Resources Video

Bluetooth Data Exfiltration

Bluetooth tethering can be used to pair a network device with a cellular data path which bypasses your traditional network security. How do you detect when someone starts Bluetooth tethering in your building? How do you avoid false alarms when the Bluetooth is only being used to connect a headset?

To learn more about detecting Bluetooth data exfiltration devices operating in your environment read our Bastille data sheets or request a Bastille demo.

We’d love to show you around

Learn how Bastille can help you prepare you for today’s ever-growing wireless threat landscape, and schedule a demo and we’ll be in touch shortly.