Wireless Threat Intelligence Snippets
- What is Wireless Threat Intelligence?
- Wireless Invisibility
- Wireless Ubiquity
- Wireless Vulnerability
- Bastille and TSCM
- Bastille IP
- Bluetooth Vulnerabilities
- Cell Detection – Geofencing
- Cellular Vulnerabilities
- Dashboards – Activity
- Evil Twin Attack Detection
- Massive Multi-Channel Demodulation (M2CD)
- MDM/UEM Integration
- Network Access Control (NAC)
- Solution Overview
- Wi-Fi Vulnerabilities
Excerpt From Introduction to Wireless Threat Intelligence Webinar
See CTO Dr. Brett Walkenhorst on Cell Detection—Geofencing
The clip below demonstrates how the Bastille platform integrated with cameras to improve security. Dr. Brett Walkenhorst, CTO, describes a scenario in which a geofence area is set up to prevent cellular devices from entering critical locations. Using video camera footage, the platform recognizes when someone enters the geofence region while carrying a cell phone. The cameras receive commands to pan, tilt, and zoom, focusing on the area of interest, once the device enters the geofence, even if they are not directly visible inside the restricted room. Through this integration, comprehensive security measures are ensured, and occurrences within the limited region may be better understood. It also gives additional data for forensic investigation and any legal ramifications.
Introduction to Wireless Threat Intelligence: Cell Detection—Geofencing