Identity Monitoring

Following the automated creation of a comprehensive endpoint inventory, Great Bay Software’s Beacon continuously monitors the behavior and device centric attributes of all enterprise endpoints.

In contrast with other systems that operate on a scheduled basis, Beacon is continuously in operation, gathering and assessing endpoint information to either certify or contradict endpoint identity.  Identity monitoring is leveraged most commonly in preparation for an IT Audit (or to cure an IT Audit finding after the fact).  Auditors commonly leverage MAC address and/or host address spoofing as a method to defeat IT security controls.  In this scenario, Beacon identifies the change in endpoint behavior and can either generate event information to sent to the SIEM / NMS or interact with a system to adjust that devices ability to continue to communicate on the network.