background image

Patent Pending. © 2020 Byos Inc. - Halifax, Nova Scotia - All Rights Reserved - 

byos.io

8

Step 4: 

What’s under the hood?

The µGateway is technology-agnostic meaning it works with any type of endpoint, regardless of the OS type or version; it does not 

require installation of any software agent on the host endpoint. The µGateway runs a proprietary, hardened Linux OS that has customized 

network services and signed Hardware drivers. It also has a proprietary attack knowledge base and network health detection service. 

For hardware security, the µGateway has an encrypted file system, secure boot, no JTAG connector, and PKI-signed code, making it 

resistant to hardware attacks. 

The  μGateway  has  a  proprietary  Hardware  board  that  is  manufactured  in  Canada  and  the  USA.  It  has  a  certified  supply  chain  of 

components and a certified chain of custody of Software, so we have full assurance the product does not have hidden backdoors. 

Security and Privacy of the μGateway

We perform extensive white-box and black-

box testing on the µGateway to ensure our 

product is secure. The µGateway is NIST, 

SANS Top 20, and COBIT compliant.

For industry security validation, we also run a 

bug bounty program. A bug bounty program 

allows security researchers to perform 

penetration testing against the µGateway 

to  find  security  vulnerabilities/weaknesses 

and to validate the protection claims made, 

reporting the bugs found to our internal 

security team. You can find more information 

about the results of our previous bug bounty 

events at 

byos.io/resources

To preserve the users’ privacy, we never 

collect logs about your usage of the 

μGateway.  The  only  time  the  µGateway  will 

communicate with our servers is during 

boot;  It  will  check  to  see  if  the  license  is 

valid and if there are any updates available. 

This can be verified by analyzing the traffic 

between the µGateway and the router.

Byos is manufactured in North America, with a certified supply chain of components.

Summary of Contents for mGateway

Page 1: ...Byos Gatewvay Evaluation Guide...

Page 2: ...de to help you make the most out of the Byos Gateway micro gateway and take advantage of all its features Please carefully review each section below and if you have any questions please reach out to e...

Page 3: ...er tested with current versions of Chrome Firefox Safari Internet Explorer Edge and Opera No additional plug ins or software required Manufactured In Canada and USA Dimensions 10 5 x 3 4 x 1 cm 4 1 x...

Page 4: ...SB device allowing individuals employees and devices to safely and securely connect any network regardless of their location or network environment We took the proven approach of network segmentation...

Page 5: ...rms before traffic will be allowed to flow 5 If you wish to connect to a hidden network click cancel and then navigate to the Wi Fi page from the button in the left navigation bar Once on the Wi Fi pa...

Page 6: ...nications with the network gateway without allowing the poisoning of the routing tables Private DNS Queries the Gateway runs an in device Encrypted DNS server preserving confidentiality of the user s...

Page 7: ...tries domains IP addresses and ports your device connects to Most people don t realize the amount of connections their devices make on a day to day basis let alone which countries these servers are in...

Page 8: ...e product does not have hidden backdoors Security and Privacy of the Gateway We perform extensive white box and black box testing on the Gateway to ensure our product is secure The Gateway is NIST SAN...

Page 9: ...e Gateway uses the USB OTG specification and should be recognized by your device as a RNDIS Ethernet Gadget If your device does not recognize Gateway unplug it The driver will be automatically install...

Page 10: ...red with an enterprise class Management Console to deploy and manage Gateways at scale This allows IT security teams to confidently efficiently and cost effectively manage a global workforce centrally...

Page 11: ...uitry directly in a device automatically creates a micro segment of 1 delivering hardware enforced protection of the device from the inherent risks on dirty networks while allowing secure zero trust b...

Reviews: