Great Bay Network Intelligence PlatformTM

Unmatched visibility. Real-time validation. Flexible enforcement.

The Great Bay Network Intelligence PlatformTM provides real-time visibility into all network-connected endpoints, including traditional, IoT and medical devices, across complex wired and wireless networks—even identifying unmanaged and unauthorized devices. By collecting and modeling real-time and historical, contextual endpoint data, the platform enables IT, Security and Operations teams to identify all devices on the network in real time, determine location, monitor behavior and actively respond to anomalies.

Explore the Features

Thousands of Pre-Built, Device Profiles
Thousands of Pre-Built, Device Profiles
Unmatched Visibility
Leverage thousands of pre-built and crowd-sourced endpoint profiles to automate device discovery, identification and validation to a proven scale of 1.5 million endpoints.
Multiple Data Collection Sources
Multiple Data Collection Sources
Unmatched Visibility
The platform collects a rich set of endpoint data attributes that are native, non-intrusive and include both active and passive sources, including DNS, DHCP, SNMP traps + polls, IP Helper, wireless controllers, NetFlow/J-Flow/sFlow, Port Mirroring/SPAN, Active Directory and RADIUS Accounting.
Endpoint Behavior Monitoring + Analytics
Endpoint Behavior Monitoring + Analytics
Real-Time Validation
The platform continuously monitors endpoint and network attributes to verify device identity and identify high-risk changes that may require automated remediation or security team action.
MAC Spoof Detection
MAC Spoof Detection
Real-Time Validation
The platform's behavior monitoring and IP-to-MAC address mapping for each network-attached device enables the real-time detection of frequently moving or duplicate MAC addresses, an indicator of a MAC spoof attempt in progress.
Location Awareness
Location Awareness
Unmatched Visibility
Rich, data collection sources provide additional context for network-connected endpoints, including the MAC vendor address, IP address and physical location.
Automated, Active Response Actions
Automated, Active Response Actions
Flexible Enforcement
Automate response actions, such as network interface actions, re-authentication, system-level alerts, device quarantine or even blocking network access—whenever an unknown endpoint or anomalous behavior is detected.
Secure, Network Authentication for All Endpoints
Secure, Network Authentication for All Endpoints
Flexible Enforcement
Achieve granular network security with MAC Authentication Bypass (MAB), which auto-authenticates all endpoints—even those that don’t hold a supplicant and aren’t supported by traditional 802.1X systems.
Industry-Leading Platform Integrations
Industry-Leading Platform Integrations
Real-Time Validation
Platform integrations enable IT, Security and Operational teams to augment existing applications—like asset inventory management and BI systems—with rich, contextual endpoint data.
Great Bay Network Intelligence Platform - Network Topology

Endpoint Visibility

Understand what endpoints—traditional, IoT and medical—are connecting to your network, where they are located and how they should behave—in real time.

Asset Inventory + Onboarding

Give your team time back by maintaining an accurate, automated list of network-attached endpoints, including managed and unmanaged, authorized and unauthorized devices. Automate network authentication and streamline device onboarding.

Great Bay Network Intelligence Platform - Dashboard
Great Bay Network Intelligence Platform - Endpoint Events

Real-Time Threat Detection

Prevent threats from wreaking havoc in your environment by detecting network intrusions, rogue devices and anomalous endpoint behaviors in real time.

Flexible Enforcement

Take incident response timelines from months to hours with flexible, automated enforcement capabilities that speed remediation workflows, maintain network availability requirements and ensure security compliance and continuity.

endpoint
lurielogo

“We wouldn’t be able to have an 802.1X secured environment
without this tool.”

Chris Dozois, Manager of IT Network and Security Infrastructure

fortune500

“Great Bay’s agentless approach lets us automate the security of all devices, including the more than 70% of all network devices that don’t support the installation of an agent. It’s reassuring knowing that we have the most comprehensive, real-time monitoring in place to stave off attacks and prevent security breaches before they happen.”

Director of IT

airacademy

“During our evaluation we gave several vendors a look, but there was no equal in the industry to the behavior endpoint level reporting that Great Bay Software delivers across all user and non-user devices.”

Jeremy Taylor, Network Manager

sudbury

“Great Bay gives our entire team the peace of mind that we won’t miss any network issues. It provides us the high-level visibility we need to easily identify and address issues in real time.”

Jeff Scott, SCADA Specialist

fortune500

“Without Great Bay in place, there would be no possible way to keep track of the 500,000 endpoints on our network.”

Director of IT

rainforrent

“Great Bay Software gives us additional layers of protection that unfortunately most people don’t event think about.”

Patrick Stephens, Chief Information Officer

sudbury

“Great Bay is a key, foundational component in our secure network infrastructure.”

Aaron Green, Senior Network Specialist

Dive Into Our Resources

Endpoint Visibility, Validation + Enforcement

Pediatric Hospital Secures All Medical Devices

Live Demo: Version 6.1 Network Intelligence Platform

Dive Into Our Resources

Endpoint Visibility, Validation + Enforcement

Pediatric Hospital Secures All Medical Devices

Live Demo: Version 6.1 Network Intelligence Platform

Ready To Learn What’s On Your Network?