First WiFi ITDR Platform

Detect Identity Threats
in Your WiFi Network

Eight engines detect credential attacks, mid-session hijack, data exfiltration, insider threats, AI agent compromise, and captive portal fraud across your WiFi network in real time. 44+ threat types. 17 MITRE ATT&CK techniques. Zero agents to deploy.

No agents required · Works with any RADIUS-capable AP · Enterprise plan · SOC 2 Type II
1,000+ Organizations
108 Countries
50M+ Authentications/Month

WiFi ITDR (Identity Threat Detection and Response) is a security category defined by Gartner that IronWiFi applies specifically to wireless network authentication. Eight detection engines analyze every RADIUS authentication event, RADIUS accounting packet (Start/Interim/Stop), captive portal session, and AI agent authentication to identify 44+ threat types — credential attacks, behavioral anomalies, certificate threats, device spoofing, mid-session hijack, data exfiltration, portal fraud, compromised AI agents, and insider threats — mapped to 17 MITRE ATT&CK techniques with per-identity risk scoring from 0 to 100. Detections trigger automated response via RADIUS Change of Authorization, session blocking, or certificate revocation, and export to Splunk, Sentinel, Elastic, QRadar, or Datadog via syslog/CEF and webhooks.

40+
Threat Types Detected
<30s
Mean Time to Detect
7
Detection Engines
0
Agents to Deploy
Auth Event RADIUS, portal, or agent
Baseline Check Compare to learned behavior
7 Detection Engines Parallel threat analysis
Risk Score Identity risk 0–100
Alert & Respond Incident created
Overview

What Is WiFi ITDR?

Identity security for the wireless authentication layer

ITDR (Identity Threat Detection and Response) is a security category defined by Gartner that focuses on detecting threats targeting identity infrastructure. Most ITDR platforms monitor Active Directory, cloud IAM, or SSO providers. IronWiFi is the first to apply ITDR to WiFi network authentication, captive portal logins, and AI agent credentials.

Every time a user, guest, device, or AI agent authenticates on your wireless network, RADIUS and captive portal authentication produces rich telemetry — who, when, where, how, and what device. Most organizations discard this data. WiFi ITDR transforms it into continuous threat detection.

Seven specialized engines build behavioral baselines per identity and analyze every authentication event for credential attacks, behavioral anomalies, certificate misuse, device spoofing, portal-layer threats, insider threats, and compromised AI agents. Each detection is mapped to one of 15 MITRE ATT&CK techniques, risk-scored from 0 to 100, and correlated into incidents with automated response via RADIUS Change of Authorization.

Identity-Layer Detection

Operates at the authentication layer — sees threats that network-level tools miss entirely.

Per-Identity Baselines

Learns normal behavior for every identity: hours, APs, devices, EAP methods, locations.

Risk Scoring (0–100)

Composite risk score per identity based on detection severity, frequency, and recency.

MITRE ATT&CK Mapped

Every detection linked to the relevant technique for SOC workflows and compliance.

Engines

Eight Detection Engines, 44+ Threat Types

Every authentication event — RADIUS auth + accounting, captive portal, and AI agent — passes through eight specialized engines running in parallel

Credential Attack Engine

Sliding-window counters detect volumetric attacks targeting authentication credentials across RADIUS and captive portal logins in real time.

Brute Force Password Spray Credential Stuffing Replay Attack EAP Downgrade Voucher Stuffing
T1110 · Credential Access

Identity Anomaly Engine

Behavioral baselines built per identity detect deviations from normal authentication patterns across enterprise users, guest visitors, and devices — including sudden-denial bursts that signal out-of-band credential revocation or account de-provisioning.

Impossible Travel Sudden Denial Time Anomaly Frequency Anomaly AP Anomaly Auth Method Change Payment Fraud
T1078 · T1531 · Defense Evasion · Impact

Certificate Threat Engine

Validates certificate chains and detects misuse of PKI infrastructure for network access.

Revoked Cert Unknown CA Mass Issuance Expired Cert Cert Mismatch Expiry Clustering
T1556 · Credential Access

Device Threat Engine

Cross-references MAC addresses, device fingerprints, and session data to detect device-level threats.

MAC Spoofing Device Cloning Rogue Device MAC Rotation OS Change
T1036 · Defense Evasion

Session Anomaly Engine

Consumes RADIUS accounting (Start / Interim-Update / Stop) to detect threats that the auth packet alone cannot see — mid-session credential hijack, data exfiltration via outbound volume, and session-duration anomalies. Trust-tag-weighted thresholds calibrate per-NAS accounting accuracy against the WBA RADIUS Accounting Assurance standard.

Mid-Session IP Hijack Data Exfiltration Session Duration Anomaly
T1550 · T1048 · Defense Evasion · Exfiltration

Portal Security Engine

Detects web-layer threats unique to captive portal authentication — social login abuse, automated attacks, and session manipulation that RADIUS telemetry cannot see.

Social Login Abuse Bot Traffic Session Hijacking Payment Fraud Credential Reuse Cookie Replay
T1528 · T1059 · T1539

Agent Anomaly Engine

Purpose-built for non-human identities. Detects compromised AI agents, shadow AI, supply chain attacks, and lateral movement using per-agent behavioral baselines.

Rate Spike New IP Range Certificate Change Shadow AI Supply Chain Attack Peer Communication
T1078 · T1556 · T1021

Insider Threat Engine

Detects compromised or malicious insiders through authentication pattern analysis — after-hours access, excessive roaming, privilege escalation, and terminated user activity.

Warwalking Privilege Escalation Terminated User After-Hours Access Concurrent Sessions
T1078 · T1098 · T1133
Platform

One Dashboard, Every Authentication Layer

RADIUS, captive portal, and AI agent detections feed into the same incident timeline, risk scores, and MITRE mapping

Three of the eight engines — Credential Attack, Identity Anomaly, and Device Threat — analyze events across all authentication layers. The Session Anomaly Engine consumes RADIUS accounting to catch mid-session hijack and data exfiltration after auth succeeded. The Portal Security Engine adds web-layer detection for captive portal threats. The Agent Anomaly Engine monitors non-human identities for compromise, shadow AI, and supply chain attacks. The Insider Threat Engine catches warwalking, privilege escalation, and terminated user access. Every detection, regardless of source, appears in a single unified view.

How It Works

How Does WiFi ITDR Work?

From silent authentication telemetry to actionable threat intelligence in four steps

The Detection Pipeline

Every authentication event flows through a purpose-built pipeline that turns raw RADIUS data into security intelligence — automatically and in real time.

1

Connect RADIUS

Point your access points to IronWiFi RADIUS. Authentication telemetry flows automatically — no agents, no sensors, no network taps.

2

Baselines Learn

Behavioral baselines build per identity within 7–14 days: typical hours, access points, devices, authentication methods, and locations.

3

Engines Analyze

Every authentication event passes through eight detection engines in parallel. Each engine scores threats and maps them to MITRE ATT&CK techniques.

4

Threats Surfaced

Detections are risk-scored, correlated into incidents, and surfaced in your console with full identity context and response playbooks.

Why This Architecture Matters

Zero Infrastructure

No agents, sensors, or network taps. Works from RADIUS telemetry your APs already produce.

Real-Time Detection

Sub-30-second mean time to detect. Threats caught during the authentication event, not hours later.

Defense in Depth

Eight engines with different detection strategies ensure threats can't slip through a single blind spot.

Full Audit Trail

Every detection and incident logged with timestamps, identity context, and MITRE technique IDs.

MITRE Coverage

MITRE ATT&CK Technique Coverage

Every detection mapped to the framework your SOC already speaks

Technique Name Tactic ITDR Detection
T1110 Brute Force Credential Access Brute force, password spray, credential stuffing, voucher stuffing
T1110.001 Password Guessing Credential Access Failed auth threshold per identity per window
T1110.003 Password Spraying Credential Access Single credential against multiple identities
T1078 Valid Accounts Defense Evasion Impossible travel, time anomaly, AP anomaly, payment fraud, off-hours activity
T1078.004 Cloud Accounts Persistence Agent rate spike, compromised automation loops
T1556 Modify Auth Process Credential Access EAP downgrade, certificate misuse, unknown CA, agent certificate change
T1036 Masquerading Defense Evasion MAC spoofing, device cloning, rapid MAC rotation
T1562 Impair Defenses Defense Evasion Rogue device, unauthorized AP association
T1528 Steal Application Access Token Credential Access OAuth token replay, social login account takeover
T1059 Command and Scripting Execution Bot traffic, automated portal submissions, CAPTCHA bypass
T1539 Steal Web Session Cookie Credential Access Session hijacking, cookie replay, unauthorized session extension
T1021 Remote Services Lateral Movement Agent accessing unauthorized network segments or SSIDs
T1098 Account Manipulation Persistence Privilege escalation, unauthorized role changes, terminated user reactivation
T1133 External Remote Services Persistence After-hours access, warwalking (10+ APs in 1 hour), concurrent sessions from multiple locations
T1557 Adversary-in-the-Middle Credential Access Replay attacks, credential interception via rogue AP
T1550 Use Alternate Authentication Material Defense Evasion Mid-session hijack via Framed-IP change on active RADIUS session
T1048 Exfiltration Over Alternative Protocol Exfiltration Anomalous outbound octet volume vs per-identity baseline (octets z-score from RADIUS accounting)
T1531 Account Access Removal Impact Sudden-denial burst from known AP for historically-healthy user (out-of-band credential revocation, account de-provisioning, MFA fatigue tail)
Compliance

Built for Compliance Audits

WiFi ITDR maps directly to the controls auditors ask about

SOC 2 Type II

Continuous monitoring of authentication events satisfies CC6.1 (logical access controls), CC6.6 (system boundaries), and CC7.2 (anomaly detection). Full audit trail in BigQuery with 365-day retention.

HIPAA

Detects unauthorized access to ePHI network segments. Maps to §164.312(a) (access control), §164.312(b) (audit controls), and §164.312(d) (person authentication).

NIS2

Satisfies Article 21 requirements for risk analysis, incident handling, and supply chain security. Insider Threat and Agent Anomaly engines address access control and asset management obligations.

PCI DSS 4.0

Addresses Requirement 10 (log and monitor) and Requirement 11 (test security). Payment fraud detection on captive portals maps to Requirement 6 (secure systems). 90-day detection retention meets audit requirements.

Comparison

WiFi ITDR vs. Traditional Security Approaches

How identity-layer detection compares to what you may be using today

Capability
WiFi ITDR
NAC / NDR
Detection Layer
Identity & authentication
Network traffic / port control
Credential Attack Detection
Brute force, spray, stuffing, EAP downgrade
Not detected
Behavioral Baselines
Per-identity, continuously updated
Network-level only
Impossible Travel Detection
AP location + timing analysis
No identity context
MITRE ATT&CK Mapping
Automatic, per detection
Varies / manual
Deployment
Zero agents, zero sensors
Agents, sensors, or taps required
Time to Value
Detections within minutes
Weeks of configuration
Identity Risk Scoring
Composite 0–100 per identity
Binary allow/deny
Talk to Sales
Response

Detect, Then Respond — Automatically

Configurable playbooks with shadow, detect, and enforce modes close the loop between detection and remediation in seconds

RADIUS Change of Authorization

Quarantine, disconnect, or reassign VLAN for compromised identities in real time via RADIUS CoA — no manual intervention, no waiting for the next auth cycle.

Quarantine VLAN Reassign Disconnect

Captive Portal Enforcement

Block portal sessions, require re-authentication, or trigger MFA step-up for guest users flagged by detection engines. Stops payment fraud and bot attacks mid-session.

Session Block MFA Step-Up Re-Auth Required

Agent Lifecycle Actions

Revoke certificates, restrict network segments, or suspend AI agent identities when anomalies indicate compromise or unauthorized lateral movement.

Cert Revoke Segment Restrict Agent Suspend

SIEM & SOAR Integration

Forward risk-scored detections to Splunk, Sentinel, Elastic, QRadar, or Datadog via syslog/CEF, webhooks, or REST API. Trigger SOAR playbooks from any detection event.

Syslog Webhooks REST API

Talk to a WiFi Identity Specialist

  • See IronWiFi working with your hardware
  • Get a deployment plan for your network
  • 30-minute call — no pitch deck

Set up in under 15 minutes — no credit card required