According to the company, its AirDefense wireless vulnerability assessment package works by simulating a series of hacker attacks on each wireless node on a host network.
The software is even designed to pro-actively `attack' wireless networks operated by card transaction terminals and, says Motorola, can be configured to operate remotely when analysing branch office networking systems.
Using this approach, says the company, avoids the need to send staff to the remote branches and offices to manually conduct testing required for PCI DSS 1.2 compliance.
As the software steps through its test procedures, it builds up a database of vulnerabilities.
The database can then be used by auditors to conduct further testing on the specific areas of the network identified as potentially insecure.