iVALT Builds Upon IoT Security Measures and Smarter Device Management


Let’s talk about iVALT and IoT.

The company’s M.O. is clear: Disrupt what’s termed “the evolving identity market” with iVALT’s signature “1-Click Solutions.” iVALT verifies five key factors of identity – device ID, biometrics, location, time window and app code – for enterprise access, customer interactions, physical access and, of course, IoT. By bolstering these intricate security layers, iVALT provides strong identity verification capabilities that aim to smirk, so to speak, in the face of relentless data breach activities, escalating hacker attacks, costly ransomware demands and even newer deepfakes that are becoming as dangerous as they are sophisticated.

iVALT writes about how “over $170 billion was spent last year in cybersecurity, yet some of the biggest failures came from the “weakest link in cybersecurity” – a simple phone call by a hacker. Caller ID is easily spoofed, SIM swaps are common, KYC can be compromised and hackers are decisive and highly skilled in just using psychological manipulation to get what they want. Thus, the iVALT mobile app empowers customer-facing workers to demand clear identity on any call (including biometrics) in 1-click.

It seems that enterprises implementing iVALT are more likely to circumvent damaging breaches, shifty social engineering tactics and more.

We’d typically feature a story like this on one of our sister sites like MSP Today, for instance.

So, why IoT?

Well, due to an unfortunate rise in attacks on a global scale, cyber experts are placing additional focus on IoT devices and IIoT’s many industrial control systems (ICSs). For example, Rockwell Automation – our latest Rockwell coverage can be found here – recently provided new advisements regarding ICSs and their respective connections to the internet. The reasons for this? Potential theft of authorized credentials, lackadaisical sharing of passwords (or just straight-up default passwords still being used), vulnerable remote access points, and so on.

This is why iVALT’s “1-Click, Zero Trust” methods work. With iVALT, an employee’s mobile phone number becomes their user ID and iVALT can then support them with differing login workflows to create a completely customizable experience that isn’t reliant on older password-based methods. Integrating iVALT reportedly only takes hours (rather days, or even weeks) and the device-to-device authentication can feel like it was made for devices proliferating the IoT space.

Take another example, this time from the TWAIN Working Group (TWG). TWG’s Chairperson Joseph Odore describes how “TWG takes information security very seriously, and we’re extremely excited to engage with iVALT as they guide us on the technologies required to achieve the absolute highest level of security for network-attached IoT document scanners and multifunction devices.” Odore went on to detail how use cases can even include MFA, geofencing, dynamic passwords that adhere to the latest NIST standard of the U.S. Cyber Trust Mark regulation, and much more.

“You shouldn't have to choose between securing your business and giving employees the access they need to get their work done,” stated iVALT CEO Baldev Krishan, PhD in a follow-up. “Proper device management and security updates, coupled with iVALT's identity verification will greatly reduce these attacks and prevent identity impersonations from gaining access. iVALT can also prevent social engineering and deepfake attacks from hackers calling in and impersonating authorized users to gain access to information, initiate actions, or steal credentials.”

Learn more about iVALT’s future-proofing device security approaches here.

Edited by Greg Tavarez
Get stories like this delivered straight to your inbox. [Free eNews Subscription]
Related Articles

IoT Security Experts at Exein Secure €15M in New Funding

By: Alex Passett    7/18/2024

Earlier this week, Exein announced that it has officially raised €15 million (approximately $16.3 million) in Series B funding, bringing its total amo…

Read More

Cellular and NTN Connectivity Boost for IoT: Soracom's Integration with Skylo Reaches Global Rollout Phase

By: Alex Passett    7/17/2024

Today, Soracom and Skylo have officially announced a new integration - this is happening because Skylo has progressed from Private Beta status to a gl…

Read More

Ceva-NeuPro-Nano NPUs Open the Door for Integrating TinyML Models into SoCs for AIoT Solutions

By: Alex Passett    7/16/2024

Ceva-NeuPro-Nano NPUs deliver a great balance of ultra-low power and high performance to efficiently execute TinyML workloads in consumer, industrial …

Read More

Financing AgTech and IoT in the Face of Climate Change: Verdi Expeditions Receives Investment from NEC X

By: Alex Passett    7/16/2024

NEC X, a Silicon Valley venture studio that invests in high-potential (and adaptive) technologies, is a new investor in the efforts of Verdi Expeditio…

Read More

Secure IoT Platform-as-a-Service Strategies, Courtesy of the ioXt Alliance

By: Alex Passett    7/11/2024

The ioXt Alliance has put forth a new series of strategies that both honor its existing ioXt Security Pledge and focus on comprehensively reinforcing …

Read More