In today’s cloud environments, every application is dependent on infrastructure. “The Cloud” has evolved into a superset of enterprise data centers, co-location facilities, hosting environments, network exchanges, and SaaS platforms. Securing cloud infrastructure from both physical and wireless threats is crucial. The industry has spent billions to make data centers among the most physically secure locations on the planet. Cloud infrastructure physical security is well-refined and involves identity scanners, physical blockades, trained guards, motion detectors, and comprehensive camera systems. Physical…
Archives: Resources
Continuous TSCM
Protecting Against Technical Surveillance Technical Surveillance Countermeasures (TSCM) involves a comprehensive, systematic approach to discovering, pinpointing, and neutralizing harmful surveillance devices whose primary purpose is to capture and transmit/export sensitive data. Bastille offers real-time, continuous radio frequency (RF) signal monitoring, crucial for modern surveillance detection. It detects, classifies, and locates unauthorized surveillance devices swiftly, integrating seamlessly into TSCM efforts for a more proactive security approach. Additionally, Bastille’s ability to analyze historical RF data helps identify patterns that may indicate sustained…
Intelligent Wireless Airspace Defense for Classified Areas
Securing classified areas and Sensitive Compartmented Information Facilities (SCIFs) requires a suite of security tools, protocols, and personnel working together. Learn how Bastille's Wireless Airspace Defense solution is a critical part of any strategy for securing sensitive or classified information. Mission Security Is Critical Securing classified areas and Sensitive Compartmented Information Facilities (SCIFs) requires a suite of security tools, protocols, and personnel to ensure the broadest and most comprehensive solution is in place. Each mission has different security requirements, the…
Top Wireless Threats
Bastille provides Wireless Airspace Defense for organizations, enhancing security with detection and visibility for wireless threats. This handy reference sheet highlights the top wireless threats facing your organization. What's Included Rogue Wi-Fi Hotspots (and Wi-Fi pineapples): Can someone in your building by-pass all your Wireless Intrusion Detection Systems by opening a Wi-Fi hotspot which detours your data around your expensive Wi-Fi anomaly detection? Wi-Fi Pineapples: Wi-Fi Pineapples can insert themselves into legitimate Wi-Fi networks, and can be used for Man-In-The-Middle…
Bastille FlyAway Kit
The Bastille FlyAway Kit offers a portable and rapid set-up solution for temporary and forward-deployed locations with up to 5000 sq. ft. of unobstructed coverage. This brochure details the kit's capabilities and the equipment it comes with for all your temporary monitoring needs. Real-Time, 24/7, 100% Passive RF Monitoring Delivering Accurate Cellular, Bluetooth, BLE and Wi-Fi Device Detection, Identification and Location Bastille is the established leader in real-time Cellular, Bluetooth, Bluetooth Low Energy (BLE) and Wi-Fi detection and location systems.…
Bastille for the Public Sector
Enforce Device Policy with 24x7 Wi-Fi, Cellular and Bluetooth Detection, Location and Alerting Bastille's real-time Cellular, Bluetooth, BLE and Wi-Fi detection and location system locates all authorized and unauthorized devices within a campus or forward deployed location. Bastille accurately places dots on a floor-plan for device location and sends alerts when a device is found where it should not be or doing what it should not do. Sample devices located include: Cellular Phones: Individual phones located in real-time just by…
Cellular & RF Based Threat Detection, Location and Alerting for the Enterprise
Cellular & RF Threat Remediation Bastille provides corporations and agencies with comprehensive RF and cellular threat detection capabilities using Software Defined Radio technology that passively monitors the entire radio spectrum from 60 MHz to 6 GHz. The system continuously scans facilities to detect, locate, and identify wireless devices including cellular phones, Wi-Fi, Bluetooth, and IoT devices, providing accurate real-time location mapping and threat analysis. The platform operates through a three-stage process: Discover (detecting and locating wireless emitters with precise floor…
Bastille Technology Update
In this technology update webinar Dr. Bob Baxley covers the latest features in Bastille's range of solutions for detecting and locating unauthorized Cellular, Bluetooth, BLE, Wi-Fi and IoT devices. The webinar includes both Bastille Enterprise for permanent deployments, and the Bastille FlyAway Kit, our portable tactical solution, plus our new ruggedized solution for outdoor locations. In this webinar Dr. Baxley provides updates on the current technologies available to security professionals as they seek to effectively implement and enforce more nuanced…
Wireless Geofence Policy Enforcement
RF Geofence Boundary Policy Enforcement with Bastille and Aruba Featuring: Evil Twin Attack Detection Demo Join Bastille's Brett Walkenhorst, Ph.D., and Aruba's Mathew George to learn how enabling automated RF geofencing capabilities can alert you of any RF violations within your protected area. With the steady increase in both consumer and enterprise devices communicating via radio, it is important to have full visibility into every device in your facility. Creating a geofence boundary can help regulate where these devices can…
Securing Data Centers from Cellular, RF and Wireless Intrusion Threats
Join our CTO, Brett Walkenhorst, Ph.D., to learn more about securing your Data Center from Cellular, RF, and Wireless Intrusion threats. In the webinar, Brett walks through the different types of wireless vulnerabilities from the field and how to use a Wireless Intrusion Detection System (WIDS) to increase your operational security and get ahead of wireless threats. WIDS - an Introduction Wireless Intrusion Detection and Prevention systems provide heightened operational security for your data centers, building on your existing investment…