Top Security News

iVALT Builds Upon IoT Security Measures and Smarter Device Management

2024-06-18IoT Evolution Expo 2344

Let's talk about iVALT and IoT.

The company's M.O. is clear: Disrupt what's termed "the evolving identity market" with iVALT's signature "1-Click Solutions." iVALT verifies five key factors of identity - device ID, biometrics, location, time window and app code - for enterprise access, customer interactions, physical access and, of course, IoT. By bolstering these intricate security layers, iVALT provides strong identity verification capabilities that aim to smirk, so to speak, in the face of relentless data breach activities, escalating hacker attacks, costly ransomware demands and even newer deepfakes that are becoming as dangerous as they are sophisticated.

iVALT writes about how "over $170 billion was spent last year in cybersecurity, yet some of the biggest failures came from the "weakest link in cybersecurity" - a simple phone call by a hacker. Caller ID is easily spoofed, SIM swaps are common, KYC can be compromised and hackers are decisive and highly skilled in just using psychological manipulation to get what they want. Thus, the iVALT mobile app empowers customer-facing workers to demand clear identity on any call (including biometrics) in 1-click."

It seems that enterprises implementing iVALT are more likely to circumvent damaging breaches, shifty social engineering tactics and more.

We'd typically feature a story like this on one of our sister sites like MSP Today, for instance.

So, why IoT?

Well, due to an unfortunate rise in attacks on a global scale, cyber experts are placing additional focus on IoT devices and IIoT's many industrial control systems (ICSs). For example, Rockwell Automation - our latest Rockwell coverage can be found here - recently provided new advisements regarding ICSs and their respective connections to the internet. The reasons for this? Potential theft of authorized credentials, lackadaisical sharing of passwords (or just straight-up default passwords still being used), vulnerable remote access points, and so on.

This is why iVALT's "1-Click, Zero Trust" methods work. With iVALT, an employee's mobile phone number becomes their user ID and iVALT can then support them with differing login workflows to create a completely customizable experience that isn't reliant on older password-based methods. Integrating iVALT reportedly only takes hours (rather days, or even weeks) and the device-to-device authentication can feel like it was made for devices proliferating the IoT space.

Take another example, this time from the TWAIN Working Group (TWG). TWG's Chairperson Joseph Odore describes how "TWG takes information security very seriously, and we're extremely excited to engage with iVALT as they guide us on the technologies required to achieve the absolute highest level of security for network-attached IoT document scanners and multifunction devices." Odore went on to detail how use cases can even include MFA, geofencing, dynamic passwords that adhere to the latest NIST standard of the U.S. Cyber Trust Mark regulation, and much more.

"You shouldn't have to choose between securing your business and giving employees the access they need to get their work done," stated iVALT CEO Baldev Krishan, PhD in a follow-up. "Proper device management and security updates, coupled with iVALT's identity verification will greatly reduce these attacks and prevent identity impersonations from gaining access. iVALT can also prevent social engineering and deepfake attacks from hackers calling in and impersonating authorized users to gain access to information, initiate actions, or steal credentials." Learn more about iVALT's future-proofing device security approaches

here.

Edited by Greg Tavarez




0 Comments


Post a Comment

Scroll to Top