Bastille Launches Bastille Enterprise Cellular Intrusion Detection To Help Corporations With Radio Frequency Threat Remediation

Bastille , Enterprise Cellular , Radio Frequency Threat , RF security ,
Bastille Launches Bastille Enterprise Cellular Intrusion Detection To Help Corporations With Radio Frequency Threat Remediation

Bastille, the leader in enterprise threat detection through software-defined radio (SDR), announced its new Bastille Enterprise Cellular Intrusion Detection for enterprises. Previously only available to its military and law enforcement customers, Bastille’s Enterprise Cellular Intrusion Detection is the only solution that can accurately locate cell phones indoors using only cellular signals

“Bastille has been doing radio frequency (RF) and Cellular Intrusion Detection and research for the Government for years,” said Chris Risley, CEO at Bastille. “Only in 2020 did Bastille finally receive FCC approval for its Civilian cellular sensor array. This allows Bastille for the first time to offer accurate Cellular Intrusion Detection to the Enterprise. Now corporations can have the RF security that the DoD and Intelligence Community rely on to protect the nation’s secrets.”

Establishing Standards for Securing the Future of the Internet of Things

Bastille provides corporations the ability to discover, locate, and mitigate radio borne threats to their assets, facilities, and networks. These threats arise from managed, unmanaged and rogue wireless, IoT and Cellular devices. Bastille does this protection by using SDRs to passively observe the entire radio space in a facility from 60 MHz to 6GHz. More than 70 percent of devices connected to the network today are connected via RF & Cellular and that percentage is growing. Equally important are the radio-enabled and cellular devices in your facility which are NOT connected to your network; those which enter daily with employees and visitors, and those installed by contractors into your buildings. These devices are the ones that can be used to exfiltrate voice, video, and computer data right past your firewalls and into the insecure world outside.

Covert, rogue and vulnerable wireless and cellular devices are inside the enterprise today. Suspicious equipment includes SmartTVs, security cameras, printers and peripherals, medical devices, building controls and of course, cell phones.

Only Bastille can deliver:

  • COMPLETE VISIBILITY: Detect all the wireless/cellular devices and connections incorporate facilities whether or not they have connected to the corporate network,
  • THREAT DETECTION: Detect that a device such as one with a Bluetooth or cellular connection is transmitting data (and is not just an employee listening to music),
  • ACCURATE THREAT LOCATION: Locate both of the offending devices on your floor plan.

The whole Bastille threat detection process takes just seconds from when the wireless/cellular device first transmits until your security team receives an Alert in your existing alerting system.

Enterprise RF Vulnerabilities Increasing

In the last month, two new large scale RF vulnerabilities were announced, namely SweynTooth and the Phillips Hue vulnerability Zigbee Worm. These vulnerabilities join BleedingBit, BlueBorne, MouseJack, and KeySniffer as examples of how immature security is for Radio Frequency protocols. The Ethernet and IP Protocols have undergone decades of battle-hardening. These protocols had lots of security vulnerabilities when they were young but researchers have discovered those vulnerabilities and most have been patched. Widespread IoT protocols. Bluetooth and BLE adoption is more recent and as a result, we’re still discovering very large security holes in those protocols.

5G and IoT – The Strongest Tools for Transformation to an Advanced Digital World

“I have no doubt that more huge security holes will be discovered in the more than 100 new radio protocols used by IoT devices,” said Bob Baxley, Chief Technology Officer at Bastille. “Bastille can tell you which devices in your facility–both on and off your network–are susceptible to RF attack. It is critical that CISOs understand their RF attack surface in order to maintain a secure perimeter.”

Bastille’s Patented Software-Defined Radio (SDR) Technology

Bastille now has 17 U.S. Patents issued and more pending.  Bastille’s software-defined sensor arrays scan from 60 MHz to 6 GHz. Within that range, Bastille has more than a dozen protocol decoders, including Cellular, Wifi, Bluetooth, Bluetooth Low Energy (BLE), ZigBee, DECT, and others. Using software-defined radios we see all the emitters distinctly, and then by using protocol decoders in the arrays we digitally demodulate the protocols.