CIOReview | | 19 AUGUST 2022down an imminent attack when faced with a deviation of policy or unacceptable IoT vulnerability condition. Ranking these threats in order of severity also allows the clients to separate signal intelligence from noise to focus on real threats, providing them with `eyes and ears' in this invisible wireless threat landscape. LOCH offers remediation capabilities through Air Isolation to eliminate threats before they compromise the network. The utility of the AirShield solution was showcased in a recent collaboration with one of LOCH Technologies' partners specializing in Technical Surveillance Counter Measures (TSCM). The client used AirShield to defect nefarious, rogue IoT connections, which use the espionage method of exfiltration, resolving a critical supply chain integrity problem. AirShield was tasked with monitoring a Secure Compartmental Information Facility (SCIF) in a proof of concept initiative, identifying supply chain compromises, alternative frequency communications/covert communication channels, and rogue device insertions. Interestingly enough, AirShield detected an IoT spy camera, which collected information continually waiting to be retrieved by the threat actor. LOCH Technologies not only mitigated the looming concern before it caused colossal damages to the client by locating the root device but also managed to retrieve an SD card that continually aggregated confidential information. This engagement highlights the prowess of AirShield and LOCH Technologies' risk mitigation and threat resolution capabilities.The company demonstrates two essential characteristics through all such efforts: 1. signal intelligent technologies that offer clients a competitive advantage in the marketplace to detect, assess and prevent risk from IoT, and 2) provides a fully managed white glove service called AirGuard to manage and monitor a customer environment staffed with wireless experts on hand. The goal of the LOCH's IoT platform is to provide visibility across unsecured, misconfigured, or unmanaged IoT devices connected through wireless networks
<
Page 9 |
Page 11 >