•
|
Real-Time - View logged information as it happens
|
•
|
Transparent - No need to halt legitimate network traffic when managing threats
|
•
|
Comprehensive - Provides detection of many types of RF threats.
|
For complete descriptions of the above types of RF Threat Detection, see the Practical RF Monitoring Field Applications.