What’s behind the latest Coronet wireless management platform release?

Posted: November 14, 2016 / Author: Dror Liwer

There is no doubt that companies are struggling to deal with BYOD policies. With the exponential growth of new wireless devices on the market, developing coherent and enforceable policies will soon be impossible. Companies understand that they cannot control the type of devices their employees use, nor gauge the risk levels around those devices. Furthermore, in the event of a cybersecurity event, currently companies are bound the damage control and there are no preventative measures available.   

Since employees and executives use wireless connectivity in the office, as well as public places, cyber criminals know to attack places with the highest concentration of your team members. Corporate devices are attacked at hotels, airports, food courts, and any other public place compromising the offices’ wireless networks. Once the attacker has successfully created a wireless breach, they gain full access to the devices and from there the enterprise’s resources.

With cyber criminals focusing on exploiting users’ heavy reliance on conveniently available Wi-Fi and cellular networks, it’s imperative that companies protect employees and the enterprise from someone willingly or unwillingly signing onto risky networks and placing the company’s data assets in jeopardy.

Now imagine that your company could regain complete control and visibility over the wireless networks your employees access, regardless of the device type or location. Coronet has forever changed the way CISOs, IT directors, and network managers can formulate, apply and enforce their company's security strategy. This week we are proud to announce our newest cloud-base and end to end service, Coronet R2.

So, what is the solution?

Our Coronet R2 is a wireless risk-based policy and enforcement service that comes bundled with a layer of leading-edge security intelligence and threat detection capabilities.

New functionality included in Coronet R2 includes:

  • A “define once, run on any platform” wireless connectivity policy definition. The policy definition is implemented via Coronet’s cloud-based platform that is then executed on any device, including Windows, Mac OS, Android, and iOS.
  • The capability to define policy to seal and protect your premises and any other area of interest from a complete range of wireless threat -- with no dedicated hardware installation.
  • Visibility into which networks users connect.
  • Sophisticated security intelligence on threats near users or which can be set to target select geographic areas of interest.
  • Real-time wireless threat detection capabilities.

Today with a 100% of enterprise employees using wireless devices, both for work and personal activities, an all-encompassing wireless policy is needed. Via our cutting-edge technology companies can significantly lessen the growing risk of cyber attackers infecting corporate devices with malware or gaining access to enterprise resources.  

Since its formal launch last spring 2015, Coronet has received a number of industry awards and accolades, including Stevie Winner for "Startup of the Year - Business Products Industries," Cisco’s Top 15 Pioneers Innovation Challenge, Business Insider’s Hottest Israeli Startups, exclusive participant in Cisco’s innovative EIR Program, TechCrunch Disrupt Startup Battlefield contestant, and Tech Trailblazers top security startup.

We are certainly very proud of our ongoing achievements in combating cyberattacks. We look forward to helping CISOs across a wide range of industries to integrate Coronet R2, as a central pillar of their corporate policies.

Stay tuned for more Coronet innovations to help enterprises combat cybercrime.

Previous Next