Savant and iSign Validate Their Supply Chain Cybersecurity Strategy


Savant and iSign validate their supply chain cybersecurity strategy. Domestic and international hacking poses an enormous threat to companies of all sizes. In fact, small to mid-sized organizations are even more vulnerable because they lack the resources to monitor and resolve security risks. While stealing data is a top hacking priority, sophisticated hackers can also manipulate date resulting in the theft of products.


Savant Software is committed to securing the supply chain with iSign Guard and iSecure Protector Server Edition. These comprehensive tools will enable Savant customers to safe guard their IT infrastructure from intrusive and costly cyber attacks. But how secure are iSign Guard and iSecure Protector?


During the months of October and November 2017, we engaged the cybersecurity centers at Montreat College and Arizona State University. The objective was simple … use your resources and cybersecurity knowledge to test ISign Guard and iSign Protector for vulnerabilities. The following are the results.


The Montreat College Center for Cybersecurity ran their security tests with the stated objective:


“To determine the effectiveness of iSmart Guard protection against a hacking attempt of WiFi enabled devices (such as computers, laptops, and IoT devices), all connected to the same LAN, from both internal and external attacks. The test used a set of WiFi enabled devices with direct connect to iSmart Guard. During the first two weeks, we only monitored the internet activity of these devices without taking any action. We then analyzed the corresponding results and used iSmart Guard to block all inbound connections as well as specific “black listed” outbound connections; only those outbound connections from white listed ISPs were allowed. Then, during the next two weeks, we checked/monitored the internet activity to make sure that no outbound activity toward the blacklisted ISPs.”


The results from the Montreat College study were quite revealing:


“Overall, we want to confirm that, in the two final weeks, iSmart Guard was totally successful in blocking any and all outbound connections that were not necessary to operate the IoT devices.”


The Arizona State University Center for Cybersecurity and Digital Forensics performed similar tests using iSmart Guard. They also concluded:


“iSmart Guard was 100% efficient in allowing only authorized connections and in blocking all

unauthorized ones.”


But the ASU team also performer a series of tests on iSecure Protector Server Edition using biometric signature and 5-factor authentication. Their objective was to:


“Determine the effectiveness of iSecure Protector Server Edition in protecting critical servers from external and internal attacks and the efficiency in bandwidth cost savings and productivities that iSecure Protector Server Edition provides.”


The environment tested was an Amazon AWS EC2 instance running Windows Server 2016. After multiple tests and attempted hacks, Ziming Zhao, Assistant Research Professor from ASU concluded:


“After thorough testing and data collections, I have concluded that the iSecure Protector Server Edition reduced the bandwidth consumption from 209MB to 40MB, which is a 500% bandwidth reduction. The iSecure Protector Server Edition was 100% effective in blocking unknown sources from remote desktop. Even with selective IP Address and selective port opening of 3389, the iSecure Protector Server Edition blocked all unauthorized IP Addresses.


The iSecure Protector Server Edition management portal with biometric signature and 5-Factor authentication was 100% effective in identifying unknown sources and black listed the IP Addresses immediately. Trying to break in using the passcode option with a mobile device was also unsuccessful since our mobile phone was not recognized. iSecure Protector Server Edition is certainly a great tool for both reducing bandwidth and blocking all hacking attempts. “


Dr. Gail-Joon Ahn, Director, Center for Cybersecurity and Digital Forensics at Arizona State University summed it up best. “Leveraging dynamic PKI for secure communications and signature dynamics for biometric-based authentication can tremendously reduce potential cyber incidents. iSign delivers pioneering, ground-breaking solutions by proactively detecting and preventing cyber threats with such brilliant and practical approaches.”


For more information contact Chris Jackson at Savant software.