Byos Introduces Endpoint Micro-Segmentation Solution to Extend Zero Trust Access to Any Remote Wi-Fi Connection
First Solution to Protect Users and Organizations from the Risk of Unmanaged and Unprotected Home and Public Wi-Fi Networks
Today Byos, Inc. introduced the Byos™ μGateway™ (“micro-gateway”), the first plug-and-play security product that protects endpoints from threats on local Wi-Fi networks through endpoint micro-segmentation.
This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20201014005204/en/
The Byos™ μGateway™ “micro-gateway” — the first plug-and-play security product that protects endpoints from threats on local Wi-Fi networks through endpoint micro-segmentation. (Photo: Business Wire)
Organizations are now more than ever dependent on employees connecting from uncontrolled home and public networks to do their jobs. Unfortunately, these networks are “dirty” and risky to connect to. VPNs only protect data in transit between users and corporate networks; they do nothing to prevent the spread of malware or the other risks associated with connecting to these networks. In fact, Byos has identified the “Dirty Half Dozen” attacks that must be protected from, including:
Scanning, Enumerating, and Fingerprinting
Remote Access Exploits
Lateral Network Infections
The patent-pending Byos μGateway is a hardened, embedded security stack on a small USB device that solves this problem by isolating each endpoint onto its own unique network micro-segment of one, protecting it from compromised networks and other compromised endpoints on the network. Byos allows employees, contractors and devices to safely and securely connect to any network, regardless of their location or network environment.
Easily Deploy, Manage, and Secure Every Remote Network Connection
Combined with the µGateway, the Byos Endpoint Micro-Segmentation Solution has a centralized Management Console giving IT and security teams a simpler, more efficient approach to security policy definition, enforcement, and management.
The Byos Management Console allows IT teams to deploy and centrally manage Byos μGateways at scale and provides full visibility and control
The new suite is composed of four products that cover endpoint protection, endpoint detection and response, mobile threat defense, and user/entity behavior analytics.
BlackBerry has announced a new cybersecurity product that it says is the industry’s first AI-powered unified endpoint security system. The company, which provides intelligent security software and services to enterprises and governments, said in a press release that the product called BlackBerry Cyber Suite delivers a zero-touch end user experience with “AI-based security capabilities and visibility across mobile, desktop, apps and people.”
BlackBerry Cyber Suite consists of four tools that BlackBerry said makes it a preventative security tool, rather than just a detect-and-respond one. “BlackBerry Cyber Suite extends BlackBerry AI leadership by learning from telemetry gathered across mobile, desktop, and server endpoints, and combining that with user behavior analytics for a truly unique and innovative offering,” the company said.
Of the four products included in BlackBerry Cyber Suite, two are existing security software that BlackBerry has added to the platform: BlackBerry Protect Desktop, its endpoint protection software, and BlackBerry Optics, its endpoint detection and response software.
The other two products are new, and were announced alongside the BlackBerry Cyber Suite.
BlackBerry Protect Mobile is a new mobile threat defense protection product that “extends the powerful AI-based security in BlackBerry Protect to mobile devices,” the company said. Protect Mobile does the typical things a mobile threat defense product does, like alert users to malicious URLs, spoof phishing websites, and other threats, and it does so using BlackBerry’s AI security software.
Protect Mobile is designed to operate without human intervention, and detects malware at the device and application levels. “It identifies security vulnerabilities and potential malicious activities by monitoring system parameters, device configurations, and system libraries at the application level. It also identifies malware from sideloaded