With the increasing reliance on technology, and the raise in cyber threats to your privacy and information we need to be more attuned to safeguarding our computers, phones, tablets, pc’s and more.
For many years we have relied on usernames and passwords to protect our digital accounts, but as most of you know that is not adequate. Usernames, passwords, and double authentication simply does not do the job anymore. We meet up with Gary from Invysta Technology Group, who shares with us some of the newest technologies that provide secure account access to your smart devices.
Harry Brelsford 0:05
Hey, SMB Nation. This is a special treat Harry here with Gary. Gary, we go back. I mean, it's decade plus, I was gonna say storage, where the heck did we meet?
Gary Streuter 0:18
We met at CMS products, which was doing storage devices and backup, full system backup with external boot capability.
Harry Brelsford 0:29
Yep. So fast forward the movie literally a decade and you're in the security realm. I mean, you've always had a, you know, domain expertise in that. What is what's going on with the new company and Invysta Technology Group? What do you all do?
Gary Streuter 0:42
Well, what we're doing is we're really focused on doing one thing, but doing it very well. And that is protecting access to your important accounts and networks and devices. We started looking at this, my co founder and I pat price at work together at Western Digital, and then at CMS. And we, we started to see this trend towards massive hacks of people's accounts and the damage that they can do once they get in. And we got, we started asking ourselves one very simple question, why should every PC, Mac, tablet, and smartphone be able to get into my accounts. And so what we did is we started going back and researching. And we found that there are a lot of unique characteristics about each particular machine, both hardware and software identifiers that are within that device. And we use that to develop some patents which have now been granted, which allowed us to build an essence we build the DNA for the devices that you say you want to have access in your account. And even if they have your username, your password, your to two factor authentication, it doesn't matter, it has to pass this, this bar to get in it has to be the same device. And then we take those, we have an agent that goes out on each one of those devices that collects the identifiers. And then we do what we call the five levels of randomness, we have five levels of introduction of randomness into the process, which creates the key, the anonymous access key randomness is the thing that hackers hate the most, because they rely on a pattern. Yeah. When we get done with that, and part of the reason we call it an anonymous access key is that it has no relationship to the device that spawned it, or the account that requested it. So I when I compare it to is if you're walking out to your car, and you find a key on the ground, okay, you found a key, it's unmarked, where does it go? Yeah.
Harry Brelsford 2:52
So actually have I've seen keys on the ground? That's, that's a great analogy.
Gary Streuter 2:57
Yeah. And, you know, it is really opened our eyes to other opportunities to use it, we have two basic product lines, we're building off of that. One of them is called IC cipher, which is where we're using the technology to protect access to IoT devices in your home and office. And the other is Invista safe, which is where we basically protect websites. But you know, I mean, basically, our server, or our what we call our gatekeeper server, on a large company would get integrated into their architecture. But we also figured out that small and medium businesses may not be able to accommodate that. So we've set up now where we can actually run a virtual gatekeeper for each of these small and medium businesses. And we're focusing that effort initially on those websites that are built on WordPress, WordPress, WordPress is about 40 some odd percent of the websites that are built in the world. And it's a it's a, it's an awesome tool. There's 50,000 plugins out there. But it's also not very safe, secure, it's not known to be that. Yeah. So. So what we did was we developed a plugin, and that plugin simply gets loaded into the WordPress website for our customer. And then when the access request comes in, it redirects it out to our virtual server. And we go through the process of identifying that device and allowing access based on its match to the key
Harry Brelsford 4:38
on your site, folks, the URLs in the blog below. So click on over and give them a give them a fair shake. basic question. Are you at market can can I buy this technology today? Or are you coming up on a launch,
Gary Streuter 4:55
we're coming up on a launch towards the end of this quarter into the SMB space. We've also we've also been talking with a number of companies that do IoT security devices. Yeah.
Harry Brelsford 5:07
Yeah. So good. Good on you. Well, let's do this. Let's, let's talk again when you're at launch, okay, let's be great. And we Yeah, get the readership go on. I mean, you know, I feel like my mom when I tried to explain what I did back in the server days, and God bless my mom, but you know, I had I had to use simple examples to maybe make the point. You're over my head. So it's gonna take a second visit, man.
Gary Streuter 5:38
We're always glad to talk to you Harry.
Harry Brelsford 5:40
All right. Have a good one. Thanks, Gary.
Gary Streuter 5:43
Take care. Bye.