Great Bay Software Launches Beacon 4.3 Strengthening Enterprise IoT Security

Great Bay Software, the leader in securing the Internet of Things (IoT) and the Enterprise of Things (EoT), today announced the general availability for Beacon Endpoint Profiler version 4.3.  Gartner predicts that by 2020, 25% of all enterprise breaches will originate from IoT devices.  The reason for this bold prediction is because IoT manufacturers are primarily focused on speed to market rather than on strengthening their device’s security posture.  The proprietary or closed nature of these devices renders traditional Network Access Control (NAC) solutions that rely on an agent or supplicant for authentication and posture checking ineffective.  In fact, according to leading industry analysts, approximately 10% of enterprise devices will be able to support an agent by the year 2020. 

Enterprises that have traditionally relied on a NAC solution must now look for a different approach.  As a leader in endpoint profiling and visibility, Great Bay Software is well positioned to address the security requirements that IoT is now presenting to the enterprise. There is evidence today that suggests that enterprises purchasing NAC solutions are primarily using them for visibility, an area where Great Bay Software is unmatched.  Beyond visibility, Great Bay Software’s highly scalable, agentless, vendor-agnostic approach provides a comprehensive IoT security solution as advised by leading industry analysts.  Great Bay Software’s newly enhanced feature set includes provisioning, authentication, enforcement and network segmentation and isolation. 

“Just under half of all enterprises are planning IoT initiatives within the next 24 months, driven by the promise of transforming their businesses through operational efficiencies, better customer engagement, and new products and services,” said Eugene Signorini, Senior Analyst at Enterprise Strategy Group. “However, security remains the top challenge business leaders see for IoT. Visibility and connection security are the key first steps in formulating a strong IoT security plan.”

Enhanced User Experience for Beacon Endpoint Profiler Version 4.3

Visibility

Beacon ships with more than 1,300 out of the box device profiles to provide accurate, real-time discovery and classification of more managed, unmanaged and IoT devices than any vendor in the market.  Beacon Endpoint Profiler version 4.3 continues the tradition of enhancing the number of out of the box profiles, further strengthening Great Bay Software’s lead in the security market.

Onboarding

Beacon provides the ability to sponsor temporary or protected access for IoT devices and can assist in automatically moving devices from restricted to full network access based on the discovery of new profile data.  Additionally, version 4.3 simplifies device mobility throughout the enterprise via Beacon’s fully distributed LDAP directory.

Monitoring

Beacon continuously monitors endpoint data for changes in identity or the detection of uncharacteristic behavior. Any such change can trigger enforcement policies that can dynamically limit network access or isolate the device all together.  Uncharacteristic behavior such as a printer trying to communicate across unexpected ports (Telnet or SSH) can be a tell tale sign of a MAC Spoofing attempt that can go undetected by other systems.

Enforcement

Beacon can alert, restrict access or block devices based on a number of policies including the discovery of a specific device type or the detection of new profile data.

“20 billion new IoT devices are expected to be deployed by enterprises over the next five years,” said Manish Rai, VP of Products and Marketing at Great Bay Software.  “Our solution is ideally suited to protect enterprise customers against the emerging IoT threat.”

Learn more about Beacon by visiting www.greatbaysoftware.com.

Featured

  • Ransomware Attacks Rise for the First Time in Six Months

    Ransomware attacks have risen for the first time in six months, increasing by 28% month-on-month to 421 attacks. While overall attack volume remained below 500, the uptick may signal a renewed escalation heading into the year’s most active period for cyber criminals. Read Now

  • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

    Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

    • Guard Services
  • Identity Governance at the Crossroads of Complexity and Scale

    Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

  • Eagle Eye Networks Launches AI Camera Gun Detection

    Eagle Eye Networks, a provider of cloud video surveillance, recently introduced Eagle Eye Gun Detection, a new layer of protection for schools and businesses that works with existing security cameras and infrastructure. Eagle Eye Networks is the first to build gun detection into its platform. Read Now

  • Report: AI is Supercharging Old-School Cybercriminal Tactics

    AI isn’t just transforming how we work. It’s reshaping how cybercriminals attack, with threat actors exploiting AI to mass produce malicious code loaders, steal browser credentials and accelerate cloud attacks, according to a new report from Elastic. Read Now

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.