background image

Byos µ

Gatewvay-

Evaluation Guide

Содержание mGateway

Страница 1: ...Byos Gatewvay Evaluation Guide...

Страница 2: ...de to help you make the most out of the Byos Gateway micro gateway and take advantage of all its features Please carefully review each section below and if you have any questions please reach out to e...

Страница 3: ...er tested with current versions of Chrome Firefox Safari Internet Explorer Edge and Opera No additional plug ins or software required Manufactured In Canada and USA Dimensions 10 5 x 3 4 x 1 cm 4 1 x...

Страница 4: ...SB device allowing individuals employees and devices to safely and securely connect any network regardless of their location or network environment We took the proven approach of network segmentation...

Страница 5: ...rms before traffic will be allowed to flow 5 If you wish to connect to a hidden network click cancel and then navigate to the Wi Fi page from the button in the left navigation bar Once on the Wi Fi pa...

Страница 6: ...nications with the network gateway without allowing the poisoning of the routing tables Private DNS Queries the Gateway runs an in device Encrypted DNS server preserving confidentiality of the user s...

Страница 7: ...tries domains IP addresses and ports your device connects to Most people don t realize the amount of connections their devices make on a day to day basis let alone which countries these servers are in...

Страница 8: ...e product does not have hidden backdoors Security and Privacy of the Gateway We perform extensive white box and black box testing on the Gateway to ensure our product is secure The Gateway is NIST SAN...

Страница 9: ...e Gateway uses the USB OTG specification and should be recognized by your device as a RNDIS Ethernet Gadget If your device does not recognize Gateway unplug it The driver will be automatically install...

Страница 10: ...red with an enterprise class Management Console to deploy and manage Gateways at scale This allows IT security teams to confidently efficiently and cost effectively manage a global workforce centrally...

Страница 11: ...uitry directly in a device automatically creates a micro segment of 1 delivering hardware enforced protection of the device from the inherent risks on dirty networks while allowing secure zero trust b...

Отзывы: