General FAQ's

Easily digestible answers to our most asked questions.

What does BYOS do?

  • BYOS cloaks assets from the rest of the world
  • Provides secure and invisible overlay communications through decentralized networks

Why does BYOS exist?

  • Endpoint protection software is dominated by the asset and is easily bypassed by adversarial actors.
  • Perimeter Security (Firewalls, etc.) can't control the blast radius of attacks like lateral movement.

What is the Business Value/ ROI?

  • Ransomware/breach remediation cost savings ($2M to $5M average per incident).
  • Operating performance increase, no truck rolls, reduced downtime (30-50% of operating cost savings).

What does BYOS replace or reduce the need for?

  • VPNs→ BYOS allows for a more granular strategy, replacing VPNs completely.
  • Firewalls→ BYOS allows for decentralized micro-segmentation, reducing the need for complex Firewalls.
  • Remote Access Software→ BYOS allows for secure communication, removing the need for special software for remote devices.

Why do customers choose BYOS?

  • Isolating employee laptops from home and public WIFI networks.
  • Protecting and managing 3-rd party contractors and legacy devices that connect from unmanaged networks.
  • Ensuring all traffic and data originating from endpoints on any network flows through controlled entry and exit nodes.