Many vendors sell "Wireless Intrusion Detection Systems" (WIDS). However, these systems only detect intrusions by Wi-Fi and Bluetooth devices. By far the biggest wireless intrusions are by way of cellular phones and the Bad Guys turn off Wi-Fi and Bluetooth when they don't want to be detected.Only Bastille can add cellular signal detection and accurate cellular location to any WIDS platform.
Data sheet on Cellular Intrusion Detection
Download the data sheet
ENFORCE "NO CELL PHONES ALLOWED" POLICIES
If your policy or contract requires you to exclude cell phones from an area, use Bastille to enforce "No Cell Phones Allowed" policies. Bastille also gives you an audit trail to prove that policy is being enforced.
Bastille’s Cellular Intrusion Detection includes DVR functionality to record historic cell phone, Wi-Fi and Bluetooth devices location for forensic investigations" id="yui_3_17_2_1_1565645182691_145">
Bastille’s Cellular Intrusion Detection includes DVR functionality to record historic cell phone, Wi-Fi and Bluetooth devices location for forensic investigations
REQUEST A DEMO
Bastille is the first company to enable enterprise security teams to assess and mitigate the risk associated with the growing Internet of Radios. Bastille’s patented software and security sensors bring visibility to devices emitting radio signals (Wi-Fi, cellular, wireless dongles and other IoT communications) in your organization’s airspace.
Bastille’s technology scans the entire radio spectrum, identifying devices on frequencies from 60 MHz to 6 GHz. This data is then gathered and stored, and mapped so that you can understand what devices are transmitting data, and from where in your corporate airspace. This provides improved situational awareness of potential cyber threats and post-event forensic analysis.
Read the AITE Group Report by Senior Analyst, Danielle Tierney on Cell phone regulation and compliance in Financial Markets. Watch the Webinar." id="yui_3_17_2_1_1565645182691_162">
Read the AITE Group Report by Senior Analyst, Danielle Tierney on Cell phone regulation and compliance in Financial Markets. Watch the Webinar .
WHO IS USING BASTILLE?
Learn more about Bastille from Jon Miller, Chief Research Officer at Cylance" id="yui_3_17_2_1_1565645182691_179">
Learn more about Bastille from Jon Miller, Chief Research Officer at Cylance
IT'S TIME TO TAKE THE BLINDERS OFF
Learn more about Bastille Awards & Recognition" id="yui_3_17_2_1_1565645182691_197">
Learn more about Bastille Awards & Recognition
Threats are becoming more complex as criminals look for new ways to use technology in their quest for valuable data. As the number of connected devices grows to more than 20 billion by 2020, the Internet of Things (IoT) will provide an unprecedented expansion of new threat vectors and Enterprises need to be able to respond. And what do 15 billion (75%) of these new devices have in common? … Radios! Much like the radios in other Wi-Fi and cellular devices. Bastille is providing solutions to allow Enterprise companies to Secure the Internet of Radios.
> “Now someone has finally taken a look and found that virtually all > of (these devices) are vulnerable. That’s pretty scary.” — Samy Kamkar in Wired Magazine
Why you should really, really update your Logitech wireless dongle.
MouseJack never really went away
This Radio Hacker could Hijack Citywide Emergency Sirens to play any sound.
"Cyberattack in Dallas Sets Sirens Blaring by Radio Signal, Authorities say" Wall Street Journal asks Bastille about the threats of hackers using radios rather than conventional computer intrusion techniques
"Experts say wireless mice or keyboards could be vulnerable to “MouseJack” security threat" - San Francisco television station KRON4 covers MouseJack. Vince Cestone and Gabe Slate reporting.
Bastille in the news:
Back to Top
Rogue Cell Towers Rogue Wi-Fi Bluetooth Data Extraction