Byos “micro-gateway” Brings Zero Trust to WFH and Remote Endpoints ; Blocks “Dirty Half Dozen” Wi-Fi Attacks VPNs Cannot Touch

2020 marks the dawn of the era of the remote worker, and the need for organizations to secure their sensitive data and prevent contagion of corporate networks by their remote workforce has never been so great. It’s well timed that Byos had introduced the Byos™ μGateway™ (“micro-gateway”), a plug-and-play thumb drive-sized product that brings Zero Trust access to any remote Wi-Fi connection.

The pandemic has forced many organizations to rely on their employees’ home networks shared, which are typically shared with family members such as online gamers and others who may not be particularly security-aware. VPNs protect only data in transit, and can’t prevent the spread of malware and other risks such as the “Dirty Half Dozen” attacks:

  • Scanning, Enumerating, and Fingerprinting
  • Eavesdropping
  • Remote Access Exploits
  • Evil-Twin Wi-Fi
  • Lateral Network Infections
  • DNS hijacking

“It is a business imperative that employees and contractors can work from anywhere, with assurances that their connection is secure” said Byos CEO and Founder Matias Katz. “Threat actors are well-aware of the attack openings on these networks that legacy remote access solution like VPNs were not designed to protect against. The problem is compounded by the challenge of managing and enforcing remote users to comply with corporate security polices – there is currently no easy way to monitor their connection or provision new policies remotely.”

The Byos μGateway is hardened, embedded security stack on a small USB device that isolates each endpoint onto its own unique network micro-segment of one, protecting it from compromised networks and other compromised endpoints on the network. It lets employees, contractors and devices safely and securely connect to any network.

“Byos is taking a simple and innovative hardware-based approach to protect imperfect devices (e.g. computers) when they communicate over untrusted networks,” said Paul Kocher, renowned security researcher and co-creator of the SSL/TLS protocols.

“Insecure Wi-Fi networks expose devices to a range of threats, but the Byos’ micro-segmentation solution allows endpoints to be isolated from the risks, while giving Security teams visibility and control, all with a small plug-and-play USB device,” said Ed Amoroso, Chief Executive Officer, TAG Cyber LLC.

Featured

  • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

    Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

    • Guard Services
  • Identity Governance at the Crossroads of Complexity and Scale

    Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

  • Eagle Eye Networks Launches AI Camera Gun Detection

    Eagle Eye Networks, a provider of cloud video surveillance, recently introduced Eagle Eye Gun Detection, a new layer of protection for schools and businesses that works with existing security cameras and infrastructure. Eagle Eye Networks is the first to build gun detection into its platform. Read Now

  • Report: AI is Supercharging Old-School Cybercriminal Tactics

    AI isn’t just transforming how we work. It’s reshaping how cybercriminals attack, with threat actors exploiting AI to mass produce malicious code loaders, steal browser credentials and accelerate cloud attacks, according to a new report from Elastic. Read Now

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.