FAQ letters over abstract globe

Not sure if Firmguard is right for you?

FirmGuard’s suite of features gives MSPs control of their clients’ firmware security, all without creating a headache for you, your techs, or your clients. 

Imagine being able to know for certain that not only is EVERY layer of your clients’ networks truly protected, but now you can say with certainty that you ARE protecting your clients better than any other MSP. 

We’ve compiled a list of the most commonly asked questions when it comes to FirmGuard, so you can make an informed decision on protecting this at-risk security layer.

 

FirmGuard Frequently Asked Questions

As an MSP, you are certainly driven to protect your customers from hackers, reduce cybersecurity threats, and help them thrive with technology. You say you’re protecting your clients’ network from end to end. However, for the majority of MSPs, there is one glaring hole in the security stack you provide your clients with that leaves them vulnerable. By not addressing this vulnerability, you’re also putting your reputation at stake, your integrity on the line and inviting your competition to easily  
walk in and steal your customers – all without you knowing or even meaning to.  
 
That glaring security gap is BIOS firmware, which is the very first software that comes up when you power on an endpoint. The fact is that 99% of small businesses are NOT PROTECTED at the BIOS firmware level from cyber-attacks. 
 
By using FirmGuard, MSPs can proactively protect their clients’ systems from these types of attacks and provide them with greater peace of mind. 

Phoenix Technologies was the very first independent BIOS firmware vendor and has been in business since 1979. As a result, we know firmware!

 

Phoenix has over 180 patents, trademarks and copyrights in the firmware space and deep industry partnerships with companies such as Intel, AMD and Arm. Additionally, Phoenix participates in a broad spectrum of firmware and firmware security organizations such as the Unified Extensible Firmware Interface Forum (UEFI) and the Trusted Computing Group (TCG).

Yes, each endpoint must have the FirmGuard agent deployed on it. The FirmGuard agent runs as a Windows service and is very light weight.

 

Customers typically deploy the FirmGuard agent with their RMM and we have had customers deploy 100s of endpoints in one sitting. We provide PowerShell scripts and the like to make installation seamless and efficient. You will find FirmGuard easy to deploy.

No, FirmGuard will work with any endpoint no matter which vendor implemented the BIOS software. Our customers use it today on most any endpoint you can imagine: Dell, HP, Lenovo, Asus, and even custom-built machines.

Right now, FirmGuard is focused exclusively on Windows endpoints. Any Microsoft supported version of Windows for laptops, desktops or servers will work with FirmGuard.

 

We do have a definitive roadmap and plan to support other types of firmware such as for Linux, MAC and networking devices in the future.

UEFI stands for Unified Extensible Firmware Interface and is pronounced as “U-E-F-I” or sometimes “U-FEE”.

 

Simply put, it is the modern standard for BIOS and has been around since 2005. When you hear someone say “UEFI” just think they are talking about BIOS firmware.

 

Phoenix was a founding member of the UEFI Forum (the standards body for UEFI), and we still serve on the board today. In fact, we also chair the UEFI Security Response Team (USRT) which is the group that gets the first alerts or input about new UEFI vulnerabilities.

For a comprehensive list of current and past attacks please visit: 

 

https://www.phoenix.com/security-notifications 

UEFI BIOS malware is widely viewed as an extremely dangerous vector for implementing cyberattacks, as it is hard to detect and can survive security measures such as operating system reinstallation and even hard disk replacement.  

The Latest From FirmGuard