www.bastille.net
Open in
urlscan Pro
2606:4700:10::6816:1bd8
Public Scan
Submitted URL: https://info.bastille.net/e3t/Ctc/WZ+113/csLvs04/VWQ74J77_wv-W1njkc83BdvzMW2gkVcw582gwCN2K0T2P3prCCW69sMD-6lZ3l-W32_PJN74S...
Effective URL: https://www.bastille.net/?_hsmi=289189835&_hsenc=p2ANqtz-8_4gz7SfdNYIFjbM91JL64qz0WWeuMaAPeYFnuDRmDkSSdLSib2qXL_CfRkUI3r2...
Submission: On January 11 via manual from US — Scanned from DE
Effective URL: https://www.bastille.net/?_hsmi=289189835&_hsenc=p2ANqtz-8_4gz7SfdNYIFjbM91JL64qz0WWeuMaAPeYFnuDRmDkSSdLSib2qXL_CfRkUI3r2...
Submission: On January 11 via manual from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
× This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy. We won't track your information when you visit our site. But in order to comply with your preferences, we'll have to use just one tiny cookie so that you're not asked to make this choice again. Accept Decline Learn about Bluetooth Vulnerabilities from our CTO in the Bastille Wireless Vulnerabilities Series Product Enterprise Government Solutions Enterprise Government Research Introduction Research Team GitHub Vulnerability Disclosure Top Wireless Threats KeySniffer MouseJack KeyJack FORCEDENTRY CableTap SweynTooth Resources Support Webinars Data Sheets White Papers Videos Education - RF101 Education - RF Protocols Whiteboards About Our Mission Management Team Partners Careers Press Releases In the News Media Resources Privacy Policy Demo Contact Product Enterprise Government Solutions Enterprise Government Research Introduction Research Team GitHub Vulnerability Disclosure Top Wireless Threats KeySniffer MouseJack KeyJack FORCEDENTRY CableTap SweynTooth Resources Support Webinars Data Sheets White Papers Videos Education - RF101 Education - RF Protocols Whiteboards About Our Mission Management Team Partners Careers Press Releases In the News Media Resources Privacy Policy Demo Contact Wireless Threat Intelligence Bastille named to Inc. 5000 Fastest Growing Companies for the Third Year Bastille Secures NIAP Common Criteria Validation Insider Threat: The Latest on Pegasus Cell phone Spyware WIRELESS THREAT INTELLIGENCE SECURING THE MODERN, WIRELESS WORLD THE THREAT An explosion of wireless vulnerabilities in recent years has created a weakness in the security posture of many organizations. With nearly 3000 CVEs published based on wireless protocols, the wireless attack surface is highly vulnerable to exploitation and largely ignored by most security solutions. Wireless protocols use Radio Frequencies (RF) to transmit information. Similar to sunlight, those waves travel at the speed of light, but unlike sunlight, they penetrate physical barriers and are invisible to the eye. A basic tenet of security is you can’t protect what you can’t see. THE SOLUTION Bastille provides the tools to secure the invisible wireless attack surface. With its patented solution of broadband, multi-channel RF sensors, highly scalable architecture, and advanced analytics, Bastille detects, locates, and adjudicates wireless signals. Bastille collects a comprehensive set of data about every wireless device including their location over time, manufacturer, and transmission activities and overall behavior. Bastille automatically identifies aberrant or malicious behavior and integrates with third-party systems to provide alerts and execute automated responses. Bastille’s advanced analytics engine, fueled with machine learning algorithms and backed by 30+ patents, provides insights into both known wireless infrastructure and other detected wireless devices using spatial, temporal, and behavioral information. The result is the world’s first Wireless Threat Intelligence Platform. WIRELESS THREAT INTELLIGENCE = WIRELESS DETECTION + ADVANCED ANALYTICS Bastille displays each device as an icon on a floor plan whose color indicates the threat level assigned by the threat intelligence platform. Learn more about Bastille's technology USE CASES Bastille is deployed among some of the world’s largest commercial companies and government agencies. Common use cases include cloud infrastructure wireless security, wireless intrusion detection (WIDS), classified area protection, C-suite protection, manufacturing, and others. ENTERPRISE * Cloud infrastructure wireless security * C-suite protection * Secure storage/computing facilities * Manufacturing (CPS / OT) * Trading floors * Call centers GOVERNMENT * Wireless security for classified areas * Wireless intrusion detection system (WIDS) requirements * In-place monitoring systems * Forward-deployed wireless audits GENERAL * Cellular intrusion detection * Continuous TSCM * Portable use cases Learn more about Common Use Cases THE BASTILLE SYSTEM DETECTION AND RESPONSE Bastille Sensor Array Wireless monitoring is enabled by Bastille’s sensor arrays, which detect wireless activity from 25 MHz to 6 GHz including cellular, Wi-Fi, Bluetooth, Bluetooth Low Energy, Zigbee, and other 802.15.4 / IoT protocols. The sensor arrays are 100% passive (they never transmit), are plenum rated, and are available for both indoor and IP67 ruggedized outdoor use. Bastille’s Fusion Center receives wireless data from the sensor arrays, compiles and analyzes the data, and serves web-based user interfaces to display current and historical wireless activity. The Fusion Center implements the threat analysis engine to detect wireless threats and provides reporting functions and integrations with SIEM/SOAR, MDM/UDM, incident response, and other physical and network security systems. Bastille’s architecture is API-first and globally scalable to meet the most demanding Enterprise Security needs Learn more about Bastille’s Products BASTILLE IN THE NEWS Bastille In the News Back to Top Privacy Policy Vulnerabilities Rogue Cell Towers Rogue Wi-Fi Bluetooth Data Exfiltration Eavesdropping devices Vulnerable Wireless Peripherals Unapproved Cellular Device Presence Unapproved Wireless Cameras Wireless Building Controls Unapproved IoT devices Building Alarm Systems Job Openings Vulnerability Disclosure Contact us © 2019 - 2024 Bastille Networks Internet Security. All Rights Reserved.