top of page
Computer networking , cyber security and wireless engineering.  
Networking technologies is our passion, and we are focused on providing "Smart Solutions and Design Best Practices Producing Quality Results" for our customers.

Wireless Security

 Use mobile device antivirus

 Encrypt data

 VPN - Virtual Private Network

 Ability to remotely wipe your devices

 Utilize strong pins and passwords

 Mobile device firewall

 Educate users on their responsibilities

 Implement a mobile device policy

802.11 Wireless network design

802.11 Wireless policy recommendations

Cisco Wireless LAN Controllers / Access points

Wireless installation

Wireless Troubleshooting

Wireless site survey

Intrusion Prevention and Detection Systems

Monitoring and Detection solutions

Wireless Administration

Wireless Design and Security

Wireless can present some very unique challenges in any network and accesing apps can be a challenge also. 802.11 wireless design, device configuration, and installation should be planned and tested thoroughly before and after completion of the wireless installation to insure the wireless network is performing as designed, users and devices are able to connect  and access the business network resources and applications.  

CG2Ns network engineers are highly skilled and seasoned in networking technologies with the knowledge and expertise to design, configure, secure businesses 802.11 wireless network. Understanding the Reaction Points, the ARCs that connect the points in the network is how proper responses against attacks take place. 

We Can Help: Let CG2Ns networking engineers help protect your small or medium sized business wireless security needs.  

Coverage Analysis

Post validation survey of 802.11 RF coverage is important to determine the proper access point placement, configuration, and verification of the wireless installation infrastructure.  Coverage analyis is important to determine the current RF coverage in the building and to determine whether there is sufficient RF coverage to support the extended LAN wireless network design requirements, client devices in certain areas might have very weak coverage.

Wireless engineering presents some very unique challenges. There is a propagation phenomenon known as multipath which results in two or more paths of a signal arriving at the receiving antenna at the same time.  The challenges in RF signals are many and how mutlipath presents itself in an indoor environment can be a difficult challenge. 

There are four possible results of multipath in wireless: 

                                                                                    Upfade - Increased signal strength.

                                                                                    Downfade - Descreased signal strength

                                                                                    Nulling - Signal cancellation

                                                                                    Data Corruption - Intersymbol interference caused by the delay spread time.

Intrusion Detection / Prevention Systems

It is always a good idea to follow sensible wireless security and network management.

CG2N can deploying a Wireless Intrusion Detection System / Wireless Intrusion Prevention System for your small or midsized  business that will help to mitigate the numerous threats and attacks to a wireless network.  It is becoming a common practice for small and midsize businesses to install an IPS / IDS systems after installing an 802.11 wireless network.  The wireless threat landscape is sophisticated and it can be quit a challenge for wireless administrators to manage the day to day  attacks to wireless networks has broadend, such as Address Resolution Protocol poisoning, man-in-the-middle, and DoS attacks. WIDS/WIP Systems are useful to your business LAN network and the extended wireless LAN network, these systems are useful in mitigating attacks, detecting a security breach and response, block rogue access point and many other useful tools including audit and event management.

CG2N Technology Solutions for Small or Mid-sized Businesses:

Security policy and compliance

802.11 solution design

Wireless performance and

Miss configured wireless devices and clients

Network access control

Platform hardening

Wireless site survey: Passive, Active, Predictive

Guest wireless access manangement

Wireless Installation

Wireless compliance security

VPN wireless security

Wireless LAN Controllers

Secure network partioning

Risk mitigation stratigies

Wireless presents some very unique challenges.
Ask us about predictive security solution that anticipates and stops malicious activity before it threatens your network.

Mobile Risk Management Strategies

Wireless Design and Security

Wireless

Ask us about predictive security solution that anticipates and stops malicious activity before it threatens your network.

Use VPN wireless security when using public open wifi to connect to the company office nework and resources.

How important is cryptography to your business network?  

Privacy

Authentication

Integrity

Non-repudiation.

Information security is a business process.

Security technologies can address governmental compliance and regulatory issues and risk.

bottom of page