Wireless Airspace Defense Platform

Complete visibility into your wireless airspace

Bastille’s AI-driven wireless risk detection continuously analyzes radio frequency emissions and wireless signals in your offices, data centers, corporate facilities, and more to identify every wireless device, network, and threat.

A platform built for cybersecurity resilience

Proactively manage risk and rapidly mitigate wireless threats across the organization with a platform that illuminates on vulnerabilities typically overlooked in a Zero Trust framework. Bastille fits seamlessly into your greater cybersecurity strategy, with scalable API-led architecture and real-time, augmented data streams that integrate with your CAASM and XDR solutions.

Locate
Visualize
Assess
Respond
Locate

AI-powered wireless asset detection and location

High-performance, 100% passive sensor arrays rapidly process wireless protocols detected in your space, while Bastille’s powerful ML models connect the dots to pinpoint every wireless device and network.

  • Software-defined radios (SDR) and programmable FPGAs capture and process wireless signals from numerous protocols across the RF spectrum.
  • The platform’s unique AI algorithms identify and characterize each wireless device and network detected.
  • Your wireless inventory is updated in real time and enriched with business context.
Visualize

Wireless landscape visualization

See the full picture in the Bastille Fusion Center. Assess your wireless cybersecurity posture at a glance, view security events and threats prioritized by risk level, and explore analytics that help your team take action when it matters the most.

  • See a complete inventory of wireless devices and networks at your facilities.
  • Pinpoint the location and playback the historical position of every wireless device.
  • Get alerted of potential threats and view them based on priority.
  • View contextual data around device behavior and patterns.
  • Deep-dive into wireless forensic data after an incident.
Analyze

Advanced threat analysis and prioritization

AI-powered risk models categorize and prioritize potential threats according to their risk level, including wireless rogue hardware, unapproved or vulnerable mobile, cellular, Wi-Fi, IoT, and Bluetooth devices, and non-compliant usage.

  • Classify wireless threats based on device risk factors and behavioral patterns.
  • Map the location of every wireless threat.
  • Prioritize threats by risk level and drill down with a single click.
  • Continuously update threat data as new information is detected.
Respond

Real-time event streaming, alerts, and AI analytics

Act rapidly to prevent and mitigate threats based on real-time intelligence. Bastille instantly alerts the right team members when a threat is detected or needs attention, provides AI-powered risk analytics that drive cybersecurity decision-making, and integrates into your existing solution set for orchestrating response workflows.

  • Augment data in your XDR, SOAR, and SIEM solutions with business context from Bastille.
  • Integrate ETL jobs and data warehouses to enable custom analytics.
  • Avoid alert fatigue by configuring alerts to fit each security team and use case.
  • Understand historical patterns and activity with evolving, stateful analytics.

Go far beyond the network perimeter

Bastille’s unique approach to demodulating wireless signals and identifying protocols shines a light on previously undetectable devices and networks in your facilities.

Wi-Fi

Cellular

Zigbee

Matter

SNAP

WirelessHART

Bluetooth & Bluetooth Low Energy (BLE)

IEEE 802.15.4

ISA100.11a

MiWi

Thread

6LoWPAN

Uncover today’s most elusive threats

Bastille’s patented AI models assess the risk of every wireless device and network, categorize them by threat level and type, and alert the right people in real time.

Cellular threats

Unapproved smartphones and cellular devices vulnerable to spyware and capable of exfiltrating data, voice and video.

Wi-Fi-based threats

Rogue Wi-Fi hotspots and access points and nefarious devices like Wi-Fi pineapples.

Bluetooth threats

Bluetooth data exfiltration tools or vulnerable Bluetooth and Bluetooth Low-Energy (BLE) devices.

Eavesdropping and surveillance devices

Voice and motion-activated bugs or tagging devices like Airtags and Tiles.

Malicious devices

Data exfiltration, remote code, and injection devices like the O.MG Cable, Ninja Cable, Rubber Ducky, and Charger Bug.

Unapproved IoT devices and wearables

Thermostats, sensors, wireless cameras, and other smart devices or consumer products like the Ray-Ban Meta Wayfarer glasses.

Wireless attack tools and peripheral exploits

Widely accessible bad actor tools like MouseJack, KeySniffer, KeyJack, and Flipper Zero.

Vulnerable wireless building and industrial  controls

Alarm systems, motion detectors, and unconfigured controls with “Radio Ready” Consoles.

Vulnerable ISP-provided devices

ISP-provided, RDK-based wireless gateways and set-top boxes that can be exploited using cable-tapping techniques.

Unapproved networks

Networks created and run inside an organization by employees, contractors, visitors, or bad actors without approval from the organization.

Unmanaged devices

Devices not controlled by an MDM or XDR that may or may not be authorized to operate in the facility.

Malicious OT/ICS devices

Industrial Control System jammers, blockers, and signal-interfering devices.

Non-compliant usage

People doing risky things on otherwise approved devices, like connecting to unsecured Wi-Fi on a work phone.

High-performance sensing and processing technology

Bastille’s patented sensing technology uses 100% passive, reprogrammable sensor arrays and intelligent, onboard processing capabilities to capture a broad spectrum of wireless signals at enterprise speed and scale. Our software-defined radios (SDRs) keep you ahead of new protocols and threats through regular software updates rather than hardware replacement.

  • SDRs with 25 MHz – 7.125 GHz visibility
  • FPGAs with [massive] parallel processing
  • UL-certified for discreet ceiling installation
  • Self-cooling with no fans or moving parts
  • Powered by POE+ or wall power barrel connector
  • Real-time sensor health monitoring and fault tolerance

Choose from permanent and portable deployments

Bastille Enterprise

Discreet, permanently-installed sensor arrays approved for use in ceilings throughout multiple buildings or campuses.

Bastille FlyAway Kits

Cover areas from 5,000 to 20,000 square feet for audits and temporary locations using sensors cabled and mounted on tripods for rapid deployment.

Integrations

Security is a team sport. Bastille adds a new dimension to your cybersecurity solution stack, with an API-forward approach that allows for integration with every component in your ecosystem.

Resources

Protect your most sensitive assets with Bastille.

See how the platform works in a demo.