A cybersecurity startup that’s stealthily been preparing its threat detection technology in West Midtown has begun openly advertising.
Last week, Bastille Networks posted a video online that demonstrated its dashboard.
The company — which launched last year and then promptly received roughly $2.5 million in two rounds of angel investor funding — says its shoring up the Internet of Things.
This emerging IoT category of computing connected to the web could be as as palpable as the Apple Watch on your wrist or as futuristic as an intelligent refrigerator with an embedded microprocessor in your kitchen.
“By 2020, 57,000 new things will be added to the internet every second,” the video reports in all caps before rhetorically asking: “At this rate to market, are they secure?”
The presentation was shown to technology executives and others at the RSA Conference in San Francisco last month.
Among its functions, Bastille’s hardware and software can detect the activity of individual wireless devices within an office space. The idea is to create profiles of employees’ data usage without intercepting those communications outright. Keeping those employees’ privacy intact.
The technique could thwart criminals inside call centers who might attempt to sell snapshots of screens containing customer’s most sensitive details.
Some of Bastille’s earliest adopters are indeed in the financial services sector, a spokesman said.
Today, there’s already a cottage industry of tech vendors, including Atlanta’s AirWatch, that sell smartphone software that can secure employees’ mobile devices, But, that software can only safeguard so many devices.
And as the scale and scope of these IoT devices grows, as Bastille points out, they’ll be tougher to protect.
in April, Verizon’s annual Data Breach Investigation Report (DBIR), considered by many to be the definitive measure of data intrusions in the industry, cautiously announced that while IoT attacks aren’t currently a threat they certainly have the potential to pose a problem .
The market is potentially huge, partly as an effect of tools that could aid in the exploitation of the IoT, such as the Shodan search engine.
That Google-like service allows users to search for specific vulnerabilities affecting internet connected devices.