We're working on our self-assessments, and hope to have them here for you soon.
We prioritize and take environmental, social, and governance (ESG) considerations seriously in our operations and decision-making processes.
We are currently working with experts to put together our company policies. Please contact us for more details.
At BeeHive, our mission is to provide unparalleled cybersecurity to protect your environments, devices, and data. Since our inception, we've done exactly that, with a perfect track record. Zero threats missed, zero breaches not prevented in fully protected environments.
As part of our ongoing commitment to this mission, we continuously review and enhance our security measures to address emerging threats and potential vulnerabilities.
Recently, we have undertaken an internal review of certain third-party tools used for remote connections, remote management, and other remote access tools. While these tools serve legitimate purposes in general tech support and may even be, well-known in the IT industry, they also pose potential risks if exploited by malicious actors.
More specifically, in scenarios where pointedly privileged user credentials are compromised, these tools could be used to uninstall our security agents, thereby weakening your defenses. This is, not a vulnerability in the software itself, but a natural design flow of being able to uninstall as an administrator - the power of an administrator is still, nearly undefeated, on Windows systems.
To mitigate this risk and reduce the attack surface, we have made the decision to remove these tools from our safe lists and begin automatically flagging and quarantining them. This change will enable us to detect these tools as malware or classify them as unknown, ensuring they are not executed outside of containment and thus preventing the removal of our security agents.
We understand that some customers have concerns regarding the removal of these tools. Therefore, we are providing a list of the affected tools below. We believe it is crucial to communicate this change clearly and provide a reference point for any future inquiries.
- IObit.com
- IObit CO., LTD
- RealVNC
- uvnc bvba
- Remotesoft, Inc.
- RealVNC Ltd
- LogMeIn, Inc
- LogMeIn Inc
- LOGMEIN, INC.
- LogMeIn, Inc.
- LogMeIn Inc
- AWERAY LIMITED
- Sysgem AG
- NetSarang Computer, Inc.
- NetSarang Computer, Inc
- EduIQ.com Damjan Kriznik s.p.
- ZOHO Corporation
- Zoho Corporation Pvt. Ltd.,
- ZOHO Corporation private limited
- ZOHO Corporation private Limited
- Zoho Corporation Private Limited
- ZOHO CORPORATION PRIVATE LIMITED
- ZOHO Corporation Private Limited
- ZOHO Corporation
- BeyondTrust Software Inc
- ConnectWise
- ConnectWise, LLC
- CONNECTWISE, LLC
- Connectwise, LLC
- ConnectWise, Inc.
- Splashtop Inc.
- AOMEI International Network Limited
- Aomei Technology Co., Limited
- ChengDu AoMei Tech Co., Ltd
- CHENGDU AOMEI Tech Co., Ltd.
- Chengdu AoMei Technology Co., Ltd
- CHENGDU AOMEI TECHNOLOGY CO., LTD.
- PURSLANE
- German Gorodokuplya
- HuoRongBoRui (Beijing) Technology Co.,Ltd
- CRYSTAL RICH LTD.
- Crystal Rich Ltd
- Wen Jia Liu
- 一普明为(北京)信息技术有限公司
- Xi’an Expand Network Technology Co, Ltd.
- Open Source Developer, Marcin Szeniak
While these tools are not inherently malicious, their misuse by unauthorized parties poses a significant risk. To ensure the continued security of your systems, we are committed to taking any necessary actions. Should you require the use of these tools for your operations, we offer several methods for whitelisting them on a per-customer, per-requirement basis.
Thanks for trusting in us to stay watchful on your behalf, and let us know if there are any additional tools you believe belong on our blocklist.
If you need help using this Trust Center, please contact us.
If you think you may have discovered a vulnerability, please send us a note.