PROTECTING ORGANIZATIONS FROM ROGUE ACCESS
Zero Trust centers on the belief that we should not automatically trust anything inside or outside our perimeters. Instead of trusting a device’s authenticity, we must verify anything and everything that may attempt to connect to systems before granting access.
Bastille provides full visibility into devices as they enter and exit your facilities. While devices may authenticate, many may not, and yet they are still inside your buildings, forming a shadow IT infrastructure capable of data capture and exfiltration. These devices should be under the same policy as your authorized devices that use Zero Trust policies.
Use Case: Integration with your NAC system to ensure Zero Trust policies are maintained
In the webinar Dr. Baxley details how Bastille shows you the authorized and unauthorized devices operating in or close to your environment. When integrated with a NAC such as Cisco ISE, Forescout or Aruba ClearPass this enables a complete Zero Trust policy to be maintained over all devices, whether they are already known to be using facility Wi-Fi, or radio systems beyond existing Zero Trust policies, such as Bluetooth, Cellular and IoT devices.
Presenter: Dr. Baxley is CTO, Bastille and former Director of the Software Defined Radio Lab at Georgia Tech (bio here), where he led projects on SIGINT, Electronic Warfare and Covert Communications for DOD and IC customers.