Explore the Latest in Tech Innovations

Please enable JavaScript in your browser to complete this form.
Name

Byos μGateway Brings Zero Trust Security to Remote Endpoints

Oct 15, 2020 | Security

By Peter Kelley

Targeting organizations whose remote workers and contractors need to secure sensitive data and prevent contagion of corporate networks when working remotely, Byos introduced the Byos™ μGateway™ (“micro-gateway”). μGateway is the first plug-and-play security product that extends Zero Trust access to any remote Wi-Fi connection, to protect users and organizations from the risks of unmanaged, unprotected home and public Wi-Fi networks.

Remote working increased dramatically during 2020’s pandemic and experts predict it will remain strong after the current global health emergency subsides, forcing many employees to use “dirty” networks such as public Wi-Fi and home networks shared with online gamers.

Byos CEO and Founder Matias Katz warned that “Threat actors are well-aware of the attack openings on these networks that legacy remote access solution like VPNs were not designed to protect against. The problem is compounded by the challenge of managing and enforcing remote users to comply with corporate security polices – there’s currently no easy way to monitor their connection or provision new policies remotely.”

Because VPNs protect only data in transit, remote users and organizations remain vulnerable to malware and the “Dirty Half Dozen” attacks:

– Scanning, Enumerating, and Fingerprinting
– Eavesdropping
– Remote Access Exploits
– Evil-Twin Wi-Fi
– Lateral Network Infections
– DNS hijacking

“Insecure Wi-Fi networks expose devices to a range of threats, but the Byos’ micro-segmentation solution allows endpoints to be isolated from the risks, while giving Security teams visibility and control, all with a small plug-and-play USB device,” said Ed Amoroso, Chief Executive Officer, TAG Cyber LLC.

“Byos is taking a simple and innovative hardware-based approach to protect imperfect devices (e.g. computers) when they communicate over untrusted networks,” said Paul Kocher, renowned security researcher and co-creator of the SSL/TLS protocols.

The Byos μGateway is a hardened, embedded security stack on a small USB device. It isolates each endpoint onto its own unique network micro-segment of one, invoking “Zero Trust” and protecting the device from potentially compromised networks and other nodes on the network. This lets employees, contractors and devices safely and securely connect to any network.

“The Byos architecture appears to make it easily adaptable to different types of endpoints and make deployment and usage straightforward for both IT security teams and end users,” said Paula Musich, Research Director at Enterprise Management Associates.

“It’s a business imperative that employees and contractors can work from anywhere, with assurances that their connection is secure,” Katz concluded.

The gateway is now generally available. Byos offers three tiers of pricing for pros, businesses and large enterprises, and an introductory “Starter 5-Pack” with five µGateway Devices and its cloud-based Management Console access, at $1795 USD. More information is available at byos.io/get-started.

 

 

How new data privacy laws will impact you

How new data privacy laws will impact you

The 2025 Data Privacy Crisis: 8 New Laws Create Compliance Emergency
January 2025 brought unprecedented privacy upheaval as eight new state laws activated simultaneously, affecting businesses nationwide. With non-compliance costs averaging $14.82 million and 94% of consumers refusing to buy from companies that mishandle data, the stakes have never been higher. From mandatory universal opt-out mechanisms to AI governance challenges, organizations face a regulatory maze that could trigger automatic violations. Tennessee, Minnesota, and Maryland follow with even stricter requirements mid-year. Discover critical compliance strategies, technical implementation requirements, and personal VPN protection benefits to navigate 2025’s most complex privacy landscape and avoid costly penalties.

read more
The Quantum Readiness Survey: How Technology Leaders Are Preparing for the Next Computing Revolution

The Quantum Readiness Survey: How Technology Leaders Are Preparing for the Next Computing Revolution

Quantum computing is no longer a distant scientific curiosity—it’s rapidly approaching commercial reality. From breaking current encryption methods to solving optimization problems that could transform entire industries, quantum computing represents both unprecedented opportunity and significant risk for enterprise organizations. Be a part of the future, take part 1 of the Quantum Computing survey

read more
Your Monthly Tech Intelligence Briefing – May 26, 2025 – Memorial Day Edition

Your Monthly Tech Intelligence Briefing – May 26, 2025 – Memorial Day Edition

Securing Multi-Cloud Environments: Best Practices for 2025
As we honor those who served our nation this Memorial Day, it’s fitting to reflect on the strategic importance of defending our digital infrastructure. Just as military operations require coordinated defense across multiple fronts, modern enterprises must secure their multi-cloud environments with the same level of strategic planning and execution.

read more
Share This