Dover, NH – June 5, 2013 – Great Bay Software Inc. announced today that it has entered into a strategic growth partnership with GrowthFire LLC, a private equity investment firm focused on emerging-growth software companies serving global markets.
“The combination of Great Bay and Growthfire will facilitate the company’s growth into new markets and geographies at an accelerated pace”, said Great Bay co-founder Steve Pettit. “This is the perfect time for this transition and we feel incredibly fortunate to have found an entity that so closely aligns with the company’s aspirations.”
Tim Butler, GrowthFire’s Managing Partner will lead Great Bay’s growth as Chief Executive Officer. “Great Bay’s award-winning Endpoint Discovery and Profiling solutions clearly lead the industry with capabilities and flexibility required by sophisticated global CIO’s, security officers and network managers.” Butler said. Great Bay’s enterprise solutions go well beyond current NAC, BYOD, compliance or asset management initiatives. The technology is critical to protecting and managing client’s corporate networks where the rapidly-expanding internet-of-things increasingly exposes enterprise networks and network data.”
“Great Bay’s technology platform, strong international client list and key strategic partners provide a solid base for growth,” Butler continued. “We look forward to investing in products, people and partnerships that solve the market’s endpoint and network management challenges and accelerate Great Bay’s growth trajectory.”
About Great Bay Software
Great Bay Software, Inc. is a leading global provider of software specializing in Enterprise Endpoint discovery, profiling, management and support. The company’s flagship product, Beacon Endpoint Profiler, features applications that include the enabling and extending of NAC and 802.1X, providing a comprehensive inventory of all network attached endpoints, and supporting compliance initiatives mandated in today’s business climate. Visit www.greatbaysoftware.com for more information on Great Bay’s Beacon Endpoint Profiling system, or call +1(603)766-6124.
GrowthFire is a Minneapolis-based, private investment partnership focused on helping high-potential emerging-stage software and services companies achieve their ultimate potential. GrowthFire is backed by global technology industry leadership and funds with over $1 Billion of capital under management. GrowthFire’s emphasis is on building long-term value for shareholders, employees and customers by acquiring and growing global technology companies with platform potential. For more information on GrowthFire visit www.GrowthFire.com.]]>
Great Bay Software, the industry leader in Endpoint Profiling, has been selected by Randolph-Brooks Federal Credit Union, one of the strongest credit unions in the country, to assist in the network discovery phase of deploying a Network Access Control solution. Great Bay’s flagship product, Beacon Endpoint ProfilerTM, is providing RBFCU with a real-time, contextual inventory of all network-attached endpoints. Further, RBFCU will rely on Beacon for ongoing Endpoint Identity Monitoring of more than 35 remote sites within the credit union network.
Press Release, Feb. 2011
Please Click to Download Full Release]]>
One of the most important responsibilities of any municipality is to protect and distribute safe drinking water. Like most municipal functions today, our ability to do this depends on having reliable, secure information networks.
National Professional Journal of MISA/ASIM Canada
November, 2012, Vo. 19, No. 5
Inability to detect and eliminate rogue endpoints such as wireless LAN access points, devices brought from home, hubs, devices added to conference rooms, etc. Detecting rogue endpoints is central to auditors’ approach today and while this problem space is currently referred to as BYOD, the challenge is far broader than whether someone wants to bring their iPad to work. Further, the focus on wireless networks is only the first audit finding. As soon as this one is addressed that same auditor will submit a new finding; this time for the wired network.
Automatically generate and maintain and comprehensive database of all wired and wireless endpoints. Detecting rogue endpoints is critical as opposed to just detecting rogues in the wireless domain. After all most rogue access points in the enterprise network are connected via an Ethernet cable so that they can provide WLAN services to the user(s). Devices brought from home can also be detected on the wired and/or wireless networks and can be differentiated from devices belonging to the enterprise because of membership in Active Directory, participation in enterprise services such as patch management, or registration in a Mobile Device Management system.
Inability to detect, and defend against, MAC address spoofing. This is a favorite tactic for auditors and penetration testers; copy the MAC address of an enterprise device such as a printer (whose MAC address can be found on a test page or on the sticker on the back of the printer) and gain network access. They might not be able to do much, but they can ‘see’ a lot.
Continuously monitor the behavior and machine-centric attributes of network endpoints and be able to detect changes in behavior and respond either by resetting that devices connection to the network, sending an event to a SIEM platform, or removing that device from the network entirely. Great Bay has been helping customers cure this particular audit finding for years and in most cases the deployment of Beacon is the only activity undertaking between the issuing of the audit finding and the resolution.
Inability to detect wireless access points and devices brought in by employees on the wired network. Many of the most well known IT security compromises; the ones where company’s lost vast amounts of money, have one thing in common; they all involved the placement of a device in the network to perform the desired task via an Ethernet cable. Today’s wireless networks are very commonly well secured relative to the wired network. Conference room ports, guest cubes, ports left unoccupied as a result of upgrades or replacement of devices, there are countless opportunities to add devices without the consent of IT. Many of these are non-malicious (gaming systems, security cameras, departmental marketing, etc) but all can result in an Audit finding when the questions commence about how you monitor and secure the network edge.
Differentiate enterprise-owned endpoints by aggregating information from multiple sources in the IT system such as AD, MDM, network management, and network behavior to construct a database of all enterprise endpoints. Once established, existing change control systems and work flows are leveraged for the addition of Access Points to the network while all other WLAN endpoints are detected and either disconnected from the network or become the source of notification and event data. Importantly, this solution detects devices on the wired and wireless network and not just those that exist in the RF space. The explosion of wireless LANs has rendered information from RF only solutions difficult to quantify and less important since those devices are not necessarily on the network. Beacon, meanwhile detects devices that are actually on the network, which is the data required to actually differentiate between wireless endpoints that happen to share the same RF space from those that are being leveraged to access enterprise services.]]>
Data from traditionally network-centric sources is combined with information from sources such as Asset Management, enterprise management and monitoring systems, and HR systems to provide comprehensive answers to what, who, where, and when is occurring in the enterprise. The ROI for Beacon is immediately apparent, with increased efficiency in help desk operations, incident response, and audit / compliance data that represent real cost savings and risk reduction.]]>
Independent of how long it is in place, or how many phases are defined, MAC Authentication makes sense as a Phase 1 deployment towards the goal of 802.1X and/or NAC.
Benefits of this approach include: