Download PDF
Suppliers > Canada > Byos
Byos Logo

Byos

Make Your Network Invisible
Overview
HQ Location
Canada
Year Founded
2018
Company Type
Private
Revenue
< $10m
Employees
11 - 50
Website
Company Description

Byos completely cloaks a device, or even an enterprise’s entire network, so that it cannot be discovered nor accessed, except by those entities that have proven their credentials beyond a shadow of a doubt. We then apply rules, based on that proven identity, so that access to each device is provisioned on an absolute Least Privilege basis. That makes lateral movement across the network practically impossible.

IoT Solutions

The Byos Secure Gateway Edge Solution has three main capabilities, incorporating different components for security, management, and access of IoT devices:

Plug-and-play Network Security at the edge, independent of the host or the cloud

Byos Industrial μGateway™(“micro gateway”) is a Secure Gateway Edge deployed as a standalone industrialized Gateway. It isolates devices sitting behind it onto their own microsegment within the local network, protecting them from OSI layer 1-5. It has 3 different operation modes:

  1. Wi-Fi Hotspot-mode for Wireless-capable Devices
  2. Ethernet-mode for Legacy and Wired Devices
  3. Client-mode to connect to a pre-existing Wi-Fi Network

This approach provides protection from the attacks that are most commonly seen on Wi-Fi networks: eavesdropping, lateral movement, DNS poisoning, route alteration, Exploiting and DDoS, and rogue AP. Being at the real edge means security isn’t dependent on the Host’ IoT devices OS nor is delegated to the cloud - all security processing happens locally on the µGateway for maximum protection against typical attacks that rely on evasion techniques.

The Byos Secure Gateway Edge can be deployed with a number of different types of Endpoints, so long as they speak TCP/IP.

IoT Snapshot
Byos is a provider of Industrial IoT cybersecurity and privacy technologies.
Technology Stack
Byos’s Technology Stack maps Byos’s participation in the cybersecurity and privacy IoT Technology stack.
  • Devices Layer
  • Robots
    Drones
    Wearables
  • Edge Layer
  • Automation & Control
    Processors & Edge Intelligence
    Actuators
    Sensors
  • Cloud Layer
  • Platform as a Service (PaaS)
    Infrastructure as a Service (IaaS)
  • Application Layer
  • Functional Applications
  • Supporting Technologies
  • Analytics & Modeling
  • Application Infrastructure & Middleware
  • Cybersecurity & Privacy
  • Networks & Connectivity
Technological Capability:
None
Minor
Moderate
Strong

Contact us

Let's talk!

* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.