Horizon WiFi Offers Protexx Wireless Security to Protect Against 'Evil Twins' in Wireless Hotspots

Share Article

Protexx secures Horizon's wireless hotspot users with portable 2048bit encryption software resulting in total invisibility of transmitted data negating threats from Evil Twins and Rogue Access Points.

Block Island, the largest of our deployments, is the perfect environment to showcase the Protexx Data Guard Software

Horizon WiFi announced today the availability of Protexx, Data Guard encryption software at all of its wireless hotspots from Rhode Island to Florida as protection against hackers and "Evil Twins." The Protexx, Data Guard, S.I.T.H. (Secure Information Transmission Highway) software is a high encryption (up to 2048 bit) VPN (Virtual Private Network) used to secure data transmissions in both wired and wireless environments without hardware.

The Data Guard Software resides on the client's device and seamlessly wraps the data transmission in up to a 2048 bit encryption tunnel. The tunnel is routed to one of three network operation centers where it is decrypted and passed on to the recipient, effectively making the client device and the transmitted data invisible to its wireless surroundings as well as any wired network. The return path to the client is also encrypted. The entire process is seamless and adds no latency to the data transmission.

"'Evil Twin' is the term for a WiFi access point that appears to be a legitimate one offered on the premises, but actually has been set up by a hacker to intercept wireless communications," says Peter Letizia, President of Protexx Inc, the Deerfield Beach, FL based VPN software innovator. "Contrary to popular belief, corporate employees who utilize their company's VPN hardware system are not necessarily secured in wireless environments," "These individuals must still log in to their company VPN hardware thus exposing the user name and password to a sniffing attack and compromise. Protexx alleviates the problem entirely by wrapping the hardware VPN within the portable Protexx VPN or by totally eliminating the VPN hardware. Either way, the result of using Protexx Data Guard is that all data transmitted from the users computer is invisible to all but the intended recipient, including user names, passwords, credit card and financial information, MAC addresses and virtually all data, even when passing through a rogue or hijacked Access Point."

"Block Island, the largest of our deployments, is the perfect environment to showcase the Protexx Data Guard Software," says Jami Feher, marketing director for Horizon WiFi and Hotspot administrator. "The consequence of a data loss to the wireless subscriber can be potentially ruinous. "Fortunately the consumer has a portable tool to combat those nefarious individuals and rogue Access Points that prey on the unsuspecting public. Protexx will be offered at both the login "splash" page and the landing page. However, it is our hope that hotspot subscribers have Protexx installed prior to the hotspot login," she added, "so that the initial subscription transaction will be cloaked in invisibility as well."

Data Guard is the only portable, certificate based, down loadable, high encryption software that can be used by individuals, small business, large corporations and governments alike. Data Guard can be used with WiFi, cable, network, DSL,Cellular data, satellite and broadband. The portability factor alone makes the software cost effective for any type of user. The fact that the software is certificate based assures corporations of security reporting and when mandatory compliance issues apply, the data trail can be easily audited.

Protexx Data Guard is available as a download from Protexx's secure website, Protexx.com as well as Horizonwifi.com and all Horizon WiFi locations, for as little as $4.95 a month. Users may also like to know that the initial information used to procure Protexx can be encrypted at a 256 bit rate making it twice as secure as from a 128 bit encrypted site.

###

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Peter Letizia
Visit website