Swarm
Swarm
Swarm makes quick and automated work of logging, locating, analyzing and alerting on IoT activity. The analysis Swarm returns can be used to inform practical business decisions and security measures, keeping you on top of spectrum threat management.
Leverage the Power of Distributed Sensors
The wireless landscape is often so heavily utilized that detecting unauthorized or unusual activity feels like an immense — and almost futile — task. But Swarm's distributed system of sensors makes quick and automated work of logging, locating, analyzing and alerting on broadband RF and technology-specific wireless activity in the area of interest. The analysis Swarm returns can be used to inform practical business decisions and security measures, keeping you on top of spectrum threat management.
High Return, Lower Cost
Swarm can use Wireless Activity Sensor Platform (WASP) sensors, which are priced such that wide coverage can be achieved at a much lower cost than by using a more traditional full-spectrum receiver. By specializing in the technology-specific ranges, Swarm can rein in costs while still excelling at its detection and analysis tasks.
Complete Information
Swarm logs the key metadata for every wireless connection it observes. Quickly observe which networks each device created or attempted to create, joined or attempted join, and which networks it looked for. Swarm can easily identify which devices exchanged data with each other.
Alerts
All observed Wi-Fi activity is analyzed against user-defined alarms. Examples of some common alarms include alerts for when a denylisted device is detected or an alert when a Wi-Fi device is transmitting above a desired (or expected) threshold.