About iTivityLeading developers of cybersecurity solutions
More Than 25 Years in the Making
iTivity is the fastest, easiest way to secure vendor systems. Founded in 1987, iTivity has been deployed by over 3,300 IT organizations to secure more than 300,000 systems worldwide.
iTivity is used by both systems vendors and corporate IT departments to secure and manage systems on remote networks and in the cloud.They use iTivity to secure a wide range of systems ranging from small-footprint IoT devices and network appliances to complex medical imaging systems and cloud servers.
IT professionals choose iTivity because it protects their systems against real-world vulnerabilities that other solutions can’t — like poorly managed firewalls, weak passwords and stolen keys, even bugs in product code. As important, deploying iTivity doesn’t require any security expertise. Install it, and it goes to work. Once up, iTivity protects from both insider threats and outside attacks.
iTivity is serious security simplified. To learn more, contact iTivity today.
It's a horrible practice for IP-enabled device manufacturers to ship products with default passwords because users often don't change them. Yet, 44 of the top 50 CCTV manufacturers do exactly that. We're talking "root/root" and "admin/1234." Unbelievable? Here's the...read more
The average total cost to a company that suffers a data breach has risen to $3.79 million per instance — up 23 percent over last year — according to the latest study by IBM and the Ponemon Institute. Lost business resulting from reputation damage was cited as the most...read more
Spanish security researcher Jose Carlos Norte revealed in a blog post this week that he’d used the scanning software Shodan to find thousands of publicly exposed “telematics gateway units” or TGUs, small radio-enabled devices attached to industrial vehicles’ networks...read more
Speaking at last week’s Security Analyst Summit in February 2016, Scott Erven, a medical device security advocate described how medical devices are putting hospital networks and patient data at risk. Erven reported that hundreds of hospitals, clinics, and health...read more
Web hosting provider Linode jeopardized the security of its customers' virtual machines, potentially allowing attackers to hijack the SSH connections initiated by customer system administrators, according to IT watchdog site, The Register. Linode promotes “High...read more
Exactly 30 days after the announcement that Juniper Networks had jeopardized customer security by shipping products with a hard-coded SSH password, security appliance manufacturer Fortinet has announced that many of their products contain a similar hard-coded backdoor...read more