Skip to main content
TrustRadius
Byos

Byos

Overview

What is Byos?

Byos Secure Edge is a security solution used to communicate “on the network” without being connected “to the network” by isolating each device on its own network of one. If a device is compromised in some other way, like malware…

Read more
Recent Reviews
TrustRadius

Leaving a review helps other professionals like you evaluate Network Security Software

Be the first one in your network to review Byos, and make your voice heard!

Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is Byos?

Byos Secure Edge is a security solution used to communicate “on the network” without being connected “to the network” by isolating each device on its own network of one. If a device is compromised in some other way, like malware from an email, Byos limits the spread. The Byos Secure…

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

1 person also want pricing

Alternatives Pricing

What is Trellix Network Security?

Trellix Network Security (formerly FireEye Network Security and Forensics products) combines network traffic analysis and network forensics for attack analysis .

What is Azure Bastion?

Azure Bastion is a managed service that provides more secure and seamless Remote Desktop Protocol (RDP) and Secure Shell Protocol (SSH) access to virtual machines (VMs) without any exposure through public IP addresses.

Return to navigation

Product Details

What is Byos?

Byos Secure Edge is a security solution used to communicate “on the network” without being connected “to the network” by isolating each device on its own network of one. If a device is compromised in some other way, like malware from an email, Byos limits the spread.

The Byos Secure Endpoint Edge is a small plug-and-play hardware edge device that provides the “first hop” protection when connecting to an unmanaged network (public or home Wi-Fi). It provides microsegmentation and route enforcement by replacing the endpoint’s native Wi-Fi, protecting across OSI layers 1-5 by becoming the gateway. This solution provides the connected endpoint with true isolation from the rest of the network, and fills the gap left by security software by being the ingress/egress point for all internet traffic and not being susceptible to bypass and stealth attacks originating inside the endpoint’s OS.

The Byos solution includes:

  • Byos Secure Edge - The Byos Secure Endpoint Edge device performs all networking on behalf of the endpoint (performs NAT, has its own DHCP, encrypted DNS server, proprietary network security stack), thus replacing the endpoint’s native Wi-Fi.
  • Byos Microsegment - The protected zone created by the Secure Endpoint Edge, which the endpoint sits inside, so that it remains invisible to fingerprinting, enumeration, or discovery attacks on the local network.
  • Internet Traffic - The Secure Endpoint Edge routes clean TLS traffic to the internet, and can be routed to an organization’s existing cloud security solutions.
  • Traditional Perimeter - The Byos Secure Endpoint Edge device is agentless as nothing needs to be installed on the endpoint and deploys easily without requiring changes to the local network configuration.
  • Byos-leveraged IAM - Byos integrates with identity solutions so the Secure Endpoint Edge can act as an authorization signal - eg. “John Doe is using his Byos Secure Endpoint Edge, therefore he can access Github”.
  • Secure Lobby Tunnel without Internet Access - Policies can be set by the Admin from the Byos Management Console to block internet access to/from the endpoint. However, this endpoint can still communicate to other Secure Endpoint Edge also connected to Secure Lobby.
  • Secure Lobby Tunnel with Internet - Endpoints using a Secure Endpoint Edge can have all internet traffic routed through Secure Lobby, to a controlled exit node set by the Administrator, so that no packet touches public servers before reaching the internet.
  • Byos control plane traffic - Constant pull beacons from the Secure Endpoint Edge to the Byos Management Console for centralized command and control.



Byos Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews

Sorry, no reviews are available for this product yet

Return to navigation