General FAQ's
Easily digestible answers to our most asked questions.
What does BYOS do?
- BYOS cloaks assets from the rest of the world
- Provides secure and invisible overlay communications through decentralized networks
Why does BYOS exist?
- Endpoint protection software is dominated by the asset and is easily bypassed by adversarial actors.
- Perimeter Security (Firewalls, etc.) can't control the blast radius of attacks like lateral movement.
What is the Business Value/ ROI?
- Ransomware/breach remediation cost savings ($2M to $5M average per incident).
- Operating performance increase, no truck rolls, reduced downtime (30-50% of operating cost savings).
What does BYOS replace or reduce the need for?
- VPNs→ BYOS allows for a more granular strategy, replacing VPNs completely.
- Firewalls→ BYOS allows for decentralized micro-segmentation, reducing the need for complex Firewalls.
- Remote Access Software→ BYOS allows for secure communication, removing the need for special software for remote devices.
Why do customers choose BYOS?
- Isolating employee laptops from home and public WIFI networks.
- Protecting and managing 3-rd party contractors and legacy devices that connect from unmanaged networks.
- Ensuring all traffic and data originating from endpoints on any network flows through controlled entry and exit nodes.