Discover the benefits of beem using different examples from everyday working life and find out how it can protect you against cyberattacks.
You quickly check your e-mail, research something online or search for an app. A moment’s inattention or simply bad luck is all it takes, and suddenly you’ve accidentally clicked on a phishing link, caught a virus or installed some other malware on your laptop or smartphone.
Phishing sites steal personal data, logins and payment information and often serve as a gateway for malware. Malware – picked up via phishing, on websites or from e-mails – can cause serious damage. Viruses, spyware or trojans can spread rapidly from a single device to a whole company network, stealing or encrypting data and potentially bringing your entire business to a standstill.
Passwords are hacked on a regular basis – particularly when weak passwords are used or when the same password is used for multiple systems. Even Multi-Factor Authentication methods offer little protection nowadays. What was considered extremely secure a few years ago is no longer adequate in the age of AI.
Hackers can have a field day with stolen passwords. They can use your identity and commit crimes in your name or steal money from accounts and credit cards. Stolen passwords can also often give hackers access to customer and company data. This data is then encrypted, stolen, sold, published or used for extortion purposes. Hackers can even gain access to your network using stolen passwords and then spread malware throughout your organisation.
Your network connects your computers, servers, printers, smartphones and company data. Your firewall protects your network by monitoring traffic and blocking unwanted data based on security policies. Your firewall must be kept up to date at all times in order for you to remain protected against the latest threats. However, firewalls are often not updated immediately, and update settings differ for each company site. Moreover, a traditional firewall addresses only a fraction of the relevant security risks.
The ongoing maintenance of firewalls and network settings requires highly qualified personnel – which not all companies have. In addition, maintaining settings and security guidelines is often a tedious task that has to be repeated in each individual company site. Consequently, firewalls are often run on outdated software and inconsistent settings, which can easily be exploited by attackers. Operating systems and application software, for instance, undergo changes so frequently that managing the implications for company security becomes nearly impossible.
All companies are attacked by cybercriminals and all companies have employees who make the occasional mistake. Many such attacks and incidents are averted, but some remain undetected.
Undetected cyber incidents – whether caused by hackers or employees – can cause major damage. Employee misconduct can result in the loss of company and customer data and have both legal and financial consequences. Undetected hackers can distribute malware, steal data, misuse your company for illegal pursuits, interrupt your business activities or completely paralyse your operations.
Smartphones, laptops, and tablets enable us to work efficiently from anywhere. However, if a laptop bag is left behind on a bus, or a smartphone is stolen from a jacket pocket, the consequences can be severe.
The new owners of stolen or lost devices that are not properly protected can potentially access company and personal data.
All remote employees, whether in the field, on a construction site, visiting a customer, travelling on business or working from home, need access to relevant documents if they are to be able to work effectively. However, many employees do not have secure remote access to data, such as bills of material, blueprints, presentations, e-mails, orders or delivery notes. Consequently, unless they plan ahead and save documents locally onto a laptop or tablet, they can find themselves unable to retrieve the documents they need while on site.
Employees often get creative in a bid to ensure they can still work effectively when away from the office. They save data on USB sticks or in public clouds, send it to their private e-mail address or save it on private laptops and smartphones. Company data can consequently spread uncontrollably, to the extent that the company loses oversight, rendering even advanced protection mechanisms for storage locations and systems ineffective.
Malware can be installed accidentally in the blink of an eye – it can hide in e-mail attachments, be downloaded in the background of websites or disguise itself as a seemingly legitimate tool such as a ZIP file, PDF converter or video player. Malware such as viruses, spyware or trojans can spread rapidly from a single device to a whole company network, stealing or encrypting data and causing serious damage.
How things work with beem
When employees connect to beemNet, this analyses the data traffic and automatically detects and blocks malware. You can therefore prevent your employees from inadvertently downloading malware. Swisscom automatically keeps beemNet updated every day with knowledge about the latest malware.
Employees regularly receive bogus SMS messages and e-mails containing information about supposed mail items, fake account alerts or spoof invoices. The links in these notifications direct the reader to fake websites, which steal personal data, passwords and credit card details. Given that the use of AI makes it increasingly difficult to see through phishing attacks, it is virtually impossible for employees to detect all attacks.
How things work with beem
Since all data traffic passes through beemNet, requests to open websites are checked and fraudulent websites are immediately identified and blocked. Your employees are therefore prevented entirely from accessing such phishing websites, irrespective of whether the phishing link they click on is in an e-mail or an SMS, and no matter whether they are using a smartphone, tablet or PC. Swisscom ensures that beemNet is automatically and continuously updated with information about the latest phishing sites.
Field employees, in particular, are often reliant on public or third-party WLAN networks – whether at their assignment location, at the airport or in their hotel. Data traffic on public WLANs can be intercepted or eavesdropped on by others, meaning that activities and content can be spied on; for example, passwords, bank details, personal messages or company data.
How things work with beem
Even when on third-party WLAN networks, you can use the beem app to connect to beemNet from a smartphone, tablet, PC or Mac. This ensures that your data traffic is encrypted and not visible to third parties, and protected by beemNet.
Your laptop, smartphone or tablet is normally assigned an IP address that is visible online. This enables other companies, advertisers or organisations to track your movements on the Internet and use the information for targeted advertising – as well as for cyberattacks.
How things work with beem
In beemNet, your device is automatically made anonymous on the Internet, as the IP address is concealed (IP cloaking). Moreover, all your data traffic can be encrypted using the beem app and you can choose to also block advertising and trackers. These measures make it harder for third parties to analyse your online behaviour and identify patterns in your data traffic.
Some websites or web applications are not trustworthy or are outdated and therefore unsafe. However, for certain companies, it may be essential to access them, for example. Processing data via these websites or uploading and downloading files is a potential cyberthreat. To overcome this challenge and protect your business optimally, advanced security technologies are required.
How things work with beem
beem makes it possible to browse websites with unknown or problematic security profiles in an isolated environment, away from the client operating system (Remote Browser Isolation). At the same time, actions like uploading and downloading files can be blocked, or the website can be set to a read-only mode. This ensures protection against data loss as well as unknown cyberthreats (zero-day exploits).
Many companies use network-compatible printers, scanners, cameras or smart home devices that are connected to the company network. In order to enable automatic processes and digital working methods, a lot of these devices are accessible from the Internet. Such devices are often poorly protected, as they allow neither security software installations nor operating system updates. Security vulnerabilities and outdated operating systems can be targeted and exploited by attackers in order to access device or machine data or to stop device operation entirely.
How things work with beem
If your company site is connected to beemNet, this will automatically protect all connected devices at the site. beemNet inspects the incoming and outgoing data traffic. If someone online tries to access devices at your site, suspicious or unauthorised access attempts are automatically blocked.
Essential operating system updates, which eliminate security vulnerabilities, are often dismissed and postponed by employees. Cybercriminals exploit vulnerabilities like these to launch attacks. Security vulnerabilities in the operating system of devices can be dangerous for the entire network and thus for your data, as attackers often use them as a gateway into your network, so that they can steal data or paralyse your operations.
How things work with beem
Thanks to beemNet, you can define minimum requirements for devices with Windows, MacOS, iPadOS, iOS and Android to allow only certain up-to-date operating systems. This makes it impossible to access beemNet, and in turn your company data and networks, using unauthorised or outdated operating systems, which means that the risk of insecure or infiltrated devices is reduced and the devices on the company network have solid basic protection.
Employees access company data from company devices as well as private smartphones and laptops – whether this be through e-mails, the ERP system or documents. With private devices just as with business partners, you often have no control over device security; for example, whether the storage is encrypted, whether a strong login is being used, or whether the operating system is up to date and antivirus software is enabled. Consequently, it is possible for malware to enter your network through devices or for an unauthorised person to gain access to your company data when a device is lost.
How things work with beem
Zero Trust access to business applications in beem enables you to set requirements for any computers, tablets and smartphones that users wish to use to access company data. For example, you can put a restriction in place to allow only client devices with an up-to-date operating system, encrypted storage, a strong login and an enabled antivirus program to access your ERP and CRM systems or your file store. These guidelines apply to both company-owned and private devices, and even to devices belonging to business partners.
It is not uncommon for laptops, tablets and smartphones to go missing – because they are lost by employees or stolen by thieves. Once in possession of a device, third parties can often gain easy access to company data; for instance, if the data is stored on the device or if systems and data are accessible from the device.
How things work with beem
With beem device management, you can manage your employees’ devices centrally – and this applies to both company devices and private devices used by employees for business purposes. If a device is stolen, you can therefore block the device or erase its data, and you can choose whether to erase all the data from the device or just the company data.
The Internet of Things (IoT) enables physical objects and devices to be connected to the mobile network in order to exchange data. Typical IoT applications include sensors, actuators, surveillance cameras and trackers for vehicles and shipping containers. Networking IoT devices can often be risky, however: IoT devices commonly have outdated software, do not communicate over encrypted connections or are exposed on the Internet. In most cases, their data traffic is not automatically monitored. As a result of this poor protection, Internet of Things (IoT) devices and Machine-to-Machine (M2M) communication can be the subject of targeted attacks aimed at extracting or falsifying information or taking control of the devices.
How things work with beem
All SIM-enabled devices can be connected securely to beemNet, rather than being connected to the public Internet. The devices’ IP addresses are anonymised on the Internet so that it is virtually impossible for a third party to find them. In addition, all IoT devices connected to beemNet are visible in the beem management portal, and can be individually grouped. The grouping arrangement can be used to determine individual and comprehensive security guidelines for each group; for example, to restrict communication to legitimate end points and monitor the transferred data.
In some cases, you might want to allow unspecified client devices to have controlled, secure access to selected company data and business applications. For example, so that if there is an emergency when employees are on holiday, they can use a public PC or iMac in a hotel lobby or any other device that is available. In other cases, it might be necessary for a third party, such as a customer or partner, to be able to access certain data and systems securely and easily online, without having to install special apps or requiring time-consuming configurations.
How things work with beem
With the beem Business Application Portal, you can enable secure access to specific company data or applications, without the user needing to install the beem app or any other software. Users access the Business Application Portal from their web browser and complete the authentication process. They receive a selection of web applications which they are permitted to access and/or remote access to specified servers and business applications. It is also possible to integrate older applications without a web interface in conjunction with Apache Guacamole. The beem Business Application Portal supports three remote desktop protocols, which control computers remotely:
In order for remote employees to carry out their work effectively, whether in the field, on a construction site, visiting a customer or working from home, they need secure access to data. Employees often get creative if there is no user-friendly solution available. They copy data onto USB sticks and hard drives, send it to private e-mail addresses or upload it to online storage services.
How things work with beem
The Zero Trust access to business applications in beem enables you to allow employees secure access to data and systems from wherever they are – whether the data is stored in the cloud or on a server at your company site, and irrespective of whether employees are accessing data from your site, their home office or on the move.
In order to enable remote access to the company network, many companies set up a Remote Access Service (RAS) using VPN technology. This allows employees to access the company network from anywhere via an encrypted connection. VPN solutions are commonly expensive, not easily scalable and slow. Companies often use VPN solutions with compromised security, or solutions that direct data traffic via infrastructure abroad. VPN solutions also pose a significant risk: anyone connecting to the company network via a traditional VPN is granted access to all data and systems on the network – and this includes attackers. In addition, in a traditional VPN, access authorisation is checked once and then usually lasts for one or more days. This means that if an attacker gets into your company network via the VPN, they can steal or manipulate data or even distribute malware, for example.
How things work with beem
beem gives you Zero Trust access to your business applications and company data. Zero Trust is based on the premise of “never trust; always verify” and means, in practice, that users only gain temporary access, under the strictest of security measures, to selected business applications or company data – but not the entire network. With beem, access authorisation is checked continuously based on several parameters that you can set individually for each business application and user group. This means that access can be restricted to Switzerland, the Swisscom network or even to defined working hours, for example. The finely tuned Zero Trust access policies applied with beem reduce the risk of unauthorised access, prevent attackers from dispersing through the network and thus increase your operational reliability.
Cyber incidents can be caused as much by employees responding to e-mails while on holiday as they can by cybercriminals controlling attacks remotely. On the one hand, some industries are subject to strict guidelines, which stipulate, for example, that company and customer data must not leave Switzerland. Furthermore, most cyberattacks originate from abroad.
How things work with beem
With Zero Trust access, beem enables you to restrict company data access based on geographical location, among other factors. This alone is sufficient to prevent many malicious attempts by hackers and organisations to access your company data. It can also facilitate the implementation of regulatory requirements.
Business partners often need access to specific company data or systems; for example, software suppliers, outsourcing partners or trustees. Exchanging the required data is usually a complicated process. As a company, you have no control over whether your business partners use exclusively secure devices to access your network and, most of the time, it is not possible to restrict access to individual systems or data.
How things work with beem
Mit dem Zero-Trust-Zugriff von beem können auch Ihre Geschäftspartner sicher auf ausgewählte Daten und Systeme Ihres Unternehmens zugreifen. Zudem gelten auch für die Geräte Ihrer Geschäftspartner die gleichen Sicherheitsvorschriften, wie für Mitarbeitende. So stellen Sie sicher, dass auch Geschäftspartner nur mit sicheren Geräten auf Ihre Unternehmensdaten zugreifen. Zudem bietet Ihnen das beem Application Access Portal die Möglichkeit, dass Benutzer auch mit unbekannten Geräten sicheren Zugriff auf Ihre Daten und Anwendungen erhalten.
It is often for reasons of convenience, or indeed ignorance, that employees save company data on cloud services, send it over communications apps or enter it into tools that do not comply with your internal guidelines or regulatory requirements. As a company, you have no control over what happens to this company data, and it is often stored and processed outside of Switzerland or the EU.
How things work with beem
beem allows you to block the use of specific online services and apps. You can therefore prevent your company data from being stored or processed in unauthorised places. In addition, with beem Analytics, you receive a detailed overview of the Internet tools or other unwanted, or even dangerous, applications that are being used by users. This helps you to improve your security regulations and technical policies in order to eliminate or avoid shadow IT.
Many companies use business applications for which the manufacturer has stopped providing security updates. These companies are, however, reliant on these applications in their day-to-day operations, so it is not a simple matter of shutting them down or replacing them. Cybercriminals love this – because they can exploit known security vulnerabilities.
How things work with beem
With Remote Browser Isolation, beem allows you to run outdated web-based business software in an isolated environment, away from the client operating system. This means that your legacy web application is opened in a secure environment, where cybercriminals are unable to exploit known security vulnerabilities in the legacy applications. You can also use the beem Business Application Portal to uncover additional use cases.
For many employees, working in company systems and with customer data – for example, viewing customer data or processing orders – is an everyday activity. However, employees should not pass any customer data into the wrong hands – either knowingly or unknowingly.
How things work with beem
beem enables you to restrict certain system actions based on the sensitivity of the data; for example, to stop customer data from being exported from the CRM system or company data from being uploaded to private cloud storage. This helps you to prevent the leakage of personal and sensitive company data and ensure compliance with data protection regulations and duty of care obligations.
Even though certain business applications and cloud services may be generally permitted for non-critical data, employees frequently save sensitive data there – accidentally or maliciously. Furthermore, companies may want to prevent employees with access to cloud service data from being able to manipulate or download this data at will. Examples include Excel lists containing customer data held in the document store, particularly sensitive customer data in a CRM system that all employees have access to, or project documents on critical infrastructure stored on foreign cloud services.
How things work with beem
With API-based Data Loss Prevention (API DLP/out-of-band DLP), you can search previously stored data (data at rest) on cloud applications – for example on AWS, Microsoft Azure including M365, Google, Oracle Cloud or Salesforce – and, subject to your security and compliance regulations, you can track down data that has been wrongfully stored on the respective cloud applications and/or that is classed as sensitive. With API integration in cloud applications, you can also control who is permitted to manipulate the stored data, and in what way.
When onboarding new employees, IT specialists need to prepare devices in such a way that they are protected against cyberthreats and employees are able to use Internet services safely. Device and security settings are usually set individually for each device, and this is a time-consuming and error-prone process.
How things work with beem
With beem, administrators simply create a new user in the self-service portal and assign the appropriate beem user licence. It is possible to create user groups with specific settings, which makes it quick and easy to set up new users. The pre-defined, company-wide security guidelines at group level apply automatically to new employees and do not need to be configured individually. Employees connect to beemNet with their laptops, tablets and smartphones and are thus automatically protected against cyberthreats. In addition, beem offers a simple, completely integrated device management solution to automate the configuration of device security settings, install the beem app and manage the storage of business passkeys on devices.
Many employees use the same weak passwords again and again for all their applications. Other employees write complicated passwords on notepads, which they then keep under their keyboards. Multi-Factor Authentication is not an option with a number of software solutions, it is often not used and it is easy for attackers to outsmart. If an attacker manages to steal a login, this can open doors to a great many applications and thus to large quantities of company data – including customer data and business secrets.
How things work with beem
With beem, you can integrate your applications (CRM, ERP, HR etc.) into beemNet. This obliges employees to complete the authentication process in beemNet before they can log into and access the business applications. The authentication process in beemNet is based on current security technologies. These indirectly secure all access to your business applications, even if these only have weak logins.
Employees find it tedious managing the many different logins for different applications. According to best practice principles, employees are required to use a unique password for each piece of software, which means they have to memorise countless passwords. This, in turn, often results in passwords being recorded in Excel spreadsheets or on Post-it notes, or in the same passwords being used for everything. If these fall into the hands of attackers, they can be used to gain access to a wide range of business applications and company data.
How things work with beem
beem allows you to combine the integrated user management with your existing user management in order to enable Single Sign-On (SSO). Users then complete authentication in all business applications using the login in beemNet. The process does not involve a user name and password; it uses passkeys. In comparison to conventional login methods, passkeys are a significantly faster, simpler, more secure and user-friendly way of logging in using a PIN, a fingerprint or facial recognition.
A firewall is an important security technology implemented by most companies. It monitors incoming and outgoing network traffic and blocks unwanted or dangerous network traffic. Hardware firewalls are the most commonly used type and they monitor network traffic at the company site – either as a standalone device or integrated into the router. Firewalls must be kept up to date for them to maintain protection against the latest threats. However, security updates are time-consuming and are usually only installed days, weeks or even months after they are first made available for the device.
How things work with beem
With beem, you can leave the day-to-day protection of your networks in the hands of Swisscom’s team of security experts. If your sites are connected to beemNet, your networks, connected devices and users will automatically also be in beemNet and thus protected against cyberthreats. beemNet in Swisscom data centres in Switzerland is operated by Swisscom, updated every day and undergoes continuous development. You can therefore benefit, now and always, from leading security technology as well as automatically up-to-date protection against cyberthreats.
For companies with multiple sites, managing network, firewall and security settings can be a very tedious task. Settings often have to be repeated across all sites and when new sites are added, everything has to be configured from scratch. This often results in locations having inconsistent network and firewall settings.
How things work with beem
With beem, you connect all your company sites to beemNet – Swisscom’s secure company network offering comprehensive cybersecurity. If you open a new company site, you simply connect it to beemNet and your site is then automatically protected. Whenever individual changes are made in beemNet, these automatically apply to new as well as old sites. You can leave the task of day-to-day protection in beemNet to Swisscom’s team of security experts, who keep the system continuously updated and improved.
A connection to public clouds like AWS or Microsoft Azure is usually established via an Internet connection. This is relatively easy to set up, but it does come with risks: data can potentially be intercepted, listened to or manipulated, or cloud services can be the target of overwhelming DDoS attacks via the Internet. In addition, compliance and data protection rules can prohibit data transfers via the public Internet, or you as a company might require specific SLAs concerning bandwidth and data traffic performance. There are alternative ways of connecting cloud services directly to your network, but these are usually both complex to integrate and costly.
How things work with beem
Resolve this issue by combining beem with our modular solution for individual networking and communication: Enterprise Connect offers you cloud access, so you can integrate your public clouds directly into your infrastructure – easily, efficiently and with stringent SLAs in place. The data travels to your public cloud services via beemNet rather than the public Internet, enabling you to integrate AWS, Microsoft Azure and Swisscom Clouds into your infrastructure – easily, securely and with SLA guarantees.
Companies frequently have multiple sites that are connected by means of a Wide Area Network (WAN). This means that the servers can be accessed at all sites and data can be exchanged between the sites. It is often a challenge managing and maintaining cybersecurity in a WAN – due to the sheer number of devices that access a WAN, it is a formidable task to ensure adequate protection for all the data and grant network access to authorised persons and devices only.
How things work with beem
Resolve this issue by combining beem with our modular solution for individual communication and networking: with Enterprise Connect you can combine SD-WAN functionality (Software-Defined WAN) with the comprehensive security options in beem and acquire a complete SASE solution with additional features. You then simply implement access guidelines for your company network and restrict access to only trusted persons from specific places, with defined devices and data.
Many employees are unaware of how many cyberthreats they are exposed to on a daily basis – for instance, malware, phishing or information that third parties collect about them on the Internet. Many employees have a false sense of security because they don’t see themselves as a potential target, or they have blind faith in the notion that they are protected by their company.
How things work with beem
beem alerts users immediately with a push notification in the event of blocked content or cyber incidents. Employees also receive a personal Security Dashboard displaying existing warnings. This creates transparency and increases the level of awareness about cyberthreats.
Smaller companies, in particular, often lack the resources to invest in sophisticated cybersecurity or to employ an experienced security team to conduct 24/7 IT monitoring. As networks and IT infrastructures become increasingly complex, it is also becoming harder to detect unusual activity and anomalies. Connection data and/or logs are usually stored in varying formats on different devices and systems, which makes systematic analysis difficult and time-consuming. As a result, cyberattacks often stay undetected for a long time, and this can lead to serious damage.
How things work with beem
beem provides 24/7 automatic monitoring of data traffic in beemNet. beem Analytics clearly displays blocked content, anomalies and averted cyber incidents for your entire company. The data is generally aggregated and anonymised so that no conclusions can be drawn about any individuals. Only users assigned the highest authorisation level and/or with a legitimate interest can view transparent connection data. All user data and analyses for all networks are visible in a central location and can help security specialists to make targeted enquiries based on normalised data. With complementary solutions for threat detection – for example Swisscom’s Threat Detection & Response solution – you can also expand the analyses to include detection and mitigation capabilities.
Employees use countless applications, systems and services every day – from in-house CRM, ERP and HR solutions through to public web-based AI tools, online storage systems and social media platforms. However, most companies are unaware which applications or online services are in use. It is therefore difficult to establish security guidelines and prevent the use of unauthorised tools (shadow IT).
How things work with beem
With beem Analytics, you receive comprehensive reporting on the user data from systems, data and online services. The reporting shows anonymised data concerning all your users, aggregated across your entire company. This creates transparency, which in turn enables effective security guidelines and compliance requirements to be introduced and shadow IT to be prevented.
Cyber incidents can still occur in spite of modern security technologies – whether as a result of a cyberattack or following unwitting misconduct by employees. Analysing the impact and the affected data is often a complicated task. It is therefore difficult to inform customers, business partners or the Swiss National Cyber Security Centre (NCSC) about cyber incidents.
How things work with beem
With beem Analytics, you receive comprehensive analyses for all company sites, users, applications and data streams. This can facilitate investigation into cyber incidents, and help to create clarity about affected data and systems. This simplifies communication with customers, business partners and the NCSC, and can help companies to respond to a cyber incident quickly and in a purposeful manner. With complementary solutions for threat detection – for example Swisscom’s Threat Detection & Response solution – you can also automate this process.
Zero-day exploits are cyberattacks that exploit vulnerabilities in software and hardware, for which the manufacturer has not yet issued a security update and which are as yet unknown to security specialists. Zero-day exploits are very difficult to detect – even for modern security solutions. They require an in-depth understanding of one’s own network architecture, continuous anomaly monitoring, a rapid response and a well-prepared disaster recovery plan.
How things work with beem
beem defends against complex attacks, such as zero-day exploits, using artificial intelligence and machine learning to quickly and automatically detect anomalies and previously unknown cyberattacks.
Companies usually have no overview of user activities on SaaS and web applications and are unable to finely restrict transactions in business applications based on the sensitivity of the data. This makes it difficult to review compliance with regulatory and internal guidelines and can lead to unwanted data leaks. For example, employees might use social media platforms in a manner that is contrary to internal usage guidelines, accidentally or maliciously transfer confidential information to cloud environments or delete data that is subject to retention obligations.
How things work with beem
With the API-based Cloud Access Security Broker (API CASB/out-of-band CASB), you can use the APIs of SaaS and cloud applications to make transactions transparent, monitor them and control who is permitted to perform which interactions. This means you can analyse which user activities are being performed on social media platforms, CRM applications or cloud storage services, for example. In addition, beem allows you to restrict certain activities based on the sensitivity of the data or the retention obligations it is subject to, among other factors. This can help you to implement compliance rules and regulatory requirements more easily.
Protect your sites and users with beemNet.
We will call you. Now or at a time to suit you.
Contact us in writing