Global pioneer in automated IoT security and identity management, Device Authority announces the 2025 release of its award-winning KeyScaler and KeyScaler as a Service (KSaaS) platform, which enables a more streamlined experience to simplify and strengthen the lifecycle of organisations’ unmanaged devices as well as new AI-powered capabilities that underpin the entire platform.

Attacks such as the recent Eleven11Bot botnet have again highlighted the potential vulnerabilities surrounding unmanaged IoT devices, with one-third of data breaches now involving an IoT device and over 50% of devices having critical vulnerabilities that can easily be exploited.

Coupled with increasingly complex connected environments, the clarity of an organisation’s connected device estate and intelligent, automated control of device security is ever more vital.

Device Authority’s KeyScaler 2025

This release also sees the inclusion of a new Edge Remote Access Controller 

Device Authority’s KeyScaler 2025 has been developed to further build on the accessibility, insight and automation that the platform already provides to its customers.

It comes with a significantly enhanced user-interface which not only simplifies the user journey for device onboarding and lifecycle management, but is also faster to operate, providing greater visibility and control of an organisation’s IoT identity estate.

This release also sees the inclusion of a new Edge Remote Access Controller which enforces secure, policy-based remote access to IoT and OT devices at the edge. This is particularly significant for organisations adopting the Purdue model for manufacturing as it enables the securing of device identities within segmented industrial control system layers which is pivotal to the model.

Incorporating AI-powered features

Commenting on the latest release, CEO Darron Antill said, “KeyScaler 2025 is the result of listening to our customers and the market who are requiring even greater visibility, control, and automated remediation of their unmanaged device security.”

Incorporating AI-powered features into the core platform and introducing new innovative approaches to Edge security management ensures that even the most vulnerable devices remain secure without the need for human intervention, therefore significantly reducing business risk.”

The platform’s faster and simpler integrations and ease of deployment make this an even more frictionless experience and is a further step to helping organisations achieve complete end to end device and data trust.”

Discover how AI, biometrics, and analytics are transforming casino security

In case you missed it

What are emerging applications for physical security in transportation?
What are emerging applications for physical security in transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher & Fortified enhance perimeter security solutions
Gallagher & Fortified enhance perimeter security solutions

Global security manufacturer - Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years...

Genetec: Data sovereignty in physical security
Genetec: Data sovereignty in physical security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...