Mobile

7/18/2017
12:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Tozny Launches End-To-End Data Security Encryption Toolkit For Developers

InnoVault toolkit enables developers building websites, apps, and software to easily embed end-to-end data security and privacy.

PORTLAND, Ore.– Tozny, which has built a secure, privacy-preserving and password-free mobile authentication system, today announced the launch of InnoVault, an easy-to-use toolkit allowing developers to embed end-to-end data security encryption capabilities into their websites, apps, or software. As a result, developers can now raise the level of their data security and privacy management to National Institute for Standards and Technology (NIST) recommended standards - without the need for security expertise.

InnoVault is built on Tozny’s E3DB technology that was developed as part of a 2-year collaborative agreement with NIST. The underlying technology is used by pilot partners under the NIST agreement to secure private data being generated within transit systems, smart buildings, and medical devices. InnoVault packages the E3DB technology for easy use by developers and is available with both free and paid tiers.

"The rise of data breaches exposing sensitive personal data such as passwords, emails, contact information, or location demands a more comprehensive data security than what most mobile and web applications use today," said Isaac Potoczny-Jones, founder and CEO of Tozny. "By providing developers with straight forward encryption tools, Tozny is addressing data security at the code level across a broad range of applications, such as registration forms, health records, IoT sensor data, and HR software."

Payment registration forms offer a prime use case for InnoVault: Frequently, signing up for a website or app does not involve protecting the user data on the form. Developers may use the Stripe library to protect credit card information when collected - to remain PCI compliant - but will then fail to protect the other data collected as part of registration. InnoVault will make protecting all the other data captured in registration as easy as Stripe makes protecting a credit card. Additional use cases for InnoVault include:

●      Securing the Internet of Things: Sensor data from wearables, home automation devices, cameras, smartphones, etc. must be privacy protected

●      Protecting data in HR software: Sensitive employee information such as social security numbers, date of birth, background checks, tax information, etc.

●      Protecting health records or "near-medical" data: Personal data from health trackers, medical intake forms, height and weight, etc.

●      Meeting compliance for GDPR or other privacy laws: All personally identifiable information (PII) requires protection under the new General Data Protection Regulation (GDPR) law.

●      Keeping location private: Many apps now collect geolocation data and send it back to servers, but fail to adequately protect a user’s location from employees, other users, or intruders.

The InnoVault solution consists of a set of software development kits (SDKs) and an accompanying API, which already went live as part of the NIST pilots.  Developers can select an SDK in their preferred language, install the library into their code, and utilize simple functions for complex encryption, key management, and policy management.  Currently, SDK languages will include Java, Ruby, and Go; additional SDKs will be released over the Summer and Fall.

For developers interested in the InnoVault toolkit, visit https://innovault.io/.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
White House Cybersecurity Strategy at a Crossroads
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/17/2018
Mueller Probe Yields Hacking Indictments for 12 Russian Military Officers
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/13/2018
10 Ways to Protect Protocols That Aren't DNS
Curtis Franklin Jr., Senior Editor at Dark Reading,  7/16/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2016-10727
PUBLISHED: 2018-07-20
camel/providers/imapx/camel-imapx-server.c in the IMAPx component in GNOME evolution-data-server before 3.21.2 proceeds with cleartext data containing a password if the client wishes to use STARTTLS but the server will not use STARTTLS, which makes it easier for remote attackers to obtain sensitive ...
CVE-2018-8018
PUBLISHED: 2018-07-20
Apache Ignite 2.5 and earlier serialization mechanism does not have a list of classes allowed for serialization/deserialization, which makes it possible to run arbitrary code when 3-rd party vulnerable classes are present in Ignite classpath. The vulnerability can be exploited if the one sends a spe...
CVE-2018-14415
PUBLISHED: 2018-07-20
An issue was discovered in idreamsoft iCMS before 7.0.10. XSS exists via the fourth and fifth input elements on the admincp.php?app=prop&do=add screen.
CVE-2018-14418
PUBLISHED: 2018-07-20
In Msvod Cms v10, SQL Injection exists via an images/lists?cid= URI.
CVE-2018-14419
PUBLISHED: 2018-07-20
MetInfo 6.0.0 allows XSS via a modified name of the navigation bar on the home page.