RSAC 2024: Swissbit Boosts OT Security with iShield Key Pro

Kevin Fadaie, Regional Sales Manager for Embedded IoT Solutions, Swissbit, Swissbit, joins Dark Reading's Terry Sweeney at News Desk during the RSA Conference to discuss FIDO security keys, their usefulness in authentication, and how they can contribute to improved security for operational technology (OT) applications.

Kevin Fadaie, Regional Sales Manager for Embedded IoT Solutions, Swissbit, joins Dark Reading's Terry Sweeney at News Desk during the RSA Conference to discuss FIDO security keys, their usefulness in authentication, and how they can contribute to improved security for operational technology (OT) applications. He enumerates key capabilities and features to look for in FIDO keys, and also describes the current OT threat landscape. And he talks about differentiators for Swissbit’s iShieldKey Pro and its improved user experience. Imgenberg also discusses how the product’s underlying technology can be updated as standards and requirements change.

Kevin Fadaie has been Regional Sales Manager for Embedded IoT Solutions at Swissbit NA since early 2023. His key responsibilities include forging and enhancing partnerships with Identity and Access Management (IAM) solution providers and positioning Swissbit as a top FIDO2 solutions provider in the Americas. Fadaie's efforts in establishing strategic alliances are crucial for enabling customers to smoothly integrate Swissbit's advanced security products into their authentication systems.

Prior to joining Swissbit, Kevin held positions as a sales and technical account manager at leading companies, including Intel and Samsung. He earned a Bachelor of Science degree in Electrical Engineering from San Jose State University in California.

About the Author(s)

Terry Sweeney, Contributing Editor

Terry Sweeney is a Los Angeles-based writer and editor who has covered technology, networking, and security for more than 20 years. He was part of the team that started Dark Reading and has been a contributor to The Washington Post, Crain's New York Business, Red Herring, Network World, InformationWeek and Mobile Sports Report.

In addition to information security, Sweeney has written extensively about cloud computing, wireless technologies, storage networking, and analytics. After watching successive waves of technological advancement, he still prefers to chronicle the actual application of these breakthroughs by businesses and public sector organizations.


Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights