Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

The Internet of Things (IoT) has resulted in an unprecedentedly vast attack surface, with around 80% of these devices being connected wirelessly. Current networks and organizations were not designed to cope with the enormous scale, rapid data flow, and extensive interconnectivity introduced by smart devices. Many companies continue to face challenges in pinpointing IoT devices in their settings, leading to significant security vulnerabilities. AirShield aims to bridge this gap by offering extensive visibility into the IoT and operational technology (OT) threat landscape, enabling the detection, assessment, and mitigation of risks posed by unmanaged, insecure, and misconfigured IoT devices. Through AirShield, users gain real-time, non-intrusive visibility, as well as thorough monitoring and safeguarding for a wide array of wireless devices, including those in the realms of IoT, the Industrial Internet of Things (IIOT), the Internet of Medical Things (IOMT), and various OT environments, regardless of the operating system, protocol, or connection method employed. Additionally, AirShield's sensors seamlessly integrate with the LOCH Machine Vision Cloud, eliminating the need for any on-site server installations. This innovative approach enhances security measures in an increasingly connected world.

Description

Bastille stands out as the pioneering company that equips enterprise security teams with the necessary tools to evaluate and alleviate risks linked to the expanding Internet of Radios. Its innovative software and specialized security sensors offer unprecedented visibility into devices that transmit radio signals—such as Wi-Fi, Cellular, Bluetooth, BLE, wireless dongles, and various IoT communications—within the airspace of an organization. A fundamental aspect of Bastille's solution is its capability to precisely pinpoint the locations of cell phones and other RF emitters within the monitored area. Unlike earlier solutions that relied on spectrum analyzers or basic software-defined radios (SDRs) with limited analytical capabilities, which could only display vague clouds of cellular energy that might represent one or ten devices within a range of one to ten meters, Bastille's groundbreaking and patented technology enables the clear identification and accurate localization of numerous cell phones in real-time. The company's advanced system performs real-time differentiation between various cellular emitters, ensuring that each device is distinctly recognized. This level of precision not only enhances security measures but also significantly improves the overall situational awareness of enterprise security teams.

Description

Device-First Fraud prevention with Real-Time Intelligence & Identification. Device Intelligence from SHIELD identifies persistently devices, users and accounts that you can trust - and those that you shouldn't. Don't let fraudsters fool you. With the global standard for device ID -- SHIELD DeviceID -- you can make precise decisions about device trustworthiness. Get a comprehensive view of each user with real-time device signals and continuous risk profiler. Eliminate blind spots and provide superior user experiences to accelerate growth. Instant insights. No need for additional codes. Get intelligence without revealing PII. Risk thresholds that can be configured independently. We provide all data and more. Transparent intelligence gives you the complete picture. Stay on top of the latest fraud attacks. Real-time attack patterns synchronization worldwide.

API Access

Has API

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Screenshots View All

Integrations

ServiceNow
Aruba Cloud
Cisco Meraki
Elastic Cloud
Graylog
IBM QRadar SIEM
Jira
LOCH Wireless Machine Vision
LevelBlue USM Anywhere
Opsgenie
PagerDuty
Slack
Splunk Cloud Platform
Sumo Logic
Telegram
Trellix Data Encryption

Integrations

ServiceNow
Aruba Cloud
Cisco Meraki
Elastic Cloud
Graylog
IBM QRadar SIEM
Jira
LOCH Wireless Machine Vision
LevelBlue USM Anywhere
Opsgenie
PagerDuty
Slack
Splunk Cloud Platform
Sumo Logic
Telegram
Trellix Data Encryption

Integrations

ServiceNow
Aruba Cloud
Cisco Meraki
Elastic Cloud
Graylog
IBM QRadar SIEM
Jira
LOCH Wireless Machine Vision
LevelBlue USM Anywhere
Opsgenie
PagerDuty
Slack
Splunk Cloud Platform
Sumo Logic
Telegram
Trellix Data Encryption

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

LOCH Technologies

Founded

2014

Country

United States

Website

loch.io/airshield/

Vendor Details

Company Name

Bastille

Founded

2014

Country

United States

Website

www.bastille.net/product/technology/

Vendor Details

Company Name

SHIELD

Founded

2008

Country

United States

Website

shield.com

Product Features

Product Features

Product Features

AML

Behavioral Analytics
Case Management
Compliance Reporting
Identity Verification
Investigation Management
PEP Screening
Risk Assessment
SARs
Transaction Monitoring
Watch List

Click Fraud

Account Alerts
Activity Monitoring
IP Address Monitoring
IP Blocking
Keyword Tracking
Refund Management
Risk Assessment
Time on Site Tracking

Fraud Detection

Access Security Management
Check Fraud Monitoring
Custom Fraud Parameters
For Banking
For Crypto
For Insurance Industry
For eCommerce
Internal Fraud Monitoring
Investigator Notes
Pattern Recognition
Transaction Approval

Alternatives

ShieldApps VPN Reviews

ShieldApps VPN

ShieldApps

Alternatives

Alternatives

AirHook Reviews

AirHook

LOCH Technologies