WEFENDER
IS MORE THAN
JUST
SECURE WI-FI.

It is a solution, offered as a service, that protects
the WiFi networks of SMEs, free access points and teleworkers
with the same efficiency as the sophisticated ones

WEFENDER is a solution, offered as a service, that protects the WiFi networks of SMEs, free access points and teleworkers with the same efficiency as the sophisticated ones

From just 24,97€/month (VAT not included), you can protect your digital assets from a wide
variety of network attacks.

From just

Slide A simple solution that combines complex security features in a single device. Slide It prevents one device from spoofing another to gain access to critical resources, thanks to a truly robust authorization and authentication system Slide Default security set-up to prevent operator errors. Slide Control over who connects to your wireless network and what privileges they have. Slide It ensures the privacy and confidentiality of all communications on the Wi-Fi network. Slide It protects against attacks from within the network: spoofing, data theft and manipulation. Slide It helps you comply with data protection regulations (GDPR).

PRODUCT DATA SHEET

WEFENDER

FEATURES

The technology behind WEFENDER was designed and patented by TECTECO and its system for integrating features is unlike anything else on the market.

Multi-factor authentication

To authenticate a device, a unique combination of multiple, hard-to-spoof, factors is used in order to control the identity of the connections with a very high degree of certainty.

Implicit deny

Any communication requests from a device that has not been registered, authenticated and authorized in advance are systematically denied.

Effective network access control

Because the digital identity created by the system links diverse factors, access control and authentication of the Wi-Fi network connection is more effective than if those factors are taken separately, like other solutions do with MAC filtering or firewalls.

Network segmentation

The solution facilitates segmentation in predefined subnets so that IP addresses can be set up with no prior technical expertise, thus limiting the threat of lateral movement by intruders in the network.

Individual security policies

Thanks to WEFENDER’s pre-defined security rules (TRS – TECTECO Rule Set), security profiles can be set up for each user, device and service without any prior technical knowledge about security, helping to avoid faulty configurations.

Remote management interface

Over the cloud-based WEFENDER management portal, you can manage users, devices and security policies in your wireless network remotely, easily and with no need for technical expertise.

WEFENDER

USE CASES

WEFENDER is a versatile solution that provides great benefits in various use cases and scenarios:

Slide Large company WiFi security at an SME price STARTUPS Slide Añade valor a tus servicios con una WiFi segura y ayuda a tus clientes a cumplir con el RGPD. Coworking Offices Slide Offer free but secure WiFi to your customers and guests with KiosKo WEFENDER and differentiate yourself from the competition. Public access points Slide Work from home with the same levels of security as from the office. Teleworking

TECHNICAL SPECIFICATIONS

WEFENDER is a solution that secures Wi-Fi networks, composed of a local router and enhanced with cloud-based services

DEFEND YOUR WI-FI NETWORK FROM ATTACKERS

This solution includes:

 

A dynamic network controller compatible with any data plane with security functions (Firewall).

An enhanced AAA system compatible with any other authentication system such as LDAP or RADIUS (NAC).

A DHCP server that is “Identity-aware”, modified and optimized.

A totally secured, confidential connection via VPN to the cloud-based Tecteco service centre.

DO YOU HAVE QUESTIONS? DOWNLOAD THE PRODUCT DATA SHEET OR CONTACT US

PROTECTION FROM THREATS

Our WEFENDER solution offers protection from a wide range of threats from within the network and provides

security features that no other Wi-Fi router in this category can offer at this time:

ATTACKS USING MAC AND IP SPOOFING

designed to spoof a device and user.

STEALING
OR TAMPERING WITH DATA

transferred over public or private networks

MAN-IN-THE-MIDDLE ATTACKS

(MitM) that alter the information in

communications.

INTERNAL DDOS
ATTACKS

also preventing you from becoming a part of

these attacks using botnets

THE SPREAD
OF THREATS

from botnets and malware that infiltrate

the network through the connected devices.

MORE INFORMATION ABOUT COMMON WI-FI NETWORK ATTACKS.

WEFENDER WIFI