Mobile

7/18/2017
12:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Tozny Launches End-To-End Data Security Encryption Toolkit For Developers

InnoVault toolkit enables developers building websites, apps, and software to easily embed end-to-end data security and privacy.

PORTLAND, Ore.– Tozny, which has built a secure, privacy-preserving and password-free mobile authentication system, today announced the launch of InnoVault, an easy-to-use toolkit allowing developers to embed end-to-end data security encryption capabilities into their websites, apps, or software. As a result, developers can now raise the level of their data security and privacy management to National Institute for Standards and Technology (NIST) recommended standards - without the need for security expertise.

InnoVault is built on Tozny’s E3DB technology that was developed as part of a 2-year collaborative agreement with NIST. The underlying technology is used by pilot partners under the NIST agreement to secure private data being generated within transit systems, smart buildings, and medical devices. InnoVault packages the E3DB technology for easy use by developers and is available with both free and paid tiers.

"The rise of data breaches exposing sensitive personal data such as passwords, emails, contact information, or location demands a more comprehensive data security than what most mobile and web applications use today," said Isaac Potoczny-Jones, founder and CEO of Tozny. "By providing developers with straight forward encryption tools, Tozny is addressing data security at the code level across a broad range of applications, such as registration forms, health records, IoT sensor data, and HR software."

Payment registration forms offer a prime use case for InnoVault: Frequently, signing up for a website or app does not involve protecting the user data on the form. Developers may use the Stripe library to protect credit card information when collected - to remain PCI compliant - but will then fail to protect the other data collected as part of registration. InnoVault will make protecting all the other data captured in registration as easy as Stripe makes protecting a credit card. Additional use cases for InnoVault include:

●      Securing the Internet of Things: Sensor data from wearables, home automation devices, cameras, smartphones, etc. must be privacy protected

●      Protecting data in HR software: Sensitive employee information such as social security numbers, date of birth, background checks, tax information, etc.

●      Protecting health records or "near-medical" data: Personal data from health trackers, medical intake forms, height and weight, etc.

●      Meeting compliance for GDPR or other privacy laws: All personally identifiable information (PII) requires protection under the new General Data Protection Regulation (GDPR) law.

●      Keeping location private: Many apps now collect geolocation data and send it back to servers, but fail to adequately protect a user’s location from employees, other users, or intruders.

The InnoVault solution consists of a set of software development kits (SDKs) and an accompanying API, which already went live as part of the NIST pilots.  Developers can select an SDK in their preferred language, install the library into their code, and utilize simple functions for complex encryption, key management, and policy management.  Currently, SDK languages will include Java, Ruby, and Go; additional SDKs will be released over the Summer and Fall.

For developers interested in the InnoVault toolkit, visit https://innovault.io/.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
New Cold Boot Attack Gives Hackers the Keys to PCs, Macs
Kelly Sheridan, Staff Editor, Dark Reading,  9/13/2018
Yahoo Class-Action Suits Set for Settlement
Dark Reading Staff 9/17/2018
RDP Ports Prove Hot Commodities on the Dark Web
Kelly Sheridan, Staff Editor, Dark Reading,  9/17/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: In Russia, application hangs YOU!
Current Issue
Flash Poll
How Data Breaches Affect the Enterprise
How Data Breaches Affect the Enterprise
This report, offers new data on the frequency of data breaches, the losses they cause, and the steps that organizations are taking to prevent them in the future. Read the report today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-3912
PUBLISHED: 2018-09-18
Bypassing password security vulnerability in McAfee Application and Change Control (MACC) 7.0.1 and 6.2.0 allows authenticated users to perform arbitrary command execution via a command-line utility.
CVE-2018-6690
PUBLISHED: 2018-09-18
Accessing, modifying, or executing executable files vulnerability in Microsoft Windows client in McAfee Application and Change Control (MACC) 8.0.0 Hotfix 4 and earlier allows authenticated users to execute arbitrary code via file transfer from external system.
CVE-2018-6693
PUBLISHED: 2018-09-18
An unprivileged user can delete arbitrary files on a Linux system running ENSLTP 10.5.1, 10.5.0, and 10.2.3 Hotfix 1246778 and earlier. By exploiting a time of check to time of use (TOCTOU) race condition during a specific scanning sequence, the unprivileged user is able to perform a privilege escal...
CVE-2018-16515
PUBLISHED: 2018-09-18
Matrix Synapse before 0.33.3.1 allows remote attackers to spoof events and possibly have unspecified other impacts by leveraging improper transaction and event signature validation.
CVE-2018-16794
PUBLISHED: 2018-09-18
Microsoft ADFS 4.0 Windows Server 2016 and previous (Active Directory Federation Services) has an SSRF vulnerability via the txtBoxEmail parameter in /adfs/ls.