Security for the Internet of Radios
Bastille is the first company to enable enterprise security teams to assess and mitigate the risk associated with the growing Internet of Radios. Bastille’s patented software and security sensors bring visibility to devices emitting radio signals (Wi-Fi, cellular, wireless dongles and other IoT communications) in your organization’s airspace.
Bastille’s technology scans the entire radio spectrum, identifying devices on frequencies from 60 MHz to 6 GHz. This data is then gathered and stored, and mapped so that you can understand what devices are transmitting data, and from where in your corporate airspace. This provides improved situational awareness of potential cyber threats and post-event forensic analysis.
Who is using Bastille?
It's Time to Take the Blinders Off
Threats are becoming more complex as criminals look for new ways to use technology in their quest for valuable data. As the number of connected devices grows to more than 20 billion by 2020, the Internet of Things (IoT) will provide an unprecedented expansion of new threat vectors and Enterprises need to be able to respond. And what do 15 billion (75%) of these new devices have in common? … Radios! Much like the radios in other Wi-Fi and cellular devices. Bastille is providing solutions to allow Enterprise companies to Secure the Internet of Radios.
"Cyberattack in Dallas Sets Sirens Blaring by Radio Signal, Authorities say" Wall Street Journal asks Bastille about the threats of hackers using radios rather than conventional computer intrusion techniques
"Experts say wireless mice or keyboards could be vulnerable to “MouseJack” security threat" - San Francisco television station KRON4 covers MouseJack. Vince Cestone and Gabe Slate reporting.
LEADING RF SECURITY VULNERABILITIES IN 2018
When you think of RF vulnerabilities, you probably think first of Bluetooth and Wi-Fi issues. There have been well-publicized vulnerabilities in both during the past year, but the issue is broader. RF devices also include RFID tags, NFC (e.g., Apple Pay), 433 MHz remote control, LR-WPAN networking, and a host of proprietary protocols. Any of them can have security issues.