Great Bay Software’s Endpoint Profiling technology delivers a comprehensive identity-based database of all network endpoints. This inventory is gathered in an automated fashion and, unlike traditional asset management systems, the contextual information related to each...Read More
IT audit findings have driven many organizations to deploy Great Bay Software. Common Audit findings include: Audit finding: Inability to detect and eliminate rogue endpoints such as wireless LAN access points, devices brought from home, hubs, devices added to conference...Read More
For many enterprise networks, the greatest risk in deploying 802.1X and/or NAC is the notion of an all-or-nothing change that is difficult to undo if something goes awry. To mitigate this, many IT administrators have begun deploying MAC Authentication as a first step towards...Read More
Great Bay Software’s Endpoint Profiling technology automatically generates and maintains a comprehensive identity-based database of all network endpoints.
Following the automated creation of a comprehensive endpoint inventory, Great Bay Software’s Beacon continuously monitors the behavior and device centric attributes of all enterprise endpoints.
Devices connecting to the enterprise network are exceptionally diverse so being able to differentiate friend from foe rapidly is a critical requirement in the IT Security system.