No matter where you are
Blacklist or Whitelist
Instantly remove unwanted intruders
iSmart Guard Validation Project
Center for Cybersecurity and Digital Forensics
Objective: Determine the effectiveness of iSmart Guard against the external or internal hacking of WiFi enabled devices such as computers, laptops, and Internet-Of-Things. After 2 weeks, of use, all devices are analyzed to determine which connections are genuine, and therefore, “whitelisted” as authorized. All other connections are then blocked.
Conclusion: iSmart Guard was 100% efficient in allowing only authorized connections and in blocking all unauthorized ones.
“iSign’s iSmartGuard is such an innovative solution and tremendously helps monitor and detect malicious activities in a real-time manner by leveraging a hardware-assisted security assurance for home and business environments.”
Gail-J. Ahn, Ph.D, CISSP
Director, Center for Cybersecurity & Digital Forensics (CDF)
Professor, School of Computing, Informatics, and Decision Systems Engineering
Arizona State University
Download the iSmartGuard™ App now
Why We’re Different
iSign’s patented End-to-End Dynamic PKI Encrypted Communication
with 6-Factor Authentication.
WiFi Enabled Devices
Monitor all equipment linked to WiFi.
Get a text message when the threats reach set levels