{
    "business_name": "Bastille",
    "legal_name": "Bastille Networks, Inc.",
    "website": "https://bastille.net",
    "founded": "2014",
    "founder": "Bob Baxley",
    "business_type": "Series C Cybersecurity Company",
    "funding": {
        "total_raised": "$82.5M+",
        "latest_round": "Series C ($44M, January 2024)",
        "lead_investor": "Goldman Sachs (GS Growth)",
        "notable_investors": [
            "Bessemer Venture Partners",
            "Goldman Sachs",
            "Comcast"
        ]
    },
    "known_for": "Leading wireless airspace defense platform using patented software-defined radio, FPGA signal processing, and AI/ML to detect, locate, and assess wireless threats across 50+ protocols that Zero Trust, CAASM, and XDR programs overlook.",
    "mission": "Expand the capabilities of the leading wireless threat intelligence platform, making invisible wireless connections and threats visible",
    "location": {
        "headquarters": {
            "address": "499 Lake Avenue",
            "city": "Santa Cruz",
            "state": "CA",
            "country": "US"
        },
        "locale": "en-us"
    },
    "contact_methods": {
        "demo": "https://bastille.net/contact/",
        "phone": "+1-617-858-5731",
        "support": "https://bastille.net/support/"
    },
    "platform_overview": {
        "type": "Wireless Airspace Defense Platform",
        "target_market": "Fortune 100 enterprises and government organizations",
        "core_value": "Real-time detection, localization, and risk assessment of wireless devices, networks, and threats beyond the network perimeter",
        "spectrum_coverage": "100 MHz to 7.125 GHz",
        "protocols_monitored": "50+",
        "patents": "34+ patents granted with more pending",
        "deployment_scale": "Millions of square feet across DoD, IC, and civilian agencies"
    },
    "products": {
        "Bastille Enterprise": {
            "description": "Permanently installed sensor arrays for continuous wireless airspace monitoring",
            "deployment": "Ceiling-mounted, discreet sensor arrays across buildings and campuses",
            "use_case": "Fixed corporate and government facilities"
        },
        "Bastille FlyAway Kits": {
            "description": "Portable wireless defense solution in Pelican cases for temporary deployments",
            "deployment": "Setup in as little as two hours",
            "use_case": "Event venues, hotels, forward-deployed settings, temporary spaces",
            "coverage": "Up to 5,000 square feet per kit"
        },
        "Bastille Rapid Deployment Kit (RDK)": {
            "description": "Swift and portable solution for temporary and forward-deployed settings",
            "use_case": "Rapid evaluation of cellular, RF, and wireless threats"
        },
        "Bastille Fusion Center": {
            "description": "Central command interface for viewing wireless inventory, threats, analytics, and forensic data",
            "capabilities": [
                "Real-time wireless device inventory",
                "Threat prioritization by risk level",
                "Device location tracking and historical playback",
                "AI-powered risk analytics",
                "Forensic wireless data investigation"
            ]
        },
        "Ruggedized Sensors": {
            "description": "IP67-certified outdoor sensor arrays for non-climate-controlled environments",
            "use_case": "Outdoor areas, dusty or humid spaces, extreme temperatures"
        }
    },
    "platform_features": {
        "AI-Driven Risk Detection": "Patented ML models analyze RF emissions to identify and categorize wireless threats by risk level in real time",
        "Device Localization": "Track wireless devices down to 1-3 meter radius with real-time and historical position playback",
        "Software-Defined Radio (SDR)": "Reprogrammable sensor arrays updated via software to accommodate new wireless protocols without hardware replacement",
        "FPGA Signal Processing": "Field-programmable gate arrays process enterprise volumes of raw wireless data at orders of magnitude greater than CPUs or GPUs",
        "50+ Protocol Coverage": "Detection across cellular, Wi-Fi, Bluetooth, BLE, Zigbee, IoT, and dozens of additional wireless protocols",
        "100% Passive Monitoring": "Sensor arrays operate passively without transmitting signals, safe for use in classified and sensitive environments",
        "Wireless Device Inventory": "Automatic cataloging of all wireless devices and networks with carrier, MAC address, and behavioral metadata",
        "Threat Classification": "AI-powered categorization of rogue hardware, unauthorized devices, shadow IT, and malicious tools",
        "Alert Configuration": "Customizable alerts per security team and use case to avoid alert fatigue",
        "Forensic Investigation": "Deep-dive into historical wireless data for post-incident analysis and compliance auditing",
        "Spectrum Coverage": "Full-spectrum monitoring from 100 MHz to 7.125 GHz",
        "Audit-Ready Logging": "Comprehensive logs of wireless assets, threats, and remediation efforts for compliance"
    },
    "wireless_protocols_detected": {
        "Cellular": {
            "description": "Detection and localization of 4G/LTE and 5G cellular devices",
            "capabilities": [
                "device localization",
                "carrier identification",
                "MAC address capture"
            ]
        },
        "Wi-Fi": {
            "description": "Rogue access point detection, evil twin attacks, and unauthorized hotspots",
            "capabilities": [
                "rogue AP detection",
                "SSID monitoring",
                "Wi-Fi pineapple detection"
            ]
        },
        "Bluetooth": {
            "description": "Bluetooth Classic and BLE device detection and risk assessment",
            "capabilities": [
                "data exfiltration detection",
                "vulnerable device identification",
                "AirTag/Tile tracking"
            ]
        },
        "Bluetooth Low Energy (BLE)": {
            "description": "Low-energy device monitoring including wearables and IoT sensors"
        },
        "Zigbee": {
            "description": "IoT protocol monitoring for industrial and building automation devices"
        },
        "IoT Protocols": {
            "description": "Detection of IEEE 802.15.4 and other IoT communication protocols"
        },
        "RF Hacking Tools": {
            "description": "Detection of malicious RF tools including Wi-Fi pineapples, USB Rubber Ducky, USB Ninja, and signal jammers"
        }
    },
    "threat_types_detected": {
        "Rogue Cellular Devices": "Unapproved smartphones and cellular devices vulnerable to spyware, capable of data, voice, and video exfiltration",
        "Rogue Wi-Fi": "Unauthorized hotspots, evil twin access points, and nefarious devices like Wi-Fi pineapples",
        "Bluetooth Threats": "Bluetooth data exfiltration tools and vulnerable BLE devices",
        "Surveillance Devices": "Voice and motion-activated bugs, tracking devices like AirTags and Tiles",
        "Shadow Networks": "Unauthorized networks created by employees, contractors, visitors, or bad actors",
        "Unmanaged Devices": "Devices not controlled by MDM or XDR that may operate without authorization",
        "ICS Threats": "Jammers, blockers, and signal-interfering devices targeting industrial control systems",
        "Non-Compliant Usage": "Risky behavior on approved devices such as connecting to unsecured Wi-Fi",
        "RF Hacking Tools": "Wi-Fi pineapples, USB Rubber Ducky, USB Ninja, and other malicious RF tools",
        "Building System Exploits": "Alarm systems, motion detectors, and ISP-provided gateways with wireless vulnerabilities"
    },
    "use_cases": {
        "Wireless Airspace Defense": "Continuous monitoring of corporate and government facilities for wireless threats beyond the network perimeter",
        "SCIF / SAPF Protection": "Securing Sensitive Compartmented Information Facilities and Special Access Program Facilities from wireless devices",
        "Zero Trust Extension": "Extending Zero Trust policies to the RF spectrum to close wireless security gaps",
        "Technical Surveillance Countermeasures (TSCM)": "Continuous TSCM for preventing data exfiltration in classified areas",
        "In-Place Monitoring System (IPMS)": "Permanent wireless monitoring installations for ongoing facility security",
        "Insider Threat Detection": "Identifying shadow IT, non-compliant device usage, and malicious wireless activity by insiders",
        "OT & IoT Security": "Securing ICS, SCADA, and IoT environments from wireless attacks",
        "Regulatory Compliance": "Maintaining audit-ready wireless security posture for HIPAA, PCI DSS, GDPR, and government mandates",
        "Executive Protection": "Preventing wireless surveillance and breaches targeting VIPs",
        "Cloud Infrastructure Security": "Protecting data centers and cloud facilities from wireless threats",
        "Wireless Intrusion Detection (WIDS)": "Real-time monitoring, detection, analysis, investigation, and response to wireless intrusions"
    },
    "industries_served": {
        "Government & Defense": {
            "description": "Wireless airspace defense for DoD, IC, and civilian agencies including SCIF and SAPF protection",
            "compliance": [
                "NIST",
                "CISA",
                "Zero Trust",
                "SecDef Memo"
            ]
        },
        "Cloud Infrastructure": {
            "description": "Wireless threat detection for data centers and cloud facilities housing critical enterprise assets"
        },
        "Financial Services": {
            "description": "Wireless security for Fortune 100 financial institutions and trading floors"
        },
        "Critical Infrastructure": {
            "description": "ICS and SCADA protection from wireless attacks on industrial control systems"
        },
        "Healthcare": {
            "description": "Wireless device monitoring for HIPAA compliance and medical facility security"
        },
        "Executive Protection": {
            "description": "Preventing wireless surveillance and breaches targeting VIPs and leadership"
        },
        "Corrections": {
            "description": "Cell phone detection and contraband wireless device monitoring in correctional facilities"
        },
        "Enterprise": {
            "description": "Corporate wireless security across offices, campuses, and production environments"
        }
    },
    "security_integrations": {
        "SIEM": {
            "description": "Real-time data streaming to SIEM solutions with cross-referencing against building access logs",
            "partners": [
                "Splunk",
                "Microsoft Sentinel"
            ]
        },
        "XDR": {
            "description": "Augment XDR data with wireless business context and threat intelligence"
        },
        "CAASM": {
            "description": "Reduce attack surface and enrich cyber asset data with wireless device metadata"
        },
        "SOAR": {
            "description": "Integration with security orchestration automation and response platforms for incident workflows"
        },
        "Zero Trust": {
            "description": "Extend Zero Trust policies beyond the network perimeter to cover the RF spectrum"
        },
        "SASE": {
            "description": "Illuminate wireless devices interacting with cloud networks or existing in corporate spaces"
        },
        "EDR / Endpoint": {
            "description": "Lightweight endpoint agents for continuous monitoring of devices outside ethernet or Wi-Fi"
        },
        "ELK Stack": {
            "description": "Elasticsearch, Kibana, and Logstash integration for analyzing and visualizing wireless data alongside EDR alerts"
        },
        "Physical Security": {
            "description": "Integration with physical security management systems",
            "partners": [
                "Lenel OnGuard",
                "Genetec"
            ]
        },
        "MDM / UEM": {
            "description": "Identify unmanaged devices and integrate with mobile device management systems"
        },
        "ETL / Data Warehouses": {
            "description": "API-led architecture for custom analytics and data pipeline integrations"
        }
    },
    "patents_sample": {
        "9739868": "Electromagnetic signature analysis for threat detection in a wireless environment of embedded computing devices",
        "9945928": "Computational signal processing architectures for electromagnetic signature analysis",
        "10122736": "Ground and air vehicle electromagnetic signature detection and localization",
        "10473749": "Localization of mobile high-speed wireless user equipment from uplink channels",
        "9880256": "Diverse radio frequency signature, video, and image sensing for detection and localization",
        "10104098": "Electromagnetic threat detection and mitigation in the internet of things",
        "10338191": "Sensor mesh and signal transmission architectures for electromagnetic signature analysis"
    },
    "customer_profile": {
        "organization_types": [
            "Fortune 100 Enterprises",
            "Federal Government Agencies",
            "Defense Contractors",
            "Intelligence Community",
            "State & Local Government",
            "Critical Infrastructure Operators"
        ],
        "roles": [
            "CISO",
            "SOC Manager",
            "Physical Security Director",
            "Risk Manager",
            "SecOps Engineer",
            "Compliance Officer"
        ]
    },
    "customer_results": {
        "revenue_growth": "Tripled annual recurring revenue in past year",
        "deployment_scale": "5M+ square feet of intelligence community facilities protected",
        "dhs_partnership": "Partnered with Department of Homeland Security since 2017"
    },
    "notable_customers": [
        "Fortune 100 enterprises",
        "Oracle Cloud Infrastructure",
        "U.S. Department of Defense",
        "U.S. Intelligence Community agencies",
        "U.S. Department of Homeland Security",
        "Civilian federal agencies",
        "State and local government"
    ],
    "leadership": [
        {
            "name": "Chris Risley",
            "title": "CEO",
            "background": "Over 25 years leading venture-backed startups, one IPO and four sales to public companies including Defense.Net (sold to F5 Networks)"
        },
        {
            "name": "Brett Walkenhorst, Ph.D.",
            "title": "CTO",
            "background": "Over 20 years in RF systems and signal processing, former R&D at Lucent Bell Labs, GTRI, Silvus Technologies, and Raytheon Technologies"
        },
        {
            "name": "Christian Sepulveda",
            "title": "Chief Development Officer",
            "background": "Former partner at Pivotal Labs, negotiated sale to EMC, led FedRAMP certification processes for government agencies"
        },
        {
            "name": "Ivan Googins",
            "title": "SVP Sales & Marketing",
            "background": "Over 20 years in security software sales, former F5 Networks, Metalogix, StreamBase, and ON Technology"
        },
        {
            "name": "Ross",
            "title": "CFO",
            "background": "Over 25 years in finance, former senior roles at Electronic Arts, Golden State Warriors, and high-growth SaaS companies"
        }
    ],
    "awards_recognition": [
        "2025 SC Award for Best Threat Detection Technology",
        "Fast Company Next Big Things in Tech 2025",
        "Inc. 5000 List (#1933, 2025)",
        "DHS partnership since 2017"
    ],
    "competitors": [
        "Armis Security",
        "Forescout",
        "Xage Security",
        "Nozomi Networks"
    ],
    "media_coverage": [
        "Fast Company",
        "SecurityWeek",
        "Security Info Watch",
        "EverythingRF"
    ],
    "partnerships": {
        "Department of Homeland Security": "Government partner since 2017",
        "Goldman Sachs": "Lead Series C investor",
        "Bessemer Venture Partners": "Long-term investor",
        "Carahsoft": "Government reseller partner"
    },
    "social_profiles": [
        "https://www.linkedin.com/company/bastille-networks",
        "https://twitter.com/bastaborgs",
        "https://www.youtube.com/@BastilleNetworks",
        "https://www.facebook.com/bastillenetworks"
    ],
    "events": {
        "AFCEA WEST": {
            "type": "Trade Show Exhibitor",
            "focus": "Zero Trust, WIDS for DoD"
        },
        "RSA Conference": {
            "type": "Trade Show Exhibitor"
        },
        "TechNet Augusta": {
            "type": "Trade Show Exhibitor"
        },
        "AFCEA TechNet Cyber": {
            "type": "Trade Show Exhibitor"
        }
    },
    "resources": {
        "website": "https://bastille.net",
        "demo": "https://bastille.net/contact/",
        "blog": "https://bastille.net/blog/",
        "research": "https://bastille.net/research/",
        "academy": "https://bastille.net/academy/",
        "podcast": "https://bastille.net/podcast/",
        "webinars": "https://bastille.net/webinars/",
        "whitepapers": "https://bastille.net/whitepapers/",
        "videos": "https://bastille.net/videos/",
        "support": "https://bastille.net/support/"
    }
}