Home Industry Verticals Internet of Things Great Bay Software enhances IoT security with Beacon Suite 5.0

Great Bay Software enhances IoT security with Beacon Suite 5.0

3 MIN READ

Great Bay Software, the Endpoint and IoT connection security provider announced the launch of Beacon Suite 5.0 to help enterprises discover, onboard, monitor and enforce access policies across all connected devices including laptops, servers, printers, VoIP phones, biomedical devices, industrial control systems and newly emerging IoT devices.

According to recent Enterprise Strategy Group (ESG) survey, 58% of the respondents have already developed IoT initiatives, or are in the process of launching them in the next 24 months. Great Bay claims that the new solution would protect enterprises against the growing threat posed by poor built-in security for IoT devices.

“Rapid growth in adoption of IoT devices represents an increasing and underappreciated threat to enterprises, especially in the healthcare, manufacturing and critical infrastructure verticals,” said Jon Oltsik, Senior Principal Analyst, Enterprise Research Group.

By adding enforcement to its strong endpoint visibility and profiling capabilities, Great Bay Software can make it easier for enterprises to protect vulnerabilities in IoT devices.

The company explains that the Beacon Suite 5.0 comes with a Beacon Endpoint Enforcement module which simplifies and automates endpoint and IoT device authentication and onboarding as well as enforcement of access policies. The module license unlocks the ability to authenticate all unmanaged devices based on multiple criteria.

“We are pleased that we’ve been able to accelerate our development cycles to be able to help enterprises get ahead of IoT security threats brought on by devices with deficient onboard security,” said Jim Scullion, CEO at Great Bay Software.

According to the security provider, Beacon goes far beyond the MAC address to determine endpoint identity and behavioral attributes. Furthermore, the enforcement module leverages Beacon’s behavior monitoring capabilities to alert, quarantine or block a device when an unusual behavior, such as MAC Spoofing, is detected.

In addition, the Beacon Endpoint Enforcement module also improves the speed and accuracy of endpoint discovery thus providing an enterprise solution for real-time endpoint visibility.

Sharmistha Mukherjee
A tech savvy humanBOT, Sharmistha is a professional writer A tech savvy humanBOT, Sharmistha is a professional writer who engages in technical writing to simplify the use of a product or service. With a high inclination towards IoT and Artificial Intelligence, she fancies exploring all plausibilities around the subjects. Her interests revolve around connecting to people and excavating the "unexplored" through first hand investigation.