Great Bay Software Launches Beacon 4.3 Strengthening Enterprise IoT Security

Great Bay Software, the leader in securing the Internet of Things (IoT) and the Enterprise of Things (EoT), today announced the general availability for Beacon Endpoint Profiler version 4.3.  Gartner predicts that by 2020, 25% of all enterprise breaches will originate from IoT devices.  The reason for this bold prediction is because IoT manufacturers are primarily focused on speed to market rather than on strengthening their device’s security posture.  The proprietary or closed nature of these devices renders traditional Network Access Control (NAC) solutions that rely on an agent or supplicant for authentication and posture checking ineffective.  In fact, according to leading industry analysts, approximately 10% of enterprise devices will be able to support an agent by the year 2020. 

Enterprises that have traditionally relied on a NAC solution must now look for a different approach.  As a leader in endpoint profiling and visibility, Great Bay Software is well positioned to address the security requirements that IoT is now presenting to the enterprise. There is evidence today that suggests that enterprises purchasing NAC solutions are primarily using them for visibility, an area where Great Bay Software is unmatched.  Beyond visibility, Great Bay Software’s highly scalable, agentless, vendor-agnostic approach provides a comprehensive IoT security solution as advised by leading industry analysts.  Great Bay Software’s newly enhanced feature set includes provisioning, authentication, enforcement and network segmentation and isolation. 

“Just under half of all enterprises are planning IoT initiatives within the next 24 months, driven by the promise of transforming their businesses through operational efficiencies, better customer engagement, and new products and services,” said Eugene Signorini, Senior Analyst at Enterprise Strategy Group. “However, security remains the top challenge business leaders see for IoT. Visibility and connection security are the key first steps in formulating a strong IoT security plan.”

Enhanced User Experience for Beacon Endpoint Profiler Version 4.3

Visibility

Beacon ships with more than 1,300 out of the box device profiles to provide accurate, real-time discovery and classification of more managed, unmanaged and IoT devices than any vendor in the market.  Beacon Endpoint Profiler version 4.3 continues the tradition of enhancing the number of out of the box profiles, further strengthening Great Bay Software’s lead in the security market.

Onboarding

Beacon provides the ability to sponsor temporary or protected access for IoT devices and can assist in automatically moving devices from restricted to full network access based on the discovery of new profile data.  Additionally, version 4.3 simplifies device mobility throughout the enterprise via Beacon’s fully distributed LDAP directory.

Monitoring

Beacon continuously monitors endpoint data for changes in identity or the detection of uncharacteristic behavior. Any such change can trigger enforcement policies that can dynamically limit network access or isolate the device all together.  Uncharacteristic behavior such as a printer trying to communicate across unexpected ports (Telnet or SSH) can be a tell tale sign of a MAC Spoofing attempt that can go undetected by other systems.

Enforcement

Beacon can alert, restrict access or block devices based on a number of policies including the discovery of a specific device type or the detection of new profile data.

“20 billion new IoT devices are expected to be deployed by enterprises over the next five years,” said Manish Rai, VP of Products and Marketing at Great Bay Software.  “Our solution is ideally suited to protect enterprise customers against the emerging IoT threat.”

Learn more about Beacon by visiting www.greatbaysoftware.com.

Featured

  • It Always Rains in Florida

    Over the years, and many trips to various cities, I have experienced some of the craziest memorable things. One thing I always count on when going to Orlando is a massive rainstorm after the tradeshow has concluded the first day. Count on it, it is going to rain Monday evening. Expect that it will be a gully washer. Read Now

    • Industry Events
  • Live from GSX 2024 Preview

    It’s hard to believe, but GSX 2024 is almost here. This year’s show runs from Monday, September 23 to Wednesday, September 25 at the Orange County Convention Center in Orlando, Fla. The Campus Security Today and Security Today staff will be on hand to provide live updates about the security industry’s latest innovations, trends, and products. Whether you’re attending the show or keeping tabs on it from afar, we’ve got you covered. Make sure to follow the Live from GSX page for photos, videos, interviews, product demonstrations, announcements, commentary, and more from the heart of the show floor! Read Now

    • Industry Events
  • Elevate Your Business

    In today’s dynamic business environment, companies specializing in physical security are constantly evolving to remain competitive. One strategic shift these businesses can make to give them the advantage is a full or partial transition to a recurring revenue model, popularly called a subscription service. This approach will bring numerous benefits that not only enhance business stability but also improve customer relationships and drive innovation. Recurring monthly revenue (RMR) or recurring annual revenue (RAR) are two recurring cadence choices that work simply and effectively. Read Now

  • Playing a Crucial Role

    Physical security technology plays a crucial role in detecting and preventing insider cybersecurity threats. While it might seem like a stretch to connect physical security with cyber threats, the two are closely intertwined. Here’s how physical security technology can be leveraged to address both external and internal threats. Read Now

Featured Cybersecurity

Webinars

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3