Emerging Tech: Security — The Need for Wireless Airspace Defense
Download nowIntroducing Bastille's Wireless Airspace Defense Analytics Module - Live Demo plus Q&A
Register todayEmerging Tech: Security — The Need for Wireless Airspace Defense
Download nowEmerging Tech: Security — The Need for Wireless Airspace Defense
Download nowSafeguarding Classified National Security (CNSI) from the Threats Posed by Personal or Portable Electronic Devices Within SCIFs and SAPFs
Read moreVideos
Wireless threats visually explained and demonstrated.
Webinars
Live or recorded online presentations or workshops
Whitepapers
Authoritative reports on complex threats
Datasheets
Explore key features, specifications, and benefits
Blog
Collection of articles with security insights
Support
Help troubleshoot issues with our software
The Bastille Research Team proactively monitors for new radio-borne threats. Their breakthrough research and discoveries such as MouseJack and KeySniffer help to keep not just Bastille clients, but the larger ecosystem safe.
Rogue Cell Towers, AKA Stingrays or IMSI Catchers, are used to hijack cellphone connections, allowing attackers to listen to calls and read texts. An attacker can even push malware to a vulnerable phone to hack it. Another common use of Rogue Cell towers is to break 2-factor authentication.
To learn more about finding rogue cellular devices and other RF-enabled devices operating in your environment read our Bastille data sheets or request a Bastille demo.
Learn how Bastille can help you prepare you for today’s ever-growing wireless threat landscape, and schedule a demo and we’ll be in touch shortly.