A disappointing finding. Having spent years engineering large enterprise scale security and surveillance systems and having owned one of those new age cutesy home security system and on separate occasion paying monthly for a preeminent security service subscription I realized all had a missing ingredient, “security”. Further investigations reveal current home and small business security systems share the same anomaly, each increase owner/user security risks, some do so in spades.
While user’s of large enterprise scale security and surveillance systems have a right to be unhappy with these shortcomings, they benefit from having the wherewithal to mitigate them. The homeowner and small business operator enjoy no such benefits.
ProteqsIt Shield is recognition of these truths. It offers hope of a better day to the homeowner and small business operators and yes, perhaps to the enterprise scale users as well.
So, with that behind us we are off to the races. Let’s get right to it with an opening question “so what are these many security problems and how does ProteqsIt Shield avoid or mitigate them? That’s a good question and I’m glad you asked; but understand, there are many and as time allows I’ll reveal all on this page.
Access Security: A common problem of every security and surveillance system is dependence on credentials-based authentication, most using single factor, and some with multi-factor, most by simplistic password, others by more elegant biometrics and a very few offering two-factor authentications. No matter the form or type, this finding is commonplace and it’s assured if attacked by motivated cybercriminal the installation will be compromised.
ProteqsIt Shield avoids access security risks by sacking credentials-based authentication altogether. It doesn’t work, has never worked and never will. In its place Shield employs use of Gatekeeper and Personal Identifier. Accessing a ProteqsIt Shield installation results in identification query to the smartphone associated with the username. Within milliseconds the resulting Identification Code identifying the person in possession of the smartphone at that moment and a Session Identifier establishing query continuity are read from the smartphone, perhaps over Bluetooth channel or perhaps by scanning a displayed QR barcode. Once verified as valid, the known user is granted access. Results: access granted to authorized personnel only without risk from even the most motivated of cybercriminals.