BK Software

BK Software

Intrinsic ID
Forescout

Forescout

Forescout Technologies
+
+

Related Products

  • ManageEngine Endpoint Central
    2,683 Ratings
    Visit Website
  • Airlock Digital
    35 Ratings
    Visit Website
  • Google Cloud Platform
    60,526 Ratings
    Visit Website
  • Securden Unified PAM
    12 Ratings
    Visit Website
  • Iru
    1,488 Ratings
    Visit Website
  • Cloudflare
    1,948 Ratings
    Visit Website
  • Keeper Security
    1,752 Ratings
    Visit Website
  • DriveStrike
    24 Ratings
    Visit Website
  • UTunnel VPN and ZTNA
    118 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,249 Ratings
    Visit Website

About

The accelerating expansion of the Internet of Things brings with it a comparably expanding threat model. The growing number of endpoints require strong identities as the foundation of trust to establish and scale robust security. BK is a secure root key generation and management software solution for IoT security that allows device manufacturers to secure their products with an internally generated, unique identity without the need for adding a costly, security-dedicated silicon. Since BK is a software implementation of SRAM PUF, it is the only hardware entropy source option for securing IoT products that does not need to be loaded at silicon fabrication. It can be installed later in the supply chain, and even remotely retrofitted on deployed devices. This enables a never-before-possible remote “brownfield” installment of a hardware root of trust and paves the way for scaling the IoT to billions of devices.

About

Forescout is a comprehensive cybersecurity platform that offers real-time visibility, control, and automation for managing risks across devices and networks. Its solutions enable organizations to monitor and secure a broad range of IT, IoT, and operational technology (OT) assets, providing proactive protection against cyber threats. With Forescout's Zero Trust framework and integrated threat detection capabilities, businesses can enforce device compliance, secure network access, and continuously monitor for vulnerabilities. Designed for scalability, Forescout's platform provides insights that empower businesses to mitigate risks and enhance their security posture across various industries, from healthcare to manufacturing.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Secure root key generation and management software solution for IoT security

Audience

CIOs, IT security teams, and businesses seeking comprehensive, scalable cybersecurity solutions for managing risks across diverse IT, IoT, and operational technology environments

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 5.0 / 5
ease 5.0 / 5
features 5.0 / 5
design 5.0 / 5
support 5.0 / 5

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Intrinsic ID
Founded: 2008
United States
www.intrinsic-id.com/products/bk-software/

Company Information

Forescout Technologies
Founded: 2000
United States
www.forescout.com

Alternatives

Alternatives

Azure Sphere

Azure Sphere

Microsoft
Auconet BICS

Auconet BICS

Auconet
Xage

Xage

Xage Security
UTunnel VPN and ZTNA

UTunnel VPN and ZTNA

Secubytes LLC

Categories

Categories

Computer Security Features

Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection

Network Access Control (NAC) Features

Authentication
Authorization
Automated Hotfix / Updates
Centralized Policy Management
Dashboard
Device Auto-Provisioning
Device Self-Registration
Posture Assessment
Quarantine / Remediation
Secure Guest Access

Integrations

CYREBRO
Carbon Black EDR
Check Point Infinity
CloudVision
Cynerio
Frenos
Google Digital Risk Protection
Junos Traffic Vision
Mandiant Managed Defense
Nexpose
NorthStar Navigator
Optiv Managed XDR
Panaseer
PangaeAPI
Qualys WAS
Seemplicity
Sepio
Tenable One
Vectra AI

Integrations

CYREBRO
Carbon Black EDR
Check Point Infinity
CloudVision
Cynerio
Frenos
Google Digital Risk Protection
Junos Traffic Vision
Mandiant Managed Defense
Nexpose
NorthStar Navigator
Optiv Managed XDR
Panaseer
PangaeAPI
Qualys WAS
Seemplicity
Sepio
Tenable One
Vectra AI
Claim BK Software and update features and information
Claim BK Software and update features and information
Claim Forescout and update features and information
Claim Forescout and update features and information