Bastille 30 Day Vulnerability Assessment
Inventory & Security Assessment of Wireless, IoT and Mobile Devices
See what you’re missing in the wireless, mobile and IoT world
Discover vulnerabilities and threats
Find weaknesses already inside your enterprise
Locate devices with a vulnerability
With the Bastille Audit you will be able to find:
Rogue WiFi Access Points
Rogue cell towers
Never configured wireless devices
Unauthorized cellular devices
Web cameras, bugs and other listening devices
Mouse and Keyboard vulnerabilities
IoT devices that could be used to exfiltrate data or used in a DDoS Botnet
And much more!
Wireless, Mobile and IoT devices in the Enterprise can be hacked and used to exfiltrate data or voice. The kinds of devices which can be corrupted include cell phones, wireless keyboards and mice, security cameras, smart TVs and industrial control systems to name just a few. In addition, $20 voice activated wireless bugs can be surreptitiously planted in conference rooms by cleaners, visitors, or contractors to steal your valuable information.
The Bastille Wireless Vulnerability Audit service will allow you to Sense, Identify and Localize threats from the billions of devices in what we call the Internet of Radios.
With this Bastille service you will be able to find, locate and inventory the Internet of Radios devices operating in your environment from the 60MHz to 6GHz frequency.
Over the course of 30 days you will be able to Sense, Identify and Localize devices across an area up to 25,000 square feet, see radio activity on a dashboard, benchmark your environment for the future, and receive a detailed report at the conclusion of the audit.
To learn more about your data exfiltration risk and register your interest in the Bastille Wireless Vulnerability Audit service today.
Bastille’s Awards and Recognition:
About Bastille
Bastille Networks is a pioneering Internet of Radios (Mobile, IoT, and BYOD) security company. Bastille's patented technology combines hardware and software to offer enterprises identification, threat detection and location awareness for radio-enabled devices. Enterprise organizations use Bastille to accurately assess security threats from radio-enabled devices such as mobile phones and the growing number of Interned-enabled, but not Internet-secured IoT devices.