What is WIPS (wireless intrusion prevention system)? - Definition from WhatIs.com


WIPS (wireless intrusion prevention system)

Part of the Network security glossary:

A wireless intrusion prevention system (WIPS) is a second tier of security that protects a network from intrusion from an attacker accessing the network via Wi-Fi.

WIPS hardware often looks much like a rack server while the associated sensors resemble Wi-Fi access points. However, instead of serving as a connection point, a WIPS sensor monitors the radio spectrum in its environment and takes automatic actions to protect the network. While WIPS features and appearance can vary, they generally overlay the existing wireless network with dedicated hardware and an application whose sole purpose is to mitigate malicious events. Some network access points have WIPS technologies that monitor in their spare time.

Most stand-alone WIPS systems share the same fundamental components:

  • Sensors -- spread throughout the Wi-Fi network, monitor the radio spectrum and forward logs back to a central management server.
  • Management server -- one or more servers that allow access to the console to coordinate the monitoring process and manage the WIPS. These servers also receive information captured by the sensors and take appropriate defense actions based on this information.
  • Database server – Stores and organizes the information captured by the sensors.
  • Console -- The interface that lets users and administrators control the WIPS.

Aside from being a security layer, WIPS can also monitor performance and point out access points with setup errors. While WIPS provide many valuable features and protections, especially to enterprise, they can be quite costly. With hardware, applications, subscriptions and training all factored in, an enterprise with 250 access points might spend as much as $100,000 on a complete WIPS solution.

This was last updated in July 2014
Contributor(s): Matthew Haughn
Posted by: Margaret Rouse

Related Terms


  • Chief Risk Officer (CRO)

    - The chief risk officer (CRO) is the corporate executive tasked with assessing and mitigating significant competitive, regulatory and technological risks across the enterprise. (SearchCompliance.com)

  • long-tail intrusion

    - Long-tail intrusions include advanced persistent threats (APT). However, sometimes intrusions achieved by simpler methods and malware may be used as the starting point of a long-tail intrusion and ... (WhatIs.com)

  • breach detection system (BDS)

    - Breach detection systems (BDS) are a category of applications and security devices designed to detect the activity of malware inside a network after a breach has occurred. Enterprise IT uses BDS t... (WhatIs.com)


  • Network security

    - Terms related to network security, including definitions about intrusion prevention and words and phrases about VPNs and firewalls.

  • Internet applications

    - This WhatIs.com glossary contains terms related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce ...

Ask a Question About WIPS (wireless intrusion prevention system)Powered by ITKnowledgeExchange.com

Get answers from your peers on your most technical challenges

Tech TalkComment



    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.