Resources Webinar

Securing Data Centers from Cellular, RF and Wireless Intrusion Threats

 

Join our CTO, Brett Walkenhorst, Ph.D., to learn more about securing your Data Center from Cellular, RF, and Wireless Intrusion threats.

Watch the webinar to learn about the latest data exfiltration techniques and different types of wireless vulnerabilities threatening Data Center security.

Learn about Data Exfiltration techniques such as:

  • Rogue Wi-Fi access points and data ex-fil devices
  • Rogue cameras
  • Bluetooth-based data harvesting devices
  • Cellular voice, data and video ex-fil devices, which can bridge physical networks
  • Industrial Control System jammers, blockers and signal interfering devices

Any one of these threats can impact system stability, deny access to or steal data from applications, or compromise the integrity of the cloud infrastructure.

Data exfiltration via a rogue wireless device is a clear and present danger, yet goes largely unmonitored until a breach occurs, and then it is too late. Due to the nature of RF, there is no cable, no obvious connection, and so the threat often remains unseen by physical security.

Learn about Data Exfiltration prevention techniques including:

  • Geofencing Data Centers to Detect and Alert on intruding wireless devices
  • Enforcing a No Cell Phone Policy or Using a Nuanced Wireless Device Policy
  • Detecting Data Exfiltration by Cellular, Bluetooth, BLE, Wi-Fi or IoT devices
  • Locating Rogue Devices: Non-authorized RF/wireless devices, networks & hotspots

Speaker:

Dr. Brett Walkenhorst, CTO at Bastille and former Director of the Software Defined Radio Lab at Georgia Tech

We’d love to show you around

Learn how Bastille can help you prepare you for today’s ever-growing wireless threat landscape, and schedule a demo and we’ll be in touch shortly.