TECH BRIEF

NetAnchor tool takes fingerprint of client devices

Tool uses device-recognition technology

Uniloc today announced the availability of NetAnchor, an authentication tool that uses the patented Uniloc Physical Device Recognition (PDR) technology to grant authorized access to systems and communications networks.

PDR can identify a computer with far greater accuracy than DNA testing can identify people, creating a device fingerprint that’s unique to every computer, said Brad Davis, president and CEO of Uniloc.

Attacks on the nation’s infrastructure are becoming more common, Davis said. For example, consider the attack by a group of disgruntled engineers in Los Angeles a few years ago, who shut down the city’s traffic lights during rush hour. Davis also cited the example earlier this year of an Indiana road sign that hackers changed to warn of “Raptors Ahead.”

“With the constantly increasing threat of cyber attacks and hacks, controlling access to critical assets is one of the most important challenges facing critical infrastructure industries today,” Davis said. NetAnchor offers a way to protect the nation’s critical infrastructure in water, power, oil, gas and chemical industries, as well as transportation.

By implementing NetAnchor server software, security appliance and management software, an organization creates a trusted-device network in which only authenticated devices are allowed to communicate, Uniloc said. Authorized machines are identified through Uniloc’s PDR technology to generate a device's fingerprint based on the characteristics of each device. For example, a computer will experience physical damage to its memory, Davis said. The damage in those areas is unique to each computer. This becomes part of the fingerprint for that computer, which becomes an authentication credential locked to that device.

More information: www.uniloc.com/netanchor/.

About the Author

Trudy Walsh is a senior writer for GCN.

inside gcn

  • automated security (Oskari Porkka/Shutterstock.com)

    How to create a secure cyber environment

Reader Comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group