San Clemente, Calif. – Sept 1, 2019 – Invysta Technology Group, a developer of multi-factor access and authorization technology, today announced its entry into the cyber security market for protecting access to consumer, corporate and government networks, websites and email servers.

Invysta’s Anonymous Access Key technology is aimed at the Identification and Authentication As a Service (IDaaS) market and integrates multi-factor physical computing device validation  into the process for allowing and restricting endpoint device access to personal, corporate and government networks, websites and email servers.  The technology creates and maintains a unique physical identification profile of each device being used to request account access.  This unique identification profile becomes the Anonymous Access Key and is regenerated and matched during the account access process to the key stored in the Validation Database at registration.

Said Gary Streuter, President of Invysta Technology Group: “Our Anonymous Access Key technology provides a powerful perimeter protection tool for Information Technology (IT) groups seeking to ensure that access to their important networks, sensitive documents and network servers is tightly controlled and only granted to their intended users with authorized computing devices.  The reliance today on a username and password to gain access to a network or account has proven to be inadequate and has become easy prey for sophisticated hackers around the world.  The introduction of Anonymous Access Key technology to the authorization process is a paradigm changer, as it introduces physical elements of the computing device seeking account access into the authorization process, thus returning control of network and account access to IT management. By adding a hardware element to the access authorization process as another layer of perimeter security, the hacker is moved from their digital comfort zone to one where simply having breached user credentials does not allow them to gain access to networks or accounts”.

The technology will rapidly be expanded to other markets in need of additional levels of security and protection.  These markets include credit/debit card processing, corporate and government networks, home router protection, banking transactions and select device applications within the Internet of Things.