Byos
Make Your Network Invisible
HQ Location
Canada
|
Year Founded
2018
|
Company Type
Private
|
Revenue
< $10m
|
Employees
11 - 50
|
Website
|
Byos completely cloaks a device, or even an enterprise’s entire network, so that it cannot be discovered nor accessed, except by those entities that have proven their credentials beyond a shadow of a doubt. We then apply rules, based on that proven identity, so that access to each device is provisioned on an absolute Least Privilege basis. That makes lateral movement across the network practically impossible.
The Byos Secure Gateway Edge Solution has three main capabilities, incorporating different components for security, management, and access of IoT devices:
Plug-and-play Network Security at the edge, independent of the host or the cloud
Byos Industrial μGateway™(“micro gateway”) is a Secure Gateway Edge deployed as a standalone industrialized Gateway. It isolates devices sitting behind it onto their own microsegment within the local network, protecting them from OSI layer 1-5. It has 3 different operation modes:
- Wi-Fi Hotspot-mode for Wireless-capable Devices
- Ethernet-mode for Legacy and Wired Devices
- Client-mode to connect to a pre-existing Wi-Fi Network
This approach provides protection from the attacks that are most commonly seen on Wi-Fi networks: eavesdropping, lateral movement, DNS poisoning, route alteration, Exploiting and DDoS, and rogue AP. Being at the real edge means security isn’t dependent on the Host’ IoT devices OS nor is delegated to the cloud - all security processing happens locally on the µGateway for maximum protection against typical attacks that rely on evasion techniques.
The Byos Secure Gateway Edge can be deployed with a number of different types of Endpoints, so long as they speak TCP/IP.
-
Devices Layer
-
Edge Layer
-
Cloud Layer
-
Application Layer
-
Supporting Technologies
Supplier missing?
Start adding your own!
Register with your work email and create a new supplier profile for your business.