Byos

Make Your Network Invisible

Byos

Canada
2018
Private
< $10m
11 - 50
 Open website
Contact Vendor
Feature New Record
SIMILAR SUPPLIERS
Supplier LogoByos
Supplier SVG Logo
Supplier LogoByos
Supplier SVG Logo

Overview
Supplier SloganMake Your Network Invisible
HQ LocationCanada
Year Founded2018
Company TypePrivate
Stock Ticker
Revenue< $10m
Employees11 - 50
Website Open website
Twitter Handle
Company Description

Byos completely cloaks a device, or even an enterprise’s entire network, so that it cannot be discovered nor accessed, except by those entities that have proven their credentials beyond a shadow of a doubt. We then apply rules, based on that proven identity, so that access to each device is provisioned on an absolute Least Privilege basis. That makes lateral movement across the network practically impossible.

IoT Solutions

The Byos Secure Gateway Edge Solution has three main capabilities, incorporating different components for security, management, and access of IoT devices:

Plug-and-play Network Security at the edge, independent of the host or the cloud

Byos Industrial μGateway™(“micro gateway”) is a Secure Gateway Edge deployed as a standalone industrialized Gateway. It isolates devices sitting behind it onto their own microsegment within the local network, protecting them from OSI layer 1-5. It has 3 different operation modes:

  1. Wi-Fi Hotspot-mode for Wireless-capable Devices
  2. Ethernet-mode for Legacy and Wired Devices
  3. Client-mode to connect to a pre-existing Wi-Fi Network

This approach provides protection from the attacks that are most commonly seen on Wi-Fi networks: eavesdropping, lateral movement, DNS poisoning, route alteration, Exploiting and DDoS, and rogue AP. Being at the real edge means security isn’t dependent on the Host’ IoT devices OS nor is delegated to the cloud - all security processing happens locally on the µGateway for maximum protection against typical attacks that rely on evasion techniques.

The Byos Secure Gateway Edge can be deployed with a number of different types of Endpoints, so long as they speak TCP/IP.

Key Customers
Subsidiary
Parent Company

IoT Snapshot
TechnologiesCybersecurity & Privacy
Industries
Use CasesPerimeter Security & Access Control
Functions
Services

Technology Stack
Infrastructure as a Service (IaaS)None
Platform as a Service (PaaS)None
Application Infrastructure & MiddlewareNone
Analytics & ModelingNone
Functional ApplicationsNone
Cybersecurity & PrivacyModerate
Networks & ConnectivityNone
Processors & Edge IntelligenceNone
SensorsNone
Automation & ControlNone
RobotsNone
DronesNone
WearablesNone
ActuatorsNone
OtherNone

Similar Suppliers
Similar Suppliers

Partners
Partners

Overview
Supplier SloganMake Your Network Invisible
HQ LocationCanada
Year Founded2018
Company TypePrivate
Stock Ticker
Revenue< $10m
Employees11 - 50
Website Open website
Twitter Handle
Company Description

Byos completely cloaks a device, or even an enterprise’s entire network, so that it cannot be discovered nor accessed, except by those entities that have proven their credentials beyond a shadow of a doubt. We then apply rules, based on that proven identity, so that access to each device is provisioned on an absolute Least Privilege basis. That makes lateral movement across the network practically impossible.

IoT Solutions

The Byos Secure Gateway Edge Solution has three main capabilities, incorporating different components for security, management, and access of IoT devices:

Plug-and-play Network Security at the edge, independent of the host or the cloud

Byos Industrial μGateway™(“micro gateway”) is a Secure Gateway Edge deployed as a standalone industrialized Gateway. It isolates devices sitting behind it onto their own microsegment within the local network, protecting them from OSI layer 1-5. It has 3 different operation modes:

  1. Wi-Fi Hotspot-mode for Wireless-capable Devices
  2. Ethernet-mode for Legacy and Wired Devices
  3. Client-mode to connect to a pre-existing Wi-Fi Network

This approach provides protection from the attacks that are most commonly seen on Wi-Fi networks: eavesdropping, lateral movement, DNS poisoning, route alteration, Exploiting and DDoS, and rogue AP. Being at the real edge means security isn’t dependent on the Host’ IoT devices OS nor is delegated to the cloud - all security processing happens locally on the µGateway for maximum protection against typical attacks that rely on evasion techniques.

The Byos Secure Gateway Edge can be deployed with a number of different types of Endpoints, so long as they speak TCP/IP.

Key Customers
Subsidiary
Parent Company

IoT Snapshot
TechnologiesCybersecurity & Privacy
Industries
Use CasesPerimeter Security & Access Control
Functions
Services

Technology Stack
Infrastructure as a Service (IaaS)None
Platform as a Service (PaaS)None
Application Infrastructure & MiddlewareNone
Analytics & ModelingNone
Functional ApplicationsNone
Cybersecurity & PrivacyModerate
Networks & ConnectivityNone
Processors & Edge IntelligenceNone
SensorsNone
Automation & ControlNone
RobotsNone
DronesNone
WearablesNone
ActuatorsNone
OtherNone

Similar Suppliers
Similar Suppliers

Partners
Partners