802 Secure cited in the Gartner report, OT Security Best Practices

802 Secure was cited in the Gartner report, "OT Security Best Practices", as an OT (Operational Technology) vendor for asset management and security monitoring. “This report is further evidence that our technology provides value to manufacturing, critical...

802 Secure’s CSO, Mike Raggo, presenting at ISC2 Security Congress Oct. 10, 2018

802 Secure’s CSO, Mike Raggo, will be presenting at the ISC2 Security Congress on Oct. 10th in New Orleans. "(ISC)² Security Congress brings together over 2,000 industry colleagues, offers 100+ educational and thought-leadership sessions, and fosters...

Russian WiFi cyber-attack foiled by Dutch intelligence

On October 4, 2018, BBC news https://www.bbc.com/news/world-europe-45747472 reported that an alleged Russian group's efforts to perform a cyber-attack on the Organisation for the Prevention of Chemical Weapons (OPCW) were foiled by Dutch law enforcement....

Download our IoT Cloud Security Report

This report looks back on 2017 by analyzing our cloud threat intelligence to determine the greatest IoT risks and threats impacting companies. These analytics were compiled from a subset of companies with greater than 10,000 employees. Through wireless sensors, 802 Secure passively identifies devices in organizations, including: consumer IoT devices, drones, cars, enterprise wireless networks, Industrial IoT (IIoT) devices, and more. Furthermore, we monitor security posture, identify attacks, and mitigate threats through deceptive networking. What follows is a recap of our 2017 report. Download here


The award-winning, 802 Secure AirShield™ Cloud provides comprehensive real-time visibility into both wireless network and IoT (Internet of Things) security threats through proactive passive and autonomous network monitoring.

IoT Adoption

Organizations are adopting Wi-Fi and IoT enabled business processes and technologies that promise great gains in productivity and results. However, organizations lack visibility into the multitude of new IoT operating systems, protocols, and frequencies; leading to a new Critical Path to Exposure™ for adversaries.


As organizations face these new risks and threats, 802 Secure brings visibility to invisible wireless IoT devices and networks with a solution that requires no network access and zero integration. Within minutes of deployment, wireless and IoT assets are identified and categorized, misconfigurations are enumerated, and rogue devices and attacks are identified; thereby providing actionable results without all of the static of unrelated wireless devices.

They’re talking about us: 

Request a demonstration today.