Mikko Kenttälä, CEO
Beacon devices and Beacon virtual machines have helped our customers to always know if their networks leak. After first deployments our customers also wanted to always know when their computers leak. Now they will!
Computers can leak in many ways. Workstations can be plugged to wrong networks in meeting rooms or someone may miswire the patch panel. VPN can fail and a laptop ends up exposed directly to the Internet. Someone connects to the USB port to charge his phone and accidentally tethers the machine to the Internet. Our customers can now deploy the Beacon to the all their workstations and laptops and get alerts when accidents happen.
Moreover, sometimes you can not deploy devices and virtual machines to isolated networks. But it is hard to imagine an environment where you can't deploy applications. Beacon Application allows you to secure your assets also in cloud environments such as Amazon AWS, Google Cloud or Microsoft Azure.
"Sometimes even the experts get it wrong! So how can we build and ensure the policies - and the technical enforcement of those written policies keep accidents and slip ups from occurring?"
Always know if your network leaks. Designed for customers who depend on network segregation.
You rely on it. You may call it isolation, segregation, segmentation, partition or sandboxing. But do you know it works? Privacy, payment safety or your sanity may require it.
Firewall rules, routing, VPNs, switch VLANs, cabling - it is just impossible to review everything works right everywhere! With Beacon, the testing is straightforward.
Rather than finding 300 potential issues in one location, test one important security control in 300 locations.
Put them in your networks and they will alert if your networks leak. Beacons try to connect to their Home over IPv4, IPv6, TCP, UDP, ICMP, DNS and Ethernet Broadcast. If they succeed, Home alerts you via Syslog or Slack.
Beacon checks for problems with firewalled, layered and air gapped isolations. You can use Beacons to cover a wide range of your protection scenarios, see below for examples.
There are three ways to deploy Beacon - Device, Virtual and App
Beacon Application is extremely easy to deploy to existing environments. You can also use management tools like Microsoft System Center or GPO, Puppet, Ansible, etc. Just add Beacon application to your management automation and get full coverage on how well your isolation is working.
Launch the virtual Beacons inside data centers and see if they can call their Home. Download Beacon Virtual Machine in standard OVA -format from Beacon Home and put your VM to right network and you are ready.
Use the Beacon Devices to test network isolation on
premises. Leave them behind, move them around, have
them all around. Works with Raspberry Pi*. Download
image from Beacon Home, copy it to SD card and you
are ready to deploy the Beacon Device to your
"Raspberry Pi is a trademark of the Raspberry Pi Foundation"
Enhancing your network security has never been so easy.
You can either deploy directly to Windows or Linux machine you want to protect or on Raspberry Pi, KVM, VirtualBox or VMWare in the target network segment.
You get Beacon Home for your organization with instructions. From Home you can download Beacon Application, Beacon Virtual Machines and Beacon Device image for Raspberry Pi. Your subscription includes customer support and free upgrades. Customer support is available over email and Slack.
You can integrate alerts with Slack or a syslog server. You can leverage your SIEM as well via APIs.
Basic subscription gives you one Home and unlimited beacons. Support and upgrades included. Please contact us for pricing.
"We started SensorFu in order to go back to basics with IT security. We feel that security requirements pile up, while systems and security solutions get more complex by the day. Our products give our customers assurance that their security policies are and stay sealed."