By creating a micro-segment of one for each endpoint on a network, the Byos Industrial μGateway provides unprecedented security and remote management for IoT devices
Byos (www.byos.io), the edge micro-segmentation company dedicated to helping organizations protect themselves from the risk of ubiquitous remote, guest and IoT network connectivity, announced today the launch of the Byos™ Industrial μGateway™ (“micro-gateway”), a plug-and-play, edge security product that provides secure connectivity for Internet of Things (IoT) devices and legacy infrastructures. Delivering Zero Trust security through micro-segmentation, the Byos Industrial μGateway also provides secure remote access for IoT devices through its unique Secure Lobby™ feature, enabling remote monitoring and management of industrial systems with no network or endpoint exposure.
The rise of IoT devices in industrial, medical and other settings poses a strong risk of cybersecurity attacks for the businesses that rely on them. With Juniper Research projecting an increase in the global number of industrial IoT connections from 17.7 billion in 2020 to 36.8 billion in 2025 — a growth rate of 107 percent — the security risks will continue to grow stronger. Existing security solutions do not support legacy systems and leave industrial IoT devices vulnerable to lateral movement and DDoS attacks.
The Byos Industrial μGateway is a plug-and-play, legacy-compatible secure gateway edge for critical infrastructure. It sits between IoT endpoints and the network infrastructure, isolating each endpoint onto its own unique network micro-segment of one, thereby protecting it from compromised endpoints on the network. Certified for industrial compliance, reliability, and environmental standards, the Byos Industrial μGateway works across OSI layers 1 – 5, covering multiple attack vectors.
Secure Lobby™ for Remote Access to IoT Devices
A critical feature of the Byos Industrial μGateway is its Secure Lobby, which provides Zero Trust remote access to endpoints. Conventional remote access tools require opening up the perimeter, which adds unnecessary exposure risk to entire corporate networks. The Secure Lobby allows for monitoring, troubleshooting, updating, and patching remotely, without exposing internal endpoints to the Internet.
The Secure Lobby creates a secure connection between the µGateway and the Byos Management Console using an outbound connection, originating from inside of the corporate network perimeter, so as to not interfere with local network configurations. This saves both Network Administrators and Service Technicians time when servicing Byos-protected endpoints remotely.
“The rise of IoT devices introduces a unique set of security challenges as companies connect an increasing variety of endpoint devices to their networks,” said Matias Katz, founder and CEO of Byos. “And yet most security solutions are not prepared to deal with those threats, especially when relying on legacy infrastructures. The Byos Industrial μGateway comes at the problem differently from other solutions by creating a unique micro-segment of one for every device on the local network, and through the Secure Lobby it allows network administrators as well as authorized 3rd-party vendors to access any of the devices remotely, saving operational expenses and reducing trips onsite for maintenance.”
“We use the Byos solution to easily manage and service our industrial control system devices across a multitude of networks,” said John Langille, owner of All East Mechanical, an ICS Service Company. “Previously, the network owners didn’t always trust third-party vendors like us with connecting remotely. Now, with Byos, we can access our controllers securely from anywhere, without exposing the rest of the network to any risk. It’s a win-win: the network is secure, and we’re saving a lot of money and time on technician travel by reducing truck rolls.”
Jim Routh, Former CISO/CSO of MassMutual, CVS Health, Aetna, and JP Morgan Chase, and current member of Byos’ board of advisors, said: “What Byos is doing for microsegmentation at the edge is innovative and unique in the marketplace. This approach has great benefits for CISOs with mixed fleets of devices looking to add more protection, visibility, and control of the traffic that flows to devices on networks they don’t trust.”
For more such updates and perspectives around Digital Innovation, IoT, Data Infrastructure, AI & Cybsercurity, go to AI-Techpark.com.