“We will be launching the device in US very soon,” Amit Mathur, Ensurity Technologies

by November 6, 2018 0 comments

Written By: Divya Bishi

Amit Mathur, Chief Operating Officer, Ensurity Technologies talks about his company profile and secured portable data.

What is the product portfolio of Ensurity Technologies?

We are a Hyderabad based company and we are into existence for the past eight years. We got some projects from the government at that point in time and they were looking at voice encryption. We made voice encryptors which could be connected to PSTN lines and the conversations could be encrypted. Our strength has been encryption from the beginning and as the world started moving towards data we started working on data encryption.

In essence, we are a Research and Development company and then we kept on adding to our product portfolio from time to time. We created a hardware device calledEn4crypt L4 crypt which is an IPencyrptorwhich is FPGA based and no backdoors. This was primarily used by defence and other R&Dorganisations

What are the unique features of the device?

We felt the demand for secured portable data and then we created a secure USB with a biometric sensor and it was a completely encrypted device. The unique feature of this device is that once it is locked onto a port by the user or one network it cannot be used by anyone on any other network or. port Another product that we developed is related to securing the privacy of voice and chat apps. At a time when Whatsapp became popular, we created an app that could encrypt the chat and the voice messages completely and is extremely secure.

It works in closed user groups. Each session is encrypted with a different key and if a hacker gets on a voice call or chat, then he has to decrypt each session which is very difficult. Then we have features file tracking and locking so that a file is forwarded can be tracked or the user can restrict the receiver from forwarding the file.  The vapour feature can be programmed for automatic deletion by the user.

What will happen if someone tries to decrypt it?

In case someone wants to decrypt it, then they will have to get all the parts of the images. This technology is also useful for two-factor authentication. For instance during online banking transactions to secure OTP transactions with our app which helps in a) secure the data by splitting it into parts b) its consumer friendly-there is not much to and fro during transactions and c) the customer is aware where their money is been sent. All the details about these transactions appear on our app. These are the products which we have created largely in terms of security, privacy and data management.

How these USB devices would cater to the needs of the government sector?

In the past one and half years, we are focussing more on the enterprise side. We have highly secure USB devices that can be authenticated by a finger sensor on the device itself and can be locked to the port.

This is our ThinC range of USB devices with biometric authentication. We have recently launched this in India. ThinC will cater to the security needs of sectors like BFSI, large consultancy firms and enterprises; or any entity or activity that is dependent on remote access. The ThinC devices will be available in three variants:

  1. ThinC Vault (with capacity up to 128 GB): This will be the most secured shareable smart storage USB device with each user having his/her own pin-protected password.
  2. ThinC Compute: This variant boots a sanitized OS from the USB and blocks all ports and the operating system of the home device and allows the user to log in to a remote server securely.
  3. ThinC FIDO: This fast ID on-line (FIDO)-complaint variant will come with fingerprint password authentication. As the authentication happens only on the USB, the hacker will not be able to get to access the fingerprint template.

How safe is your device from other players?

Our device is activated by the user’s finger authentication. We have a special tool and the malware cannot detect our device. This device can be shared between 10 users and the storage partitions can be shared without access to others partitions. Partition policies between users can be defined as well. This device can be locked on to ports and safely secures organizations data. The device also comes with a management tool and can be managed by the admin in terms of erasing or securing some of the data. An additional FIDO compliance is also assigned to this device.

Who are supporters of this device?

First Identity Output or FIDO is getting supported in the US as a standard. We are receiving a high traction from countries like UK, Malaysia, Vietnam including India. Organizations worldwide are moving away from passwords as it is largely unsafe and hence the need for finger authentication is on the rise.

With FIDO, consumers can log into a banks website, put username insert the drive into the laptop, authenticate fingerprint and complete transaction. We are working in collaboration with one of the largest software based MNC based out of US. We will be launching the device in the US very soon.

How is Ensurity Technologies associated with the banking sector?

Banks usually have partners who get into the networks. They have taken these devices and have specified which sites they can go into. Earlier, the banks were giving secure laptops to these partners which were costly or else whenever these parties were logging from their laptop it had a virus which was attacking the server also.

Today banks have over 500 cost machines in the market and it was once claimed by a bank that these devices used to update software in the cost machines are affected. In order to update these terminals, a third party assigned by the bank with the software puts it in a USB device and then updates the cost machines.

With the help of our USB devices, there is a read-only software installed which cannot let the user temper the software and this is done by an authenticated person. Even ATM machine updation also uses our devices. ATM manufacturers give the task of updating the cost machines to a third party who uploads the software to a pen drive and then update the terminals.

How you secure the ATMs?

There is no awareness about who comes and updates the ATMs or the security of the device carrying the software. This causes infection in the ATM machine and to prevent this, our storage devices FIDO compliant USB device are the best fit as they are programmed in such a way that the drive will be locked to all other USB devices except our device.

We create a secure VPN and then we insert this device into a laptop and reboot it, all the ports and hard disks are disabled. There is an operating system in this device which takes over and uses only the RAM power and can be programmed in such a way that it can take the user into a specified site of the server.

No Comments so far

Jump into a conversation

No Comments Yet!

You can be the one to start a conversation.

Your data will be safe!Your e-mail address will not be published. Also other data will not be shared with third person.