Invysta Prime

Invysta Technology Group works closely with IT management groups within our customer base. In an effort to provide the highest level of support, we offer a configurable management console that provides complete control of the physical Smart Devices that are allowed to access their networks and accounts. The management console allows IT groups to configure the exact requirements for reporting and access to their networks and accounts.
Some of the features supported in the management console are:
- Registration of authorized Smart Devices in the facility or remotely in the field
- Remote using one-time registration code
- Physical registration by IT
- Immediate removal of an individual Smart Devices authorization for access
- Disgruntled Employee
- Termination
- Lost Device
- A nuclear option for removing authorization for blocks of Smart Devices in the event of a major cyber security incident
- Remove at Department Level
- Remove by Geo Location
- Nuclear Option – Remove all Smart Devices with access to the protected network
- Notification of the user credentials used to seek account access on an unregistered Smart Device
- Ability to quickly reset breached credentials
- Logging of IP address used for each attempted access to the network
- For Smart Devices that were authorized and did connect
- Define from where unauthorized access attempts were made
- IP Address can be used as a distinctive identifier limiting access to only that IP Address
- Invysta is also developing Anonymous Access Key related technology that will enable IT or Law Enforcement agencies to reach back and identify the humans behind unauthorized access attempts. This will be done through their association with the specific Smart Device used in the unauthorized access attempt. While in its early stages, we believe this technology can be very effective in reducing criminal cyber activity