Always know
if your network leaks!

We've made network isolation monitoring easy
Read more

Trusted by

Beacon

Automated monitoring

Network isolation made easy

Monitoring OT network leaks doesn't have to be complicated. Keep your most valuable assets safe and let our Beacon do the monitoring for you. Our products give you assurance that security policies are, and stay, sealed. In case Beacon detects isolation fails, you get an instant alert. Beacon checks for problems with firewalled, layered and air gapped isolations - continuously.

In 2020 Q2, 12 new ICS/OT enterprises adopted SensorFu Beacon and 81% of deployments discovered immediately unwanted leaks that were quickly fixable. You can read more about the findings of the study from NCSC-FI website and NCSC-FI Feasibility study report.

Seal your networks today

Beacon calls Home

How do Beacons work?

Beacons can be deployed in bare metal, virtual machines, containers, and even on small gadgets. Put them in your networks and they will alert if your networks leak. Beacons try to connect to their Home over IPv4, IPv6, TCP, UDP, ICMP, DNS, Ethernet Broadcast and IP Payload. If they succeed, Home alerts you via Syslog, Slack or HTTP-API.

Beacon calls Home

Get started

All-in-one solution

What's included?

You get Beacon Home for your organization with instructions. From Home you can download Beacon Application, Beacon Virtual Machines and Beacon Device image for Raspberry Pi. Customer support is available over email and Slack.

Read more about Beacon

The pilot process

How to start?

We offer a 6-month pilot for a special price of 14 900 €. We will start with a video meeting to identify your needs. The pilot period is not time-consuming for the customer as it takes only 4–8 hours. After the pilot you have a chance to seamlessly continue using Beacons. After the pilot, the price will approximately be 2 500 € per month.

  1. Kickoff

    In the kickoff meeting we will determine where to deploy SensorFu Beacons and how many of them your organization needs. Basic information, such as Beacon name, network configuration, and type of Beacons, will be planned together. Alerts are activated immediately.

  2. Midway

    In the midway meeting, we will discuss the deployment status of Beacons. If any leaks have occurred, they will be covered and potential fixes presented. Next steps for the future will guide the project forwards.

  3. Report

    At the end of the pilot we will discuss the findings made during the past 6 months. Especially we appreciate the feedback of the ease of the deployment process. We will make recommendations and discuss your cyber security needs for the future.

Contact us to get started

Use cases

All bases covered

Beacons cover a wide range of protection scenarios

Virtual private cloud

Beacon Application can be installed in clouds and is used to test isolation in VPCs or individual service deployments.

Virtual private cloud

Secure workstation network

Secure Workstation Networks are usually strictly firewalled, Beacon Device can be used to validate the isolation.

Secure workstation network

Industry network

Beacon Application can be installed in clouds and is used to test isolation in VPCs or individual service deployments.

Industry network

Security camera network

Security Camera Networks are usually firewalled, Beacon Device can be used to test isolation.

Security camera network

Management network

Isolation in Management networks is usually layered. Beacon Device or Beacon Virtual can be used.

Management network

Dedicated workstation

Needs and means to isolate dedicated workstations can be strong - use Beacon Application to make sure they stay strong.

Dedicated workstation