Is it really WIDS if you don't see Cellular?

Many vendors sell "Wireless Intrusion Detection Systems" (WIDS). However, these systems only detect intrusions by Wi-Fi and Bluetooth devices. By far the biggest wireless intrusions are by way of cellular phones and the Bad Guys turn off Wi-Fi and Bluetooth when they don't want to be detected.Only Bastille can add cellular signal detection and accurate cellular location to any WIDS platform.

bastille_datasheet_cellular_2019_FINAL.jpg

Learn more

Data sheet on Cellular Intrusion Detection

Enforce "No Cell Phones Allowed" policies

If your policy or contract requires you to exclude cell phones from an area, use Bastille to enforce "No Cell Phones Allowed" policies. Bastille also gives you an audit trail to prove that policy is being enforced.

Bastille’s Cellular Intrusion Detection includes DVR functionality to record historic cell phone, Wi-Fi and Bluetooth devices location for forensic investigations

Bastille’s Cellular Intrusion Detection includes DVR functionality to record historic cell phone, Wi-Fi and Bluetooth devices location for forensic investigations

 

Enterprise Security

Bastille is the first company to enable enterprise security teams to assess and mitigate the risk associated with the growing Internet of Radios. Bastille’s patented software and security sensors bring visibility to devices emitting radio signals (Wi-Fi, cellular, wireless dongles and other IoT communications) in your organization’s airspace.

Bastille Technology

Bastille’s technology scans the entire radio spectrum, identifying devices on frequencies from 60 MHz to 6 GHz. This data is then gathered and stored, and mapped so that you can understand what devices are transmitting data, and from where in your corporate airspace. This provides improved situational awareness of potential cyber threats and post-event forensic analysis.


 
 
Read the AITE Group Report  by Senior Analyst, Danielle Tierney on Cell phone regulation and compliance in Financial Markets.  Watch the Webinar .

Read the AITE Group Report by Senior Analyst, Danielle Tierney on Cell phone regulation and compliance in Financial Markets. Watch the Webinar.

 

Who is using Bastille?

 

It's Time to Take the Blinders Off

Threats are becoming more complex as criminals look for new ways to use technology in their quest for valuable data. As the number of connected devices grows to more than 20 billion by 2020, the Internet of Things (IoT) will provide an unprecedented expansion of new threat vectors and Enterprises need to be able to respond. And what do 15 billion (75%) of these new devices have in common? … Radios! Much like the radios in other Wi-Fi and cellular devices. Bastille is providing solutions to allow Enterprise companies to Secure the Internet of Radios.

Now someone has finally taken a look and found that virtually all of (these devices) are vulnerable. That’s pretty scary.
— Samy Kamkar in Wired Magazine

 
501px-Wired_logo.svg.png

This Radio Hacker could Hijack Citywide Emergency Sirens to play any sound.  

READ MORE

 


Bastille in the Wall Street Journal.jpg

"Cyberattack in Dallas Sets Sirens Blaring by Radio Signal, Authorities say" Wall Street Journal asks Bastille about the threats of hackers using radios rather than conventional computer intrusion techniques


MouseJack Vulnerability.jpg