Watch video

Coronet provides your organization with total protection from wireless network threats

In today’s world where BYOD and BYON are common, the Coronet enterprise solution allows
you to safely use any Wi-Fi or Cellular network connection, on any device at any location.
The Coronet solution provides:

Visibility and intelligence on wireless threats both inside and outside of your premises.

Ability to define global wireless security policy that is automatically executed on devices

Freedom to connect your device from anywhere, access any service, and maintain privacy without any inconvenience.

Maintain Full Data Security of all corporate data, while ensuring full wireless network security and eliminating the risk of wireless device manipulation.

Traditional security tools do not protect you from wireless threats

Wireless attacks are one of the fastest growing threats and extremely easy to perform, especially in hotels, airports, public transportation and food courts.  
Every time your users, customers, or partners use Wi-Fi or cellular networks, inside or outside your premises, they potentially expose your organization to a wide range of threats that cannot be handled by traditional security technologies.

Learn more about the threat

Wireless attacks can:

Manipulate the device or the user

Intercept and manipulate data transmissions to and from the device

Place malware on the device

Gain access to assets on the device, including stored credentials

Use the device as a “Trojan Horse

The Coronet solution consists of three components:

1

Coronet Client

A lightweight software agent that runs on any device (Laptop, Smartphone, Tablet) and requires no hardware or OS level modifications

2

Coronet Enterprise Dashboard

A cloud platform that enables the CiSO’s organization to define wireless security policy, track threats in real time, and analyze threat intelligence

3

Coronet Intelligence Platform

A massive intelligence repository that captures network behavior data and continuously analyzes the data searching for new attack vectors, thus future proofing against new types of attacks.

Cloud based platform. Easy to deploy. No hardware.

Enterprise Protection
  • Access to the Coronet Portal in which you may
    • Define and manage wireless usage policy
    • Gain visibility into wireless network usage
    • Gain real time intelligence on threats around your users and locations
  • Client software that
    • Enforces your wireless connectivity policy
    • Detects wireless threats and potential breaches around the device
Personal Protection
  • Basic protection against wireless threats

Providing protection for all major platforms.

MAC OS

Windows

Android

iOS

See what the experts are saying

See what the Industry is saying

Coronet is Top Product
Enterprises Should
Know About
August 2016
CoroNet selected as “Top 15 Innovators” in the
Cisco/Pioneers challenge
June 2016
Security winner in The Tech Trailblazers Awards
September 2016

Learn more about wireless & cellular security

OUR BLOG

Why Not Even Google Pixel Can Offer Real Protection

Pixel, the first smartphone made by Google (excluding HTC’s Nexus One) is creating quite a buzz in the marketplace.  Major questions, however, remain regarding the secure nature of the device.  While the waters have yet to be tested, Adrian Ludwig, Android’s director of security, has come out with an announcement declaring  the Pixel to be (…)

Read
NEWS & EVENTS

Coronet Introduces Cloud-based Service to Help Companies Regain Control Over the Networks to which Employees Can Connect

New Wireless Policy Definition and Enforcement Service Protects Users and the Enterprise from Risky Networks and Cyber Attacks   Be’er Sheva, Israel, November 7, 2016 – Coronet, a cyber security software company, unveiled a second release of its cloud-based service, an end to end platform aimed at preventing a wireless breach to the enterprise, by regaining (…)

Read
CORONET WHITE PAPER

In our latest white paper, our CTO discusses an attack vector that introduces risks even into WPA protected networks.

Most organizations use the WPA-Enterprise security protocol to manage and protect their Wi-Fi access, allocating individual user credentials to their employees. Those credentials can be exposed using this attack method. To learn more about this attack, and ways to defend against it, download our free white paper.

Download
x

To activate, use your personal email address when prompted by the app.

MAC OS

Coming Soon

Windows

Download

To activate, use your corporate email address or activation code when prompted by the app.

MAC OS

Coming Soon

Windows

Download