See Inside Beacon LIVE!

Book a private presentation. Choose a Topic and
Book Your Live Presentation

A Brief description of Presentation Topics

Review each toggle for more information on each topic.

Beacon will change network operations. Each topic will provide at least 3 unique ways Beacon will change your future:

  1. Secure your IoT operations.
  2. Save money related to implementations and support.
  3. Protect you from future liabilities.
No Trust Security Implementation Design and Implementations

Beacon Security Evaluation and Simulation 

Brant Geddes and Associate Professor, Irfan Al-Anbagi, (Statement of findings from Research Project)

“The results generally agreed that the Beacon system was able to function normally during the attacks and recover quickly from them. In order to evaluate operation during the attacks, several server selection methods were implemented and benchmarked to discover how the system devices are able to balance load across servers, discover servers under attack, and rediscover servers after an attack has finished. Several methods of server selection were evaluated and it was found that an approach that involved the servers and devices together provided the most effective results. In addition to this, several scaling experiments were performed to examine exactly how the system scales by adding servers. It was found that while the Beacon system scales well with additional servers, it is recommended that the number of servers be limited to the amount necessary to handle external traffic. Overall, it was found that the Beacon system is secure, scalable, and quick to recover in the case of an attack.”

Legal Entity Relationship Management

4 Key Principles are part of Beacon: Security, Privacy, Control and Accountability 

Privacy requires security, control requires privacy and control requires accountability. A Beacon Legal Entity Relationship Management implementation includes these principles. This means you have security of devices, information and users. You control who sees information, users and devices based on need. All users, devices and information is monitored to ensure accountability is available at all times.

This means you can:

  • Design your Beacon implementation to fix your business channel model to maximize channel growth and retention.
  • Optimize your product support model to save money in channel support costs.
  • Better monitor device operations to minimize failures through predictive analysis and proactive management.
  • Create a revenue center for you and your channel using a proactive monitoring and support service delivery package.

For more information related to Legal Entity Relationship Management, please book a Presentation or Consultation.

Peer to Peer Device Relationships

What is a peer device?

Any device within a Secure Functional Network with a defined owner or owner relationship is a peer device.

What makes peer devices special?

Beacon peer devices:

  • Securely communicate with one another.
  • Monitor accessibility or connection to any device.
  • Monitor peers for bad behavior.
  • Report bad behavior or peers, servers and users.
  • Share information .
  • Relay information for peers.
  • Send functions and respond to peer functions.
Health Ecosystem

Health = telemetry (all devices, network, sensors, functions)+security + monitoring (errors, messages…) + analysis

By viewing IoT implementations as a complex ecosystem of interrelated components, you greatly increase your accuracy of measurement. Quality of services requires quality, quantity, and integrity of data accuracy and confidence.

A Health Ecosystem considers the health requirements of each device component including sensors, log files, performance criteria, function failure, communication parameters, and related network devices. Health is also dependent on the relationship between devices. This approach generates additional information sources such as:

  • Inter device telemetry – communication and function performance
  • Security information – between devices, servers, and intrusion detection
  • System and action messaging

Health Ecosystem Management is a comprehensive systems view of operations because devices are not isolated units.  Ideally, all components are monitored with data analysis being performed in real-time. Output from the health ecosystem is used to trigger actions, alerts, and services in devices, servers, and other parts of the support system.

Issues detected by the Health Ecosystems are resolved by the Support Ecosystem. 

Health is defined as the ability to perform a task with a high degree of accuracy within established performance parameters.  

Support Ecosystem

Automating and managing maintenance and support

The advantages of the Support Ecosystem are many including:

  • Device-centric data part of the processes.
  • Device centric data is triggers processes
  • Expert systems manage processes for quick and easy resolution
  • Expert systems provide solutions
  • Expert systems retain a history
  • Expert systems predict resolution times
  • Expert systems predict maintenance
  • Supports testing feedback
  • Issue resolution
  • Staff performance evaluation
  • Confidentiality management