San Clemente, Calif. – Oct 22, 2019 – Invysta Technology Group, a cyber-security developer of multi-factor access and authorization technology today announced that the company has won a 2019 Timmy People’s Choice Award for Best Tech Startup in Orange County Ca. Invysta’s patented Anonymous Access Key technology was selected from over 100 competing companies and won in the prestigious People Choice category. The Timmy Awards are hosted by Tech in Motion, a national event organization focused on bringing local tech communities together to meet, learn, and innovate. today announced that it has won a its entry into the cyber security market for protecting access to consumer, corporate and government networks, websites and email servers.
Anonymous Access Key technology is aimed at the Identification and Authentication as a Service (IDaaS) market and integrates multi-factor physical smart computing device validation into the process for allowing and restricting endpoint device access to personal, corporate and government networks, websites and data. The technology creates and maintains a unique physical identification profile of each smart device authorized for account access. This unique identification profile becomes the Anonymous Access Key and is regenerated in a Zero-Trust model and matched during the account access to the key generated when the smart device was registered.
Said Gary Streuter, President of Invysta Technology Group: We are very pleased to be selected by Tech in Motion as the 2019 Best Tech Startup in Orange County, Ca. This is a great honor and serves as recognition of the validity of our patented Anonymous Access Key technology.
“The reliance today on a username and password to gain access to networks or accounts has proven to be inadequate and has become easy prey for sophisticated hackers around the world. The introduction of Anonymous Access Keys to the authorization process is disruptive, as it introduces physical elements of the smart computing device seeking account access into the authorization process. Thus, control of network and account access is returned to IT management. By adding a hardware element to the access authorization process as another layer of perimeter security, the hacker is moved from their digital comfort zone to one where simply having breached user credentials does not allow them to gain access to networks or accounts” said Streuter.
We are grateful to have had the opportunity to participate in the Tech in Motion Timmy awards and look forward to working closely with their group as we expand the reach of our technology. Future security markets include credit/debit card processing, corporate and government networks, home router protection, banking transactions and select device applications within the Internet of Things.