Great Bay Software Launches Beacon 4.3 Strengthening Enterprise IoT Security

Great Bay Software, the leader in securing the Internet of Things (IoT) and the Enterprise of Things (EoT), today announced the general availability for Beacon Endpoint Profiler version 4.3.  Gartner predicts that by 2020, 25% of all enterprise breaches will originate from IoT devices.  The reason for this bold prediction is because IoT manufacturers are primarily focused on speed to market rather than on strengthening their device’s security posture.  The proprietary or closed nature of these devices renders traditional Network Access Control (NAC) solutions that rely on an agent or supplicant for authentication and posture checking ineffective.  In fact, according to leading industry analysts, approximately 10% of enterprise devices will be able to support an agent by the year 2020. 

Enterprises that have traditionally relied on a NAC solution must now look for a different approach.  As a leader in endpoint profiling and visibility, Great Bay Software is well positioned to address the security requirements that IoT is now presenting to the enterprise. There is evidence today that suggests that enterprises purchasing NAC solutions are primarily using them for visibility, an area where Great Bay Software is unmatched.  Beyond visibility, Great Bay Software’s highly scalable, agentless, vendor-agnostic approach provides a comprehensive IoT security solution as advised by leading industry analysts.  Great Bay Software’s newly enhanced feature set includes provisioning, authentication, enforcement and network segmentation and isolation. 

“Just under half of all enterprises are planning IoT initiatives within the next 24 months, driven by the promise of transforming their businesses through operational efficiencies, better customer engagement, and new products and services,” said Eugene Signorini, Senior Analyst at Enterprise Strategy Group. “However, security remains the top challenge business leaders see for IoT. Visibility and connection security are the key first steps in formulating a strong IoT security plan.”

Enhanced User Experience for Beacon Endpoint Profiler Version 4.3

Visibility

Beacon ships with more than 1,300 out of the box device profiles to provide accurate, real-time discovery and classification of more managed, unmanaged and IoT devices than any vendor in the market.  Beacon Endpoint Profiler version 4.3 continues the tradition of enhancing the number of out of the box profiles, further strengthening Great Bay Software’s lead in the security market.

Onboarding

Beacon provides the ability to sponsor temporary or protected access for IoT devices and can assist in automatically moving devices from restricted to full network access based on the discovery of new profile data.  Additionally, version 4.3 simplifies device mobility throughout the enterprise via Beacon’s fully distributed LDAP directory.

Monitoring

Beacon continuously monitors endpoint data for changes in identity or the detection of uncharacteristic behavior. Any such change can trigger enforcement policies that can dynamically limit network access or isolate the device all together.  Uncharacteristic behavior such as a printer trying to communicate across unexpected ports (Telnet or SSH) can be a tell tale sign of a MAC Spoofing attempt that can go undetected by other systems.

Enforcement

Beacon can alert, restrict access or block devices based on a number of policies including the discovery of a specific device type or the detection of new profile data.

“20 billion new IoT devices are expected to be deployed by enterprises over the next five years,” said Manish Rai, VP of Products and Marketing at Great Bay Software.  “Our solution is ideally suited to protect enterprise customers against the emerging IoT threat.”

Learn more about Beacon by visiting www.greatbaysoftware.com.

Featured

  • AI Is Now the Leading Cybersecurity Concern for Security, IT Leaders

    Arctic Wolf recently published findings from its State of Cybersecurity: 2025 Trends Report, offering insights from a global survey of more than 1,200 senior IT and cybersecurity decision-makers across 15 countries. Conducted by Sapio Research, the report captures the realities, risks, and readiness strategies shaping the modern security landscape. Read Now

  • Analysis of AI Tools Shows 85 Percent Have Been Breached

    AI tools are becoming essential to modern work, but their fast, unmonitored adoption is creating a new kind of security risk. Recent surveys reveal a clear trend – employees are rapidly adopting consumer-facing AI tools without employer approval, IT oversight, or any clear security policies. According to Cybernews Business Digital Index, nearly 90% of analyzed AI tools have been exposed to data breaches, putting businesses at severe risk. Read Now

  • Software Vulnerabilities Surged 61 Percent in 2024, According to New Report

    Action1, a provider of autonomous endpoint management (AEM) solutions, today released its 2025 Software Vulnerability Ratings Report, revealing a 61% year-over-year surge in discovered software vulnerabilities and a 96% spike in exploited vulnerabilities throughout 2024, amid an increasingly aggressive threat landscape. Read Now

  • Motorola Solutions Named Official Safety Technology Supplier of the Ryder Cup through 2027

    Motorola Solutions has today been named the Official Safety Technology Supplier of the 2025 and 2027 Ryder Cup, professional golf’s renowned biennial team competition between the United States and Europe. Read Now

  • Evolving Cybersecurity Strategies

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.