Watch video

Coronet provides your organization with total protection from wireless network threats

In today’s world where BYOD and BYON are common, the Coronet enterprise solution allows
you to safely use any Wi-Fi or Cellular network connection, on any device at any location.
The Coronet solution provides:

Visibility and intelligence on wireless threats both inside and outside of your premises.

Ability to define global wireless security policy that is automatically executed on devices

Freedom to connect your device from anywhere, access any service, and maintain privacy without any inconvenience.

Maintain Full Data Security of all corporate data, while ensuring full wireless network security and eliminating the risk of wireless device manipulation.

Traditional security tools do not protect you from wireless threats

Wireless attacks are one of the fastest growing threats and extremely easy to perform, especially in hotels, airports, public transportation and food courts.  
Every time your users, customers, or partners use Wi-Fi or cellular networks, inside or outside your premises, they potentially expose your organization to a wide range of threats that cannot be handled by traditional security technologies.

Learn more about the threat

Wireless attacks can:

Manipulate the device or the user

Intercept and manipulate data transmissions to and from the device

Place malware on the device

Gain access to assets on the device, including stored credentials

Use the device as a “Trojan Horse

The Coronet solution consists of three components:


Coronet Client

A lightweight software agent that runs
on any device (Laptop, Smartphone,
Tablet) and requires no hardware or OS level modifications


Coronet Enterprise Dashboard

A cloud platform that enables the
CiSO’s organization to define wireless
security policy, track threats in real
time, and analyze threat intelligence


Coronet Intelligence Platform

A massive intelligence repository that
captures network behavior data and
continuously analyzes the data
searching for new attack vectors, thus
future proofing against new types of

Cloud based platform. Easy to deploy. No hardware.

Enterprise Protection
  • Access to the Coronet Portal in which you may
    • Define and manage wireless usage policy
    • Gain visibility into wireless network usage
    • Gain real time intelligence on threats around your users and locations
  • Client software that
    • Enforces your wireless connectivity policy
    • Detects wireless threats and potential breaches around the device
Personal Protection
  • Basic protection against wireless threats

Providing protection for all major platforms.





See what the experts are saying

See what the Industry are saying

Coronet is Top Product
Enterprises Should
Know About
August 2016
CoroNet selected as “Top 15 Innovators” in the
Cisco/Pioneers challenge
June 2016
Security winner in The Tech Trailblazers Awards
September 2016

Learn more about wireless & cellular security


Hackers Can Bypass HTTPS Protection on Windows, Linux, and Mac

If you browse to a major website on the internet, chances are you’ll see something next to the URL—a tiny lock icon, next to the prefix “HTTPS.” This indicates that you’re currently using a secure version of the Hypertext Transfer Protocol. It means that the connection between your web browser and the application you are (…)


Coronet joins StarHub’s Cyber Security Centre of Excellence as Newest Partner

 Coronet Tapped For Innovative Cyber Security Solution  That Combats Threats Targeting WiFi and Cellular Networks  Singapore, September 6th, 2016 – Coronet, a cyber security software company, announced it has teamed up with StarHub, Singapore’s second largest info-communications company. Coronet becomes the newest partner to join forces in supporting StarHub’s Cyber Security Centre of Excellence (COE). Introduced (…)


In our latest white paper, our CTO discusses an attack vector that introduces risks even into WPA protected networks.

Most organizations use the WPA-Enterprise security protocol to manage and protect their Wi-Fi access, allocating individual user credentials to their employees. Those credentials can be exposed using this attack method. To learn more about this attack, and ways to defend against it, download our free white paper.


Upcoming Events

18 - 20 OCTOBER 2016

IT Security Expo and Congress

Nuremberg, Germany
Hall 12, Stand 548,

23 - 26 OCTOBER 2016

FS-ISAC Fall Summit

Nashville, TN
Booth #20


To activate, use your personal email address when prompted by the app.


Coming Soon



To activate, use your corporate email address or activation code when prompted by the app.


Coming Soon