Wireless Threat Intelligence Snippets
- What is Wireless Threat Intelligence?
- Wireless Invisibility
- Wireless Ubiquity
- Wireless Vulnerability
- Bastille and TSCM
- Bastille IP
- Bluetooth Vulnerabilities
- Cell Detection – Geofencing
- Cellular Vulnerabilities
- Dashboards – Activity
- Evil Twin Attack Detection
- Massive Multi-Channel Demodulation (M2CD)
- MDM/UEM Integration
- Network Access Control (NAC)
- Solution Overview
- Wi-Fi Vulnerabilities
Excerpt From Introduction to Wireless Threat Intelligence Webinar
Find Out More About Bastille’s MDM/UEM Integration Capabilities from CTO Dr. Brett Walkenhorst
The clip below demonstrates a situation when a phone moves from one part of the building to a room that is geofenced. Bastille locates the phone inside the geofenced region and sends a webhook to the MDM system, which causes the phone’s camera to be disabled as soon as it enters the area.
MDM/UEM Integration — Bastille — Bastille