Webinar

Brett Walkenhorst, CTO, Bastille

Securing Data Centers from Cellular, RF and Wireless Intrusion Threats

Join our CTO, Brett Walkenhorst, Ph.D., to learn more about securing your Data Center from Cellular, RF, and Wireless Intrusion threats.

In the webinar, Brett walks through the different types of wireless vulnerabilities from the field and how to use a Wireless Intrusion Detection System (WIDS) to increase your operational security and get ahead of wireless threats.

WIDS - an introduction
Wireless Intrusion Detection and Prevention systems provide heightened operational security for your data centers, building on your existing investment in security cameras, access control and other forms of perimeter security. 

Data exfiltration via a rogue wireless device is a clear and present danger, yet goes largely unmonitored until a breach occurs, and then it is too late. Due to the nature of RF, there is no cable, no obvious connection, and so the threat often remains unseen.

How can Bastille help?

Bastille can help you by displaying wireless devices as dots on a floor-plan map, accurately showing their location within a defined space. The system can also be configured to alert when a device is found where it shouldn't be or suddenly moves to a restricted area, such as within a geo-fenced space - inside a data center. Better still, since all this is recorded, you can go back in time using our DVR function to see when and where a device first entered your secure data center.

Wireless Devices Located include:

  • Cell Phones: Individual phones located in real-time just by their cellular signal

  • Wearables: e.g. Smart watches such as Garmin Fenix, FitBit and Biometric Human Performance Monitors and other tactical gear

  • Personal Medical Devices: e.g. Hearing aids

  • Laptops & Tablets

  • USB Cables with hidden Wi-Fi and Bluetooth data extraction capabilities

  • Any device emitting Cellular, Wi-Fi, Bluetooth or BLE

Top Data Center Use Cases include:

  • Enforce No Cell Phone Policy or Nuanced Wireless Device Policies

  • Detect Data Exfiltration by Cellular, Bluetooth, BLE or Wi-Fi

  • Locate Rogue Devices like Non-Authorized RF/Wireless Devices, Networks & Hotspots

  • WIDS Compliance for Federal Customers’ Data

  • Integrations with existing infrastructure e.g. Lenel, Genetec, C•CURE, Splunk, Palo Alto, Aruba, Cisco, Juniper, MDM/UEMs (Mobile Iron, MaaS360, etc), Camera systems (Axis, Hikvision, etc)

Speaker:

  • Dr. Brett Walkenhorst, CTO at Bastille and former Director of the Software Defined Radio Lab at Georgia Tech