Webinar
Preventing Data Exfiltration from Data Centers
Join our CTO, Brett Walkenhorst, Ph.D., to learn more about securing your Data Center from Cellular, RF, and Wireless Intrusion threats.
In the webinar, Brett walks through the different types of wireless vulnerabilities from the field and how to use a Wireless Intrusion Detection System (WIDS) to increase your operational security and get ahead of wireless threats.
WIDS - an introduction
Wireless Intrusion Detection and Prevention systems provide heightened operational security for your data centers, building on your existing investment in security cameras, access control and other forms of perimeter security.
Data exfiltration via a rogue wireless device is a clear and present danger, yet goes largely unmonitored until a breach occurs, and then it is too late. Due to the nature of RF, there is no cable, no obvious connection, and so the threat often remains unseen.
How can Bastille help?
Bastille can help you by displaying wireless devices as dots on a floor-plan map, accurately showing their location within a defined space. The system can also be configured to alert when a device is found where it shouldn't be or suddenly moves to a restricted area, such as within a geo-fenced space - inside a data center. Better still, since all this is recorded, you can go back in time using our DVR function to see when and where a device first entered your secure data center.
Wireless Devices Located include:
Cell Phones: Individual phones located in real-time just by their cellular signal
Wearables: e.g. Smart watches such as Garmin Fenix, FitBit and Biometric Human Performance Monitors and other tactical gear
Personal Medical Devices: e.g. Hearing aids
Laptops & Tablets
USB Cables with hidden Wi-Fi and Bluetooth data extraction capabilities
Any device emitting Cellular, Wi-Fi, Bluetooth or BLE
Top Data Center Use Cases include:
Enforce No Cell Phone Policy or Nuanced Wireless Device Policies
Detect Data Exfiltration by Cellular, Bluetooth, BLE or Wi-Fi
Locate Rogue Devices like Non-Authorized RF/Wireless Devices, Networks & Hotspots
WIDS Compliance for Federal Customers’ Data
Integrations with existing infrastructure e.g. Lenel, Genetec, Splunk, Palo Alto, Aruba, Cisco, Juniper and Axis
Speaker:
Dr. Brett Walkenhorst, CTO at Bastille and former Director of the Software Defined Radio Lab at Georgia Tech