Federal Facility/Campus/Headquarters

Federal agencies have requirements for wireless security in both the classified and unclassified areas of their facilities.

Federal Facility Campus HQ.png

In classified areas, the mere presence of a phone or other electronic device may be sufficient to require an alert.  In all areas, a rogue device exfiltrating sensitive data should be reported in real time.

Consequently, federal agencies are interested to understand employee, contractor and visitor behavior and what types of devices are entering their offices and campuses.

THE CURRENT SITUATION

Currently federal agencies do not have an all-inclusive view into the wireless devices and traffic in their environments. In order to protect from the emerging threats associated with the wireless spectrum, and most prevalently cellular, Wi-Fi and Bluetooth devices, campuses must first recognize the devices and protocols in their airspace.

Understanding the devices associated with employees, contractors and visitors gives a view into the insider threat scenario. Rogue devices, data exfiltration, misconfigured equipment, and insider threats are all possible via nefarious devices.

Facility/Campus/Headquarters Wireless Security Vulnerabilities include:

  • Unauthorized devices

  • Individuals in unauthorized areas

  • Wireless threat surface associated with the devices in the RF spectrum

  • Improperly configured devices which can leave an open gateway for attackers to eavesdrop on activities and other nefarious activities

THE REQUIREMENTS FOR A FACILITY RADIO SECURITY SOLUTION

A campus facility radio security solution needs to:

  1. Provide visibility into the wireless networks, traffic, and devices operating in your environment,

  2. Deliver real time and accurate locations for all devices

  3. Inform you of the attack surface for each of these devices,

  4. Alert on active wireless attacks on those devices through your existing SIEM, Incident Alert and/or other systems

Specifically, a solution must:

  • Detect all devices operating in the wireless spectrum, to include but not limited to, Wi-Fi, Cellular, Bluetooth, and the hundreds of other protocols in the Internet of Things (IoT)

  • Provide awareness into any wireless threats including active attacks, rogue networks, and misconfigured devices

  • Track the movement of wireless enabled to augment existing security measures

  • Show the movements of devices to help enforce access policies

  • Enforce agency BYOD/IoT policy

  • Detect unauthorized access

  • Detect data exfiltration through wireless devices

  • Allow the physical security to quickly detect and localize any malicious devices

  • Include geofencing capabilities to understand and protect areas with sensitive data

  • Integrate with video surveillance systems

  • Use open standards based APIs to permit integration with existing systems, allowing monitoring via the existing single pane of glass in use by the agency today  

Bastille Cellular Intrusion Detection

Cellular, Wi-Fi & Bluetooth

Since 2016 when it first contracted with the Department of Homeland Security to help protect the Nation’s critical infrastructure from the threats associated with the IoT, Bastille has been first to market with innovative and affordable RF security solutions.

Bastille’s patented Cellular Intrusion Detection solution advances science and practice delivering the first solution which can accurately detect and locate cell phones inside an agency’s facilities using just their cellular signal. In addition, as Bastille also locates Wi-Fi and Bluetooth, it will accurately locate any mobile device or infrastructure component using those protocols, whether its authorized or rogue. This broad situational awareness is extended to action with real time alerts through either Bastille or your existing system of choice using open standards based API integrations.

For more details about Bastille’s Cellular Intrusion Detection solution, click here.