About iTivity
Leading developers of cybersecurity solutionsMore Than 30 Years in the Making
iTivity is the fastest, easiest way to secure vendor systems. Founded in 1987, iTivity has been deployed by over 3,300 IT organizations to secure more than 300,000 systems worldwide.
iTivity is used by both systems vendors and corporate IT departments to secure and manage systems on remote networks and in the cloud.They use iTivity to secure a wide range of systems ranging from small-footprint IoT devices and network appliances to complex medical imaging systems and cloud servers.
IT professionals choose iTivity because it protects their systems against real-world vulnerabilities that other solutions can’t — like poorly managed firewalls, weak passwords and stolen keys, even bugs in product code. As important, deploying iTivity doesn’t require any security expertise. Install it, and it goes to work. Once up, iTivity protects from both insider threats and outside attacks.
iTivity is serious security simplified. To learn more, contact iTivity today.
Ready to get started?
NOT READY YET? TALK TO AN EXPERT.
Unsecured Linux Remote Access Linux Exposes Thousands of Trucks and Buses to Hackers
Spanish security researcher Jose Carlos Norte revealed in a blog post this week that he’d used the scanning software Shodan to find thousands of publicly exposed “telematics gateway units” or TGUs, small radio-enabled devices attached to industrial vehicles’ networks...
SSH on Medical Devices “Easy” Vector for Attacking Hospital Networks
Speaking at last week’s Security Analyst Summit in February 2016, Scott Erven, a medical device security advocate described how medical devices are putting hospital networks and patient data at risk. Erven reported that hundreds of hospitals, clinics, and health...
SSH Key Management SNAFU Opens Hosting Customers To Attack
Web hosting provider Linode jeopardized the security of its customers' virtual machines, potentially allowing attackers to hijack the SSH connections initiated by customer system administrators, according to IT watchdog site, The Register. Linode promotes “High...
SSH Backdoor in Fortinet Hardware Compromises Customers
Exactly 30 days after the announcement that Juniper Networks had jeopardized customer security by shipping products with a hard-coded SSH password, security appliance manufacturer Fortinet has announced that many of their products contain a similar hard-coded backdoor...
6 Year-Old OpenSSH Exploit Discovered
Security firm Qualys has identified a zero-day vulnerability in OpenSSH clients that could allow a malicious server to steal private user keys, according to an eWeek article. The vulnerability is present in all OpenSSH client versions released since March 7, 2010...
Juniper Networks SSH Vulnerability Puts 26,000 Firewall Devices At Risk
Juniper Networks announced last week that an internal code review revealed two critical security vulnerabilities in ScreenOS, the Linux derived operating system that powers approximately 26,000 Netscreen firewall devices on the internet today. The review uncovered two...