Is it really WIDS if you don't see Cellular?
Many vendors sell "Wireless Intrusion Detection Systems" (WIDS). However, these systems only detect intrusions by Wi-Fi and Bluetooth devices. By far the biggest wireless intrusions are by way of cellular phones and the Bad Guys turn off Wi-Fi and Bluetooth when they don't want to be detected.Only Bastille can add cellular signal detection and accurate cellular location to any WIDS platform.
Enforce "No Cell Phones Allowed" policies
If your policy or contract requires you to exclude cell phones from an area, use Bastille to enforce "No Cell Phones Allowed" policies. Bastille also gives you an audit trail to prove that policy is being enforced.
Bastille is the first company to enable enterprise security teams to assess and mitigate the risk associated with the growing Internet of Radios. Bastille’s patented software and security sensors bring visibility to devices emitting radio signals (Wi-Fi, cellular, wireless dongles and other IoT communications) in your organization’s airspace.
Bastille’s technology scans the entire radio spectrum, identifying devices on frequencies from 60 MHz to 6 GHz. This data is then gathered and stored, and mapped so that you can understand what devices are transmitting data, and from where in your corporate airspace. This provides improved situational awareness of potential cyber threats and post-event forensic analysis.
Who is using Bastille?
It's Time to Take the Blinders Off
Threats are becoming more complex as criminals look for new ways to use technology in their quest for valuable data. As the number of connected devices grows to more than 20 billion by 2020, the Internet of Things (IoT) will provide an unprecedented expansion of new threat vectors and Enterprises need to be able to respond. And what do 15 billion (75%) of these new devices have in common? … Radios! Much like the radios in other Wi-Fi and cellular devices. Bastille is providing solutions to allow Enterprise companies to Secure the Internet of Radios.
"Cyberattack in Dallas Sets Sirens Blaring by Radio Signal, Authorities say" Wall Street Journal asks Bastille about the threats of hackers using radios rather than conventional computer intrusion techniques
"Experts say wireless mice or keyboards could be vulnerable to “MouseJack” security threat" - San Francisco television station KRON4 covers MouseJack. Vince Cestone and Gabe Slate reporting.
LEADING RF SECURITY VULNERABILITIES
When you think of RF vulnerabilities, you probably think first of Bluetooth and Wi-Fi issues. There have been well-publicized vulnerabilities in both during the past year, but the issue is broader. RF devices also include RFID tags, NFC (e.g., Apple Pay), 433 MHz remote control, LR-WPAN networking, and a host of proprietary protocols. Any of them can have security issues.