The Spread of Malware

The True Evil of Malware There is a massive effort to prevent the intrusion of malware on devices and, while that may or may not pan out, at Bear, we wonder if that is the root issue.  It used to be the case that malware attacks would infect a network and rapidly...

The Hospital Edge

Spending On What You Want We have spent considerable time discussing how our product works from a technology perspective.  That is useful for those trying to copy our product (grin…right?) but we have yet to really focus in on what is important from a market...

Moving Beyond Firegates

The Bear Flow Bear provides a unified client agent that works across operating systems and numerous types of devices from bare metal to the cloud.  Within this general paradigm, Bear enables Active Directory-like authentication, authorization, and auditing/accounting....

System Health

Physical Health “You’ve Got Me…Who’s Got You?” Lois Lane, Superman Very often in the context of enterprise systems, the focus is on the applications running.  Behavioral security, data visualization and even endpoint management and...

Securing The Edge

Securing Smart Devices To protect the rapidly growing edges of large networks like those found in the IoT, it is important to work with a new paradigm.  This blog post will first cover the basic tenants of that model and then show how Bear secures the edge. New...