Invysta Management Console

Invysta works closely with business and government  IT management groups. In an effort to provide them tools that enable the highest level of user support, we offer a management console for use with our  Anonymous Block Key technology.  This management console  provides IT management complete control of the physical computing devices which are allowed to access their networks and accounts.  The IT management console provides for user customization and allows IT groups to configure their exact requirements for access to their networks and accounts.

Some of the major features supported in the management console are:

  • Registration of authorized computing devices in the facility or field
    • Remote computing device registration using one-time registration code
    • Physical computing device registration by IT personnel
  • Immediate removal of an individual device’s authorization for account access
    • Disgruntled Employee
    • Termination
    • Lost Device
  • A nuclear option for removing access authorization for groups of devices, in the event of a major cyber security incident
    • Remove network access from registered devices at Department Level
    • Remove network access from registered devices by Geo Location
    • Nuclear Option – Remove network access from all registered devices
  • Notification of the user credentials used to seek access from an unauthorized device
    • Ability to quickly identify and reset breached credentials
  • Logging of IP address used for each attempted access to the network
    • For devices that were authorized and did connect
    • Defines where unauthorized access attempts were made
    • IP Address can be used as a distinctive identifier limiting access to only that IP Address
  • Invysta is also exploring related Anonymous Block Key technology that will enable law enforcement agencies to track and identify the sources behind unauthorized account access attempts.  While in its early stages, we believe this technology can be very effective in reducing criminal cyber activity