Is YOUR network IdentiPHY secure?
IdentiPHY passively and unobtrusively enables multi-factor device authentication.
|
Authentication for All Devices |
Novel Fingerprinting Technology |
Most enterprise device authentication solutions rely on the installation of a software agent or digital certificate. This type of authentication is infeasible for many legacy and low-power devices, especially the smallest IoT/IIoT devices.
Supports 10/100/1000Base-TX InterfacesMost devices auto-negotiate their communications rate to the maximum possible. IdentiPHY supports the most common wired Ethernet speeds.
|
IdentiPHY uses a patent pending technique to analyze the electrical signals emitted by a device for communications purposes to identify unique features, similar to human fingerprints. These features are then used to authenticate the device.
Custom Switch IntegrationThe IdentiPHY technology can be seamlessly added to existing network infrastructure or integrated into next-generation secure switch technology.
|
We configured ... our rogue access point to plug into their DHCP enabled production network via a vacant and active network jack.
- Tim Roberts, Principal Security Associate, Covert Entry Specialist, Dark Wolf Solutions
Beyond MAC Address Filtering
IdentiPHY reduces the mean-time-to-detection of rogue device introduction to a network from weeks/days down to just seconds. Unauthorized devices that remain connected to a network can provide an attacker with remote access to your network long after physically leaving your facility.
|
Spoofing the MAC address of an IP phone, printer, or SmartTV is as easy as reading it off the device and typing it into a mobile phone. This bypasses the only low-level security measures often in place. The attacker can now remotely access and move laterally through your network.
|