Bastille 30 Day Vulnerability Assessment
Inventory & Security Assessment of Wireless, IoT and Mobile Devices
- See what you’re missing in the wireless, mobile and IoT world
- Discover vulnerabilities and threats
- Find weaknesses already inside your enterprise
- Locate devices with a vulnerability
With the Bastille Audit you will be able to find:
- Rogue WiFi Access Points
- Rogue cell towers
- Never configured wireless devices
- Unauthorized cellular devices
- Web cameras, bugs and other listening devices
- Mouse and Keyboard vulnerabilities
- IoT devices that could be used to exfiltrate data or used in a DDoS Botnet
- And much more!
Wireless, Mobile and IoT devices in the Enterprise can be hacked and used to exfiltrate data or voice. The kinds of devices which can be corrupted include cell phones, wireless keyboards and mice, security cameras, smart TVs and industrial control systems to name just a few. In addition, $20 voice activated wireless bugs can be surreptitiously planted in conference rooms by cleaners, visitors, or contractors to steal your valuable information.
The Bastille Wireless Vulnerability Audit service will allow you to Sense, Identify and Localize threats from the billions of devices in what we call the Internet of Radios.
With this Bastille service you will be able to find, locate and inventory the Internet of Radios devices operating in your environment from the 60MHz to 6GHz frequency.
Over the course of 30 days you will be able to Sense, Identify and Localize devices across an area up to 25,000 square feet, see radio activity on a dashboard, benchmark your environment for the future, and receive a detailed report at the conclusion of the audit.
To learn more about your Data exfiltration risk and register your interest in the Bastille Wireless Vulnerability Audit service today.
Bastille’s Awards and Recognition:
Bastille Networks is a pioneering Internet of Radios (Mobile, IoT, and BYOD) security company. Bastille's patented technology combines hardware and software to offer enterprises identification, threat detection and location awareness for radio-enabled devices. Enterprise organizations use Bastille to accurately assess security threats from radio-enabled devices such as mobile phones and the growing number of Interned-enabled, but not Internet-secured IoT devices.