Competition

Competition or Future Customer?

 

Feature Matrix

 

competition or customer

There are a few manufacturers of Wireless Intrusion Detection Systems (WIDS). Some of the largest are shown in the matrix above. As the name implies, each detects a wireless intrusion. But, competing devices use data for detection, some using device identification from packet headers (which can be spoofed by a perpetrator) and some use Artificial Intelligence to look for network activity that is not normal. In an industrial plant, when control devices react to a fire in the plant, or a boiler explosion, the network activity is certainly not ‘normal’, but it may be acting as it was designed to act. That creates a problem if the WIDS is showing a cyber-attack when there is none. Additionally, cyber criminals are now using AI attacks to re-train AI security systems, circumventing their detection. Only Endpoint is using a method based on naturally-occurring properties of the wireless signal, rather than data. That makes Endpoint backward compatible with old legacy devices which may not even have any security software on them. It also makes Endpoint protocol agnostic, so it could alert an unwanted Wi-Fi device, an unwanted Bluetooth device, or any other technology in the same spectrum.

These features should make Endpoint technology desirable. Rather than trying to take away market from the powerhouse leaders in the space, Endpoint will offer license agreements for its technology that would allow us to leverage a former competitors market presence. Thus, our competitors become our customers.