to conceal. Wide range, covers the same area as a WiFi access point. Undetectable, does not transmit during normal use (transmits when updating firmware, licenses or transferring files). The sensor can come by itself or with an integrated host. The sensor is lightweight, weighing less than 20 grams and requires a host connection via USB for power and connectivity. The integrated host sensor is lightweight weighing less than 160 grams and uses a POE connection for power and connectivity.

Want a peek inside our tech?

Enter your details below to receive the Vision continuous monitoring technical specification

For more information including pricing, contact us

Want to actually find the source of unauthorised WiFi? Find out more about our Pursuit tracker