In cybersecurity, authentication is crucial for guarding sensitive information against those who would use it for ill gains. Traditionally, passwords have been the primary means of authentication. However, as cyber threats become increasingly sophisticated, the limitations of password-based systems have become apparent.
To address these challenges, many organizations are transitioning to passwordless authentication methods. These innovative systems offer enhanced security and user experience by eliminating the need for passwords.
Authentication in the context of cybersecurity is the process of ensuring that the entity attempting to access sensitive information (banking information, identity documentation, government information, medical documents, etc.) is both an entity that is properly permitted to access it and is the entity that they are claiming to represent. To put it more simply, authentication is a service’s method of making sure that only the right people – people you specify – get to see your data.
The most classic form of authentication online is a password. Passwords are specific phrases or strings of symbols that act as a sort of key for the “lock” protecting your information. Users enter an account identifier – usually a name, email, or username – and a password into the verification screen. The service compares what was entered to what is on file as valid for this information and, if they match, grants access. It’s a relatively straightforward system.
Because of its simplicity, however, password authentication systems are insecure in the modern world. Simple programs like keyloggers and common scams like phishing gather information quickly and can make it easy for cybercriminals to access your information. Beyond this, there are thousands of password databank breaches annually that can mean your information is exposed even if you yourself are extremely careful with it. Passwords are easy to misplace, forget, or input incorrectly, meaning that lots of time needs to be spent recovering password-protected accounts, which is both frustrating and time-wasting.
To combat this, many companies are now switching to passwordless authentication systems. As the name implies, a passwordless authentication system uses alternative methods to verify a user’s identity, not requiring a specific password at all. This eliminates the need for a password databank and can be easier to encrypt for security. It also means that keyloggers are rendered useless and spoofing for a phishing scam is harder to do.
Of course, there are methods of bolstering password authentication. This usually involves establishing multi-factor authentication with additional layers like reCAPTCHA. ReCAPTCHA is Google’s authentication system based on the CAPTCHA method; users input the digits or letters presented to them in a slightly distorted photo that many image identification bots struggle to read. In newer versions of reCAPTCHA, users must select a particular object from a grid system of a photo or set of photos or must answer a question.
Systems like reCAPTCHA can still have vulnerabilities, however. Modern machine learning models and artificial intelligence programs have vastly improved photo recognition algorithms and can parse the tests relatively easily and quickly, meaning that bad actors can still access sensitive information with relatively little effort. Passwordless authentication is still not as vulnerable to this kind of attack because it doesn’t rely on a specific typed input in the same way from users and often instead relies on another personal identifier selected at account creation, which can’t be predicted by these programs.
When it comes to securing online accounts, Photolok from Netlok is a passwordless authentication method that offers a practical and user-friendly alternative to traditional password-reliant methods like reCAPTCHA. Photolok leverages photos to authenticate users in a way that’s both effective and intuitive.
This unique software’s authentication process works like this. Users select and categorize photos to use as verification keys; they can be labeled as multi-use, one-time use, or “Duress” (a distress signal). During login, users are asked to identify their chosen photo from a grid of similar photos from Photolok’s proprietary database. This approach eliminates the need for passwords entirely, making it a robust alternative to conventional password-based systems.
In terms of defending against AI and machine learning attacks, Photolok is particularly effective by design. Its system is built with advanced encryption and lateral defenses, which standard password-cracking tools cannot bypass. Since there are no passwords to crack and photo recognition software needs specific training and prompting to identify photos, AI attacks are considerably less effective; there is no “please choose this item” prompting for them to rely on for identification. The use of one-time-use photos further complicates any potential data collection by attackers, making it challenging for them to amass useful information over time. Additionally, keylogging systems are ineffective with Photolok, as the user’s photo location on the grid changes with each login.
As mentioned, traditional CAPTCHA tests, including advanced versions like Google’s reCAPTCHA, were designed to thwart simple automated attacks, but AI’s rapid advancement left CAPTCHA systems of all kinds outdated and less effective against sophisticated threats. Photolok provides a modern solution with its photo-based system, offering superior protection against both AI-driven and human social engineering attacks alike. Photolok’s ease of use and strong security make it an excellent choice for enterprises seeking a more reliable authentication method. Visit Netlok’s website to learn more and schedule a demonstration to see Photolok in action.
Most people who have used the Internet are familiar with the little boxes at the bottom of forms that ask you to prove that you’re human. It’s become a common joke that the distorted letters are illegible and that it’s just as hard for a human to solve these puzzles as it would be for a robot. But is that true? And if so, why do we still use this outdated verification?
Google’s ReCaptcha is beginning to show its limitations, and many site owners and internet users are seeking alternatives. To know why, it’s important to know what Recaptcha is, why it is being phased out, and what authentication methods are being used to replace it.
ReCaptcha is a Google property. This program is a multi-factor authentication method that uses a risk analysis engine to prevent spam responses to forms online. It’s most often used for surveys, email list registration forms, account creation and login screens, and purchase forms, among other applications. ReCaptcha uses a CAPTCHA test, which stands for “Completely Automated Public Turing test to tell Computers and Humans Apart.”
The Turing Test is a method of determining whether a computer can effectively mimic a human being’s thought processes. For a classic Turing Test, a human asks a series of questions to two responders, one other human and one computer program. After all questions are answered, the questioner must determine which responder is the computer. If, on more than half of the trials of the test, the computer is incorrectly identified, the computer is said to have passed the Turing Test.
So, using this idea, CAPTCHA tests generate an image that the user has to correctly interpret to access or submit the form. This is usually either an image with distorted letters and numbers that must be typed in the correct order or a series of images that ask users to identify a specific object. Some reCaptcha tests may be a single checkbox to select labeled “I am not a robot.” With this version of the test, the program takes into account the speed and accuracy of the click on the box, verifying a certain level of human error for authenticity.
While reCaptcha started as a go-to authentication method, modern internet users and site owners have criticisms that are beginning to spell the end of the software as an industry standard.
For one, reCaptcha has extremely limited accessibility features. Many users with accessibility needs, such as low vision or blind users, express frustration with reCaptcha’s distorted letter mechanic. With accessibility for all becoming a major focus for most online brands, having essential features of your site hidden behind a feature that cannot accommodate people with visual disabilities can be a major hindrance.
Another major complaint is the overall tedium of filling out reCaptcha forms. Some versions of the system require users to go through two, three, or even four layers of identification and authentication to verify their legitimacy as users, which can take an upsetting amount of time to complete, and in the event of an internet issue, can be extremely frustrating to have to restart. There have also been issues with image reCaptchas specifically having errors that result in the user being asked to identify an object that isn’t present at all, which can lead to further confusion and annoyance.
The final major concern with reCaptcha is the advancement of artificial intelligence technology. AI algorithms are becoming so advanced that they can pass the Turing test with relative ease, and with reCaptcha specifically, programs have been developed by scammers and bot managers that can replicate the minute randomizations in clicks of a human being and identify images more clearly than ever before. Many people are concerned that reCaptchas have become obsolete in the face of these advancements, and many site owners are finding that more and more bots are slipping through reCaptcha filters because of it.
While it’s unlikely that reCaptcha will be completely phased out anytime soon – as this would be a massive undertaking and require the reconfiguration of millions of sites worldwide – other authentication methods are slowly becoming more prevalent as a way of warding off AI advancements and bots.
Some sites choose to use methods like Cloudflare’s Turnstile, which uses specific code to verify a user’s connection and authenticity and filter out bots. Others choose to add another layer of security to their reCaptcha authentication instead of replacing it, using bot-sweeping software to filter out any spam that may get past the Captcha and into their system. They may also choose to implement a firewall system to block AI. Some companies are also fighting AI with AI; they use AI software to detect spam accounts and users across networks and block them instantly.
A new authentication method from Netlok called Photolok allows users to log into their accounts by selecting an image of their choosing from a grid of similar images. This system allows users to upload their security images with labels including one-time use and duress – a label that would alert administrators if a user is forced to log into their account by a bad actor. It is an extremely secure method that works well against bots and AI alike thanks to clever encryption and a unique verification algorithm.
Other methods include 2FA requiring outside devices such as phones or tablets and biometric authentication, which may include facial recognition software or fingerprint reading.
While reCaptcha has been a go-to authentication method for many years, its limitations and drawbacks are becoming increasingly apparent to both internet users and site owners, especially concerning accessibility. Alternative authentication methods are slowly gaining popularity as a way to fight against AI advancements and bots. Again, while it is unlikely that reCaptcha will be completely phased out anytime soon, site owners need to consider alternative authentication methods that are more accessible, user-friendly, and secure.
If you are interested in implementing Photolok into your network as a Captcha alternative, you can schedule a demo online.
Read More: Phishing Attacks Surge By 173% In Q3, 2023
Read More: The Need for a Paradigm Change to Mitigate Password Vulnerability From Artificial Intelligence
Read More: Fortify Security: Investing in Advanced Authentication Solutions
By Chuck Brooks
Traditionally, strong passwords have been a first-tier defense against cyber-attacks and breaches. However, with the development of AI and ML tools, the effectiveness of cyber-defense has been thoroughly diminished, especially from more sophisticated cyber actors who use AI/ML tools to circumvent password defenses. Despite the drawbacks of passwords, cyber decision-makers (CTOs, CISOs, etc.) have been hesitant to abandon them. But an innovative passwordless solution is available that can facilitate that change from passwords and enhance security strategies. It’s Netlok’s Photolok, a passwordless IdP, which employs images in place of passwords and uses OAuth for authentication and Open ID Connect for integration.
Photolok is user-friendly and provides enhanced security not available with other solutions. Photolok’s randomization of photos mediates AI/ML attacks because they cannot identify and/or learn any patterns and, therefore, prevents AI/ML breaches. The proprietary photos are used to hide attack points from nefarious actors, streamline the login process, and make point-and-click navigation easy to use.
With Photolok, bots are unable to recognize which photographs to attack. Any automated attack is substantially neutralized by the randomization of photo localizations. Moreover, the digital information hidden behind the images—which can be updated every time a login attempt is made—won’t be gathered by the bots. Any automated bot attempt to get access will certainly fail and result in the user’s account being instantly locked out.
Photolok makes the identity authentication journey easier for humans to manage. The photos are easy to remember, connect with people, and provide privacy protection. Photolok’s simplicity makes it intuitive and removes language and literacy barriers that make passwords difficult to operate. Getting rid of passwords also eliminates the costly process of password resetting and following password rules, which makes Photolok very cost-effective. To change and/or add new photos, users select and label a photo that are automatically saved in seconds.
Photolok IdP is an identity provider and an authentication server with Open ID Connect making it easier to integrate apps and APIs. With Photolok, users upload pictures from Photolok’s custom library to be used as identifiers. To authenticate their identity, the user just uploads, labels, and chooses security photos from Photolok’s custom library.
Photolok IdP can be used as a standalone MFA alternative. The availability of robust authentication techniques like multi-factor authentication (MFA) can greatly lower the risk of data loss or compromise and is one of the main benefits of adopting an identity provider (IdP). Photolok MFA IdP can confirm the user’s identity, making it more difficult for malicious parties to access private information without authorization.
Deploying single sign-on (SSO) technology also simplifies the user experience, which is another advantage of adopting an identity provider like Photolok. When used with a federator like Okta Workforce, users won’t need to remember numerous passwords, usernames, or backup authentication techniques, which lowers the total quantity of data that a business’s system must constantly monitor. For example, Netlok uses Photolok to login to its Okta Workforce account to immediately access a wide pool of apps and APIs.
Photolok is the first IdP to offer situational security protection in the public environments or even in unprotected remote work. The Photolok account owner can 1) Give permission for the device and browser to be used for Photolok identity and authentication entry, 2) Utilize the “Duress” photo to trigger an automated warning informing the IT that the account owner is having problems or that a malicious actor is forcing them to access their device, 3) Utilize the “One-Time Use” photo to stop shoulder surfing, and 4) Give permission for the alert message to be sent each time the user opens their account. Photolok is a major innovative development in digital security systems, particularly in its capabilities to mitigate AI generated threats. Photolok effectively removes a great deal of the shortcomings in the current security paradigm. More significantly, Photolok blocks horizontal penetrations and defends against external threats, such as ransomware, phishing, keylogging, shoulder surfing, and man-in-the-middle assaults. In effect, Photolok lessens the user’s burden while improving online digital security, which is essential for widespread adoption by both businesses and consumers.
Source: Paul Sigismondi, Ph.D., is a research physicist and educator. He has a B.S. in Physics from the University of California at Berkeley and a Ph.D. in Physics from the University of North Carolina at Chapel Hill. His research interests include theoretical astrophysics and quantum field theory.
Security from intruders is an ancient quandary and the internet has created new challenges. The purpose of this evaluation is to explore a digital identity and authentication solution called PhotolokÒ that addresses the security problem caused by the digital transformation that has invaded our daily lives. Since the digital world is still evolving, it’s helpful to begin with a review of security solutions because we still use century-old methods that will be replaced someday with digital solutions like Photolok.
A functional security system must allow quick, easy, and convenient entry to those with permission, but must make invasion by an unwanted intruder a highly unlikely occurrence. Ancient security arrangements typically involved gates, walls, watchtowers, moats, and armed personnel. In these arrangements, the main objective, which is still operative in modern systems, was to make invasion a taxing and dangerous enterprise for the intruder. Like today, robust and effective security required manpower and maintenance. Furthermore, the administrators had to acquire an awareness of the ever changing techniques that clever intruders were attempting in order to subvert the security systems in place.
The lock and key, which likely existed in rudimentary forms in ancient Egypt, provided localized security for people’s homes, safes, and the like. The advent of the combination lock eliminated the necessity of transporting keys and required merely recall of a numerical code to secure entry. Like the modern password system used for cybersecurity, these systems had their drawbacks.
From the standpoint of user convenience, what happens if the user loses his or her keys or forgets the combination? Spare sets of keys, pieces of paper with combinations written on them, keys placed under mats, and unlocked back doors and windows litter the praxis of those trying to prevent lockouts, while securing their property traditionally. They also create more possibilities for unwanted intruders to gain access to the keys or the combination. Since the user was not always able to access spare keys or a place where the combination is stored, the security system had to be penetrable without keys or the correct combination to be practicable. And, if a locksmith can pick a lock or crack a safe, then someone with nefarious intentions could certainly learn to do the same.
A combination lock has 59,280 distinct codes. There are less than 100,000 distinct lock and key combinations for a typical home door. If an 8-letter password is assigned at random to logon to an internet account, there are nearly 209 billion distinct possibilities for that password. In practice, a randomly assigned password is extremely difficult to remember. So instead, users are generally allowed to choose their own password
People tend to choose memorable passwords composed of common words and pass phrases. This significantly reduces the number of passwords practically in use. Zipf’s law, a well-known rule of thumb in statistics, states that the frequency of a given event within a distribution is inversely related to the rank of that event amongst the most highly ranked members of that distribution. Practically speaking, this means many people will choose the most common passwords in use. For example, in 2021, an estimated 2.5 million users adopted the most common password, “123456”, Nearly a million users chose “123456789”, and a little over 300,000 users chose “password”.
Zipf’s law has the effect of concentrating a population into the highly ranked events within that population. In fact, fitting the data for the top 7 passwords yields a frequency that is inversely proportional to the rank to 1.3 power. If this relationship were to hold consistently, then 50% of the passwords in use would be one of the top 7 most common passwords. This phenomenon gives internet intruders (bots and cyber hackers) a distinct advantage. (A ‘bot’ – short for robot – is a software program that performs automated, repetitive, pre-defined tasks. Bots typically imitate or replace human user behavior. Because they are automated, bots operate much faster than human users.)
Given that a modern intruder is often an automated bot that can make billions of attempts with the most common passwords on multiple targets each second, traditional passwords are vulnerable to statistical attack. Even, if a user is astute enough to choose a more secure password, there are other methods that bots can try in order to penetrate password secured systems, which include phishing, ransomware, malware, insider threats, and distributed denial of service attacks, to name a few.
reCAPTCHA is a common solution to prevent BOT attacks. After the user has successfully entered their username and password, they are prompted to prove they are a human either properly identifying distorted text or by identifying images with similar content. At this point, every hacker has seen the limited suite of images used in the reCAPTCHA algorithm and can use this information to their advantage. In addition, off the shelf software can now crack the reCAPTCHA algorithm 70% of the time.
The rapid advancement and efficacy of techniques currently employed by cyber hackers necessitate more robust security systems. Traditional password secured systems are also vulnerable to non-statistical attacks (phishing, ransomware, and man in the middle attacks, etc.) and to statistical attack, especially when sufficient latitude is given to the user in choosing a password. Photolok is a system that is nearly impervious to non-statistical attack and has an incredibly low probability of statistical attacks, comparable to truly randomly assigned passwords. At the same time, it is far more convenient to the user in terms of recall than a randomly assigned password that the user did not participate in choosing.
Photolok is a novel concept that employs proprietary-coded photos as the key to entry. The system can either assign the user photos or allow the user to choose photos from a proprietary library of photos that currently number over 6400. At login, the user is prompted for an email address. As an added security feature, there is an option that requires the user to input an access code that is emailed or texted to them after they have entered their email address. Subsequently, the user must locate one of their account photos, which appears randomly amid a panel of photos.
The Photolok identity and authentication system can be customized to allow the user to choose up to 5 photos as well as label special security photos for 1-Time Use and Duress. This identity and authentication system is highly secure and easy to use given that the photos are easily recalled and must be spotted by a human. More importantly, Photolok also protects against most external attacks, including keylogging, shoulder surfing, phishing, ransomware, and man-in-the-middle attacks while preventing horizontal penetrations.
This leaves a statistical attack as the only viable means of penetrating the Photolok system. However, this is highly unlikely. The number of possible combinations formed by choosing a minimum 3 photos from a library of 6400 is nearly 44 billion, which is about 5.5 times the total population of the world. The number of people fully employed in the US is about 132 million. If every one of those workers participated in choosing 3 photos out of 6400, the probability that there would be at least one duplicate set of photos in that large sample is 0.32%. Even if the entire world’s population were given this task, the likelihood of at least one duplicate set of photos occurring within the choices is still only 17%. Therefore, penetration of the Photolok system is nearly impossible.
Furthermore, the above analysis overestimates the probability of breakthrough. There is no limit to complexity of the Photolok system. Photos can be added to the library. Administrators can also ask the users to choose more photos. As stated above, the choice of 3 photos is a minimum. In many cases, users will want to use 4 photos with nearly 69 trillion photo combinations. With the ability to change a few operational variables, security can be further enhanced in a flexible manner with no extra burden to the user – e.g., increasing the size of the proprietary photo library.
As opposed to passwords, bots can’t identify the photos to target. The randomization of photo localizations effectively neutralizes any automated attack. Furthermore, the bots won’t be able to collect the digital data behind the photos, which may change each time a login attempt occurs. With almost 100% certainty, any attempt at penetration by automated bot will result in failure and automatically locks the user’s account.
In conclusion, Photolok represents a significant and promising evolution in digital security systems. It seamlessly eliminates many of the flaws inherent in the present security paradigm. Most importantly, it enhances online digital security, while simultaneously reducing the burden on the user, which is critical for mass adoption.
Note: to learn more about Netlok’s Photolok logon solution, click www.netlok.com.
LOS ANGELES – June 14, 2022 – Netlok® announced today that its patented Photolok® technology, which replaces passwords with photos, is available on Auth0 Marketplace, a catalog of trusted technology integrations to extend the functionality of Auth0’s identity management platform.
With Photolok, customers can seamlessly log in with photos, eliminating password compromise and resetting costs.
Photolok can serve companies who want to go passwordless and protect against bots, phishing, keylogging, sim-card swapping, and ransomware. The human focus of Photolok gives companies an effective login tool that aligns with employees’ need for privacy and security compliance simplicity.
Photolok complements Auth0’s extensible identity solutions and the ease with which customers can seamlessly integrate adjacent technologies to facilitate the successful execution of larger projects such as digital transformation, threat detection, compliance, and customer conversion.
“We’re thrilled to bring Photolok to Auth0 Marketplace and offer customers a unique passwordless login experience with photos,” said Tony Perez, CEO at Netlok.
“There is nothing like Photolok on the market today that truly protects the most common activities you do as a business or an individual online. The escalation of cybercrime demands that new solutions are found and we are committed to protecting online privacy by shutting down the entry points for hackers,” Perez also says.
Photolok is a game-changer because people resonate with photos and emotionally connect with them, which makes them easy to remember. Globally, almost everyone is using their mobile devices to capture and send photos.
Recognizing its innovation based on photos, Jacqueline Y. Kapur, CEO, Ignition Capital, NY, stated that “Photolok’s simplicity is intuitive because logging in with photos removes language, gender, educational, and economic barriers.”
“Auth0 Marketplace provides partners like Photolok with a central in-product hub where their solutions are visible to, and accessible by, thousands of Auth0 customers, and enables them to participate in the growing identity and access management economy,” said Cassio Sampaio, SVP of Product at Auth0. “Photolok is a best-in-class technology that adds tremendous value to our Marketplace and its customers.”
Auth0 reviews partner integration functionality and make available integrations that are easy to discover and integrate for customers. Partners can participate in the growing demand for digital identity solutions and increase their visibility as part of Auth0 Marketplace, and can learn more here: https://auth0.com/partners.
Photolok was created by Netlok – a cyber-security company founded on the belief that everyone has something they value and wish to keep secure and private while online. Since hackers steal passwords to break into a person’s account, Netlok developed Photolok to make logging in secure, simple, and easy to use. Photolok replaces passwords with photos to make it easy for the user.
By getting rid of passwords, you eliminate password resetting and password rules. Instead, you label a photo, and it is automatically saved in seconds. For extra security, you can label photos for 1-Time use and for Duress, which acts as a silent alarm to notify people when you are in trouble. Learn more at Photolok.com.
Netlok® announced today that its patented Photolok™ technology, which replaces passwords with photos, has been selected as the winner of the “Authentication Solution of the Year” award from CyberSecurity Breakthrough, an independent organization that recognizes the top companies, technologies and products in the global information security market today. Photolok is part of the company’s groundbreaking Netlokr™ product, which integrates private messaging, confidential file sharing and protected data storage in one secure environment.
“We are thrilled to receive this prestigious industry recognition for our Photolok authentication system because there is nothing like it on the market today that truly protects the most common activities you do as a business or an individual online today,” said Tony Perez, CEO at Netlok. “The escalation of cybercrime demands that new solutions are found and Netlok is committed to shutting down the entry points for hackers.”
Netlokr, featuring the Photolok authentication technology, pairs its photo-based login system with a cloud-based cybervault that operates in Netlok’s own proprietary eco-system to avoid the vulnerable public pathways of the Internet. The system is designed to protect personal, business or client information and correspondence that are deemed highly confidential, sensitive or private. The Netlokr market includes individuals, groups and organizations, small and medium-sized businesses, large enterprises, government entities, celebrities and other high-profile individuals.
“CyberSecurity Breakthrough’s authentication award category was highly competitive this year, with 41 impressive nominations from a variety of leaders and innovators in the information security market,” said James Johnson, managing director, CyberSecurity Breakthrough. “We congratulate Netlok for breaking through the pack with their innovative approach to authentication to receive this recognition and we look forward to continued success for Netlok in 2018 and beyond.”
Nominations were evaluated by an independent panel of experts within the information security industry, and CyberSecurity Breakthrough judges considered authentication solutions featuring a variety of approaches, including multi-factor and password-based methods. Netlok’s patented Photolok™ technology was a stand-out among those nominated in this category, because of its innovative use of photos in the authentication system, combined with a simple set-up process and its ease-of-use.
The mission of the CyberSecurity Breakthrough Awards is to honor excellence and recognize the innovation, hard work and success in a range of information security categories, including Cloud Security, Threat Detection, Risk Management, Fraud Prevention, Mobile Security, Email Security and much more. This year’s program attracted more than 2,000 nominations from over 12 different countries throughout the world.
ABOUT NETLOK
Netlok is a cyber-security company founded on the belief that everyone has something they value and wish to keep secure and private, and it extends to the way in which they operate online. From personal information to confidential documents, to private communications with others, Internet users want to protect certain aspects of their online activities from unauthorized access. Netlok products address the need for online privacy and security using break-through photo authentication technology for file and data sharing and storage, as well as private messaging. Netlok is built for the full range of Internet users: individuals, businesses, large enterprises, organizations and associations, and government entities. These Netlok customers enjoy a highly secure, simple and affordable product that creates peace of mind for the things that matter most to them online. Netlok is based in Los Angeles, California. To learn more about the company and its security solutions, visit netlok.com.
ABOUT CYBERSECURITY BREAKTHROUGH
The CyberSecurity Breakthrough Awards program is devoted to honoring excellence in information security and cybersecurity technology companies, products and people. The CyberSecurity Breakthrough Awards provide a platform for public recognition around the achievements of breakthrough information security companies and products in categories including Cloud Security, Threat Detection, Risk Management, Fraud Prevention, Mobile Security, Web and Email Security, UTM, Firewall and more. For more information visit CyberSecurityBreakthrough.com.