Cellular Intrusion
Detection & response
Cellular Intrusion
Bastille’s real-time Cellular, Bluetooth, BLE and Wi-Fi detection, location and response system locates all authorized and unauthorized devices within a campus or forward deployed location. Bastille accurately places dots on a floor-plan map for device location and sends alerts when a device is found where it should not be or doing what it should not do.
Sample devices located include:
● Cellular Phones: Individual phones located in real-time just by their cellular signal
● Wearables: Smart watches such as Apple Watch, Garmin Fenix, FitBit and Biometric Human Performance Monitors and other tactical gear.
● Personal Medical Devices: Hearing aids
● Laptops & Tablets
● Any device emitting cellular, Wi-Fi, Bluetooth or BLE
Precise Real-Time Accurate Individual Device Location - Not Misty Heat Maps: Other systems detect power in a certain frequency in an area and can’t tell you if there is one device or 10 devices in a room. Bastille’s multi-patented solution recognizes individual devices, including individual cellular signals, and places a real-time dot on your floor plan to show where the device is located… which eliminates false positives.
Deploy and GEOFENCE (in/out) for SCIF and Open Secret Environments: Bastille is 100% passive and can be deployed where no transmitters are permitted. Bastille can set geo-fences to include or exclude areas where devices are/not allowed and send real-time alerts when devices are located and/or policies are violated.
Authorized vs Unauthorized Devices: Commands want to permit only certain authorized devices in SCIF/Open Secret areas, and Bastille makes this possible. Bastille takes feeds from any other system e.g. Aruba where a device has been authorized, and/or gives the ability to tag specific devices as authorized for a given location and/or time.
Device Pairing Red Alerts: Bastille detects and Red Alerts if device pairing ever happens e.g. a Garmin Fenix pairs with a phone in a locker or car outside the Open Secret area. Even BLE devices can pair up to 100 metres or more!
Detailed Device Information: Bastille passively determines more than 150 fields of information from devices including manufacturer, model, name, network connection, frequency, and transmitter ID among other fields. This data provides valuable context for both forensic and real-time device determination and adjudication.
Forensics: Accurate locations and device information in DVR format for a year or longer to permit detailed investigations for insider threat. Exports to Splunk, Tableau or any other system via standard APIs.
Canned Splunk & Other Enterprise Integrations: Bastille’s standards based APIs allow simple integration with all your existing systems like Splunk, SIEMs, Incident Response Platforms, Wi-Fi WIDS and Access Points without the need for additional modules.
Global Deployment: Bastille gives you a single GUI which can monitor local and your worldwide deployments.
Device Adjudication Workflow: Bastille allows you to DETECT all devices, EVALUATE if a certain device is permitted in an area and if it presents a threat, INVESTIGATE the device with detailed device information and RESOLVE the incident and record the actions taken.
For more information please contact us