Great Bay Software Launches Beacon 4.3 Strengthening Enterprise IoT Security

Great Bay Software, the leader in securing the Internet of Things (IoT) and the Enterprise of Things (EoT), today announced the general availability for Beacon Endpoint Profiler version 4.3.  Gartner predicts that by 2020, 25% of all enterprise breaches will originate from IoT devices.  The reason for this bold prediction is because IoT manufacturers are primarily focused on speed to market rather than on strengthening their device’s security posture.  The proprietary or closed nature of these devices renders traditional Network Access Control (NAC) solutions that rely on an agent or supplicant for authentication and posture checking ineffective.  In fact, according to leading industry analysts, approximately 10% of enterprise devices will be able to support an agent by the year 2020. 

Enterprises that have traditionally relied on a NAC solution must now look for a different approach.  As a leader in endpoint profiling and visibility, Great Bay Software is well positioned to address the security requirements that IoT is now presenting to the enterprise. There is evidence today that suggests that enterprises purchasing NAC solutions are primarily using them for visibility, an area where Great Bay Software is unmatched.  Beyond visibility, Great Bay Software’s highly scalable, agentless, vendor-agnostic approach provides a comprehensive IoT security solution as advised by leading industry analysts.  Great Bay Software’s newly enhanced feature set includes provisioning, authentication, enforcement and network segmentation and isolation. 

“Just under half of all enterprises are planning IoT initiatives within the next 24 months, driven by the promise of transforming their businesses through operational efficiencies, better customer engagement, and new products and services,” said Eugene Signorini, Senior Analyst at Enterprise Strategy Group. “However, security remains the top challenge business leaders see for IoT. Visibility and connection security are the key first steps in formulating a strong IoT security plan.”

Enhanced User Experience for Beacon Endpoint Profiler Version 4.3

Visibility

Beacon ships with more than 1,300 out of the box device profiles to provide accurate, real-time discovery and classification of more managed, unmanaged and IoT devices than any vendor in the market.  Beacon Endpoint Profiler version 4.3 continues the tradition of enhancing the number of out of the box profiles, further strengthening Great Bay Software’s lead in the security market.

Onboarding

Beacon provides the ability to sponsor temporary or protected access for IoT devices and can assist in automatically moving devices from restricted to full network access based on the discovery of new profile data.  Additionally, version 4.3 simplifies device mobility throughout the enterprise via Beacon’s fully distributed LDAP directory.

Monitoring

Beacon continuously monitors endpoint data for changes in identity or the detection of uncharacteristic behavior. Any such change can trigger enforcement policies that can dynamically limit network access or isolate the device all together.  Uncharacteristic behavior such as a printer trying to communicate across unexpected ports (Telnet or SSH) can be a tell tale sign of a MAC Spoofing attempt that can go undetected by other systems.

Enforcement

Beacon can alert, restrict access or block devices based on a number of policies including the discovery of a specific device type or the detection of new profile data.

“20 billion new IoT devices are expected to be deployed by enterprises over the next five years,” said Manish Rai, VP of Products and Marketing at Great Bay Software.  “Our solution is ideally suited to protect enterprise customers against the emerging IoT threat.”

Learn more about Beacon by visiting www.greatbaysoftware.com.

Featured

  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

  • Report: Nearly 1 in 5 Healthcare Leaders Say Cyberattacks Have Impacted Patient Care

    Omega Systems, a provider of managed IT and security services, today released new research that reveals the growing impact of cybersecurity challenges on leading healthcare organizations and patient safety. According to the 2025 Healthcare IT Landscape Report, 19% of healthcare leaders say a cyberattack has already disrupted patient care, and more than half (52%) believe a fatal cyber-related incident is inevitable within the next five years. Read Now

  • AI Is Now the Leading Cybersecurity Concern for Security, IT Leaders

    Arctic Wolf recently published findings from its State of Cybersecurity: 2025 Trends Report, offering insights from a global survey of more than 1,200 senior IT and cybersecurity decision-makers across 15 countries. Conducted by Sapio Research, the report captures the realities, risks, and readiness strategies shaping the modern security landscape. Read Now

  • Analysis of AI Tools Shows 85 Percent Have Been Breached

    AI tools are becoming essential to modern work, but their fast, unmonitored adoption is creating a new kind of security risk. Recent surveys reveal a clear trend – employees are rapidly adopting consumer-facing AI tools without employer approval, IT oversight, or any clear security policies. According to Cybernews Business Digital Index, nearly 90% of analyzed AI tools have been exposed to data breaches, putting businesses at severe risk. Read Now

  • Software Vulnerabilities Surged 61 Percent in 2024, According to New Report

    Action1, a provider of autonomous endpoint management (AEM) solutions, today released its 2025 Software Vulnerability Ratings Report, revealing a 61% year-over-year surge in discovered software vulnerabilities and a 96% spike in exploited vulnerabilities throughout 2024, amid an increasingly aggressive threat landscape. Read Now

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.