www.bastille.net Open in urlscan Pro
2606:4700:10::6816:1bd8  Public Scan

Submitted URL: https://info.bastille.net/e3t/Ctc/WZ+113/csLvs04/VWQ74J77_wv-W1njkc83BdvzMW2gkVcw582gwCN2K0T2P3prCCW69sMD-6lZ3l-W32_PJN74S...
Effective URL: https://www.bastille.net/?_hsmi=289189835&_hsenc=p2ANqtz-8_4gz7SfdNYIFjbM91JL64qz0WWeuMaAPeYFnuDRmDkSSdLSib2qXL_CfRkUI3r2...
Submission: On January 11 via manual from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

×

This website stores cookies on your computer. These cookies are used to improve
your website experience and provide more personalized services to you, both on
this website and through other media. To find out more about the cookies we use,
see our Privacy Policy.

We won't track your information when you visit our site. But in order to comply
with your preferences, we'll have to use just one tiny cookie so that you're not
asked to make this choice again.

Accept Decline

Learn about Bluetooth Vulnerabilities from our CTO in the Bastille Wireless
Vulnerabilities Series

Product
Enterprise
Government
Solutions
Enterprise
Government
Research
Introduction
Research Team
GitHub
Vulnerability Disclosure
Top Wireless Threats
KeySniffer
MouseJack
KeyJack
FORCEDENTRY
CableTap
SweynTooth
Resources
Support
Webinars
Data Sheets
White Papers
Videos
Education - RF101
Education - RF Protocols
Whiteboards
About
Our Mission
Management Team
Partners
Careers
Press Releases
In the News
Media Resources
Privacy Policy
Demo
Contact
Product
Enterprise
Government
Solutions
Enterprise
Government
Research
Introduction
Research Team
GitHub
Vulnerability Disclosure
Top Wireless Threats
KeySniffer
MouseJack
KeyJack
FORCEDENTRY
CableTap
SweynTooth
Resources
Support
Webinars
Data Sheets
White Papers
Videos
Education - RF101
Education - RF Protocols
Whiteboards
About
Our Mission
Management Team
Partners
Careers
Press Releases
In the News
Media Resources
Privacy Policy
Demo
Contact


Wireless Threat Intelligence

Bastille named to Inc. 5000 Fastest Growing Companies for the Third Year

Bastille Secures NIAP Common Criteria Validation

Insider Threat: The Latest on Pegasus Cell phone Spyware


WIRELESS THREAT INTELLIGENCE


SECURING THE MODERN, WIRELESS WORLD


THE THREAT

An explosion of wireless vulnerabilities in recent years has created a weakness
in the security posture of many organizations. With nearly 3000 CVEs published
based on wireless protocols, the wireless attack surface is highly vulnerable to
exploitation and largely ignored by most security solutions.



Wireless protocols use Radio Frequencies (RF) to transmit information. Similar
to sunlight, those waves travel at the speed of light, but unlike sunlight, they
penetrate physical barriers and are invisible to the eye. A basic tenet of
security is you can’t protect what you can’t see.


THE SOLUTION

Bastille provides the tools to secure the invisible wireless attack surface.
With its patented solution of broadband, multi-channel RF sensors, highly
scalable architecture, and advanced analytics, Bastille detects, locates, and
adjudicates wireless signals.

Bastille collects a comprehensive set of data about every wireless device
including their location over time, manufacturer, and transmission activities
and overall behavior. 

Bastille automatically identifies aberrant or malicious behavior and integrates
with third-party systems to provide alerts and execute automated responses.
Bastille’s advanced analytics engine, fueled with machine learning algorithms
and backed by 30+ patents, provides insights into both known wireless
infrastructure and other detected wireless devices using spatial, temporal, and
behavioral information. The result is the world’s first Wireless Threat
Intelligence Platform.


WIRELESS THREAT INTELLIGENCE = WIRELESS DETECTION + ADVANCED ANALYTICS

Bastille displays each device as an icon on a floor plan whose color indicates
the threat level assigned by the threat intelligence platform.

Learn more about Bastille's technology
 


USE CASES

Bastille is deployed among some of the world’s largest commercial companies and
government agencies. Common use cases include cloud infrastructure wireless
security, wireless intrusion detection (WIDS), classified area protection,
C-suite protection, manufacturing, and others.


ENTERPRISE

 * Cloud infrastructure wireless security

 * C-suite protection

 * Secure storage/computing facilities

 * Manufacturing (CPS / OT)

 * Trading floors

 * Call centers


GOVERNMENT

 * Wireless security for classified areas

 * Wireless intrusion detection system (WIDS) requirements

 * In-place monitoring systems

 * Forward-deployed wireless audits


GENERAL

 * Cellular intrusion detection

 * Continuous TSCM

 * Portable use cases

Learn more about Common Use Cases
 


THE BASTILLE SYSTEM


DETECTION AND RESPONSE

Bastille Sensor Array

Wireless monitoring is enabled by Bastille’s sensor arrays, which detect
wireless activity from 25 MHz to 6 GHz including cellular, Wi-Fi, Bluetooth,
Bluetooth Low Energy, Zigbee, and other 802.15.4 / IoT protocols. The sensor
arrays are 100% passive (they never transmit), are plenum rated, and are
available for both indoor and IP67 ruggedized outdoor use.

Bastille’s Fusion Center receives wireless data from the sensor arrays, compiles
and analyzes the data, and serves web-based user interfaces to display current
and historical wireless activity. 

The Fusion Center implements the threat analysis engine to detect wireless
threats and provides reporting functions and integrations with SIEM/SOAR,
MDM/UDM, incident response, and other physical and network security systems.

Bastille’s architecture is API-first and globally scalable to meet the most
demanding Enterprise Security needs

Learn more about Bastille’s Products
 


BASTILLE IN THE NEWS








Bastille In the News


Back to Top
Privacy Policy
Vulnerabilities
Rogue Cell Towers
Rogue Wi-Fi
Bluetooth Data Exfiltration
Eavesdropping devices
Vulnerable Wireless Peripherals
Unapproved Cellular Device Presence
Unapproved Wireless Cameras
Wireless Building Controls
Unapproved IoT devices
Building Alarm Systems
Job Openings
Vulnerability Disclosure
Contact us
 

 

© 2019 - 2024 Bastille Networks Internet Security. All Rights Reserved.