Proviatek Inc. Recognized as a 5-Star IT Services Firm on Clutch

Proviatek was conceived in 2004 with the mission to help small-to-medium sized businesses gain access to the same vital IT services that larger firms were utilizing – but at a fraction of the cost. Since Proviatek’s inception, we’ve worked hard to build not only our client relationships, but also expand the array of services we currently offer. We’re proud to be recognized by Clutch with a 5-Star rating on our profile that’s only motivated us more to continue providing the best in IT services.

Clutch is a B2B ratings and reviews firm that aims to connect buyers with authentic, verified service providers in a number of fields. To determine our ranking within their ranking of IT consultants in New York, Clutch evaluated Proviatek based on a variety of factors.

Clutch analyzed our industry expertise by looking at our wide range of clients, from leading NYC hospitals and financial firms, to top-rated restaurant groups. They also took into account what our clients are saying about us. For example, in an in-depth interview with one of our cybersecurity clients, our partner spoke with Clutch about the Proviatek team and offered them a better understanding of the level of quality we’re able to execute in our projects. It’s been extremely rewarding to hear this feedback and even learn more about what we can do to better conceive effective solutions.

Check out our first review:

Having been in the IT business for over 10 years, everyone here at Proviatek understands that having a solid brand reputation is everything in this business. Especially when working with a third-party reviews platform, opening your company up to honest and unsolicited feedback from your clients can be a giant risk. And yet, that risk can reap significant rewards. Proviatek is an agency built on the foundation of trust amongst both our colleagues and our clients, and we pride ourselves on a building.

The hard work we’ve put into our company isn’t going unnoticed, and we could not be happier about it. In fact, our high ranking on Clutch has also qualified Proviatek to be featured on their sister website, The Manifest, as one of the top IT services companies in New York, which is another platform dedicated to B2B research and reviews.

We’d like to extend a big thank you to all of our valued clients and partners. We look forward to continuing to grow our position within the IT services industry in 2019!

Will “Single Authentication” ever become a realistic idea?

We at Proviatek are oftentimes promoting single sign-on and strong authentication services to global companies and entities. We support many strong authentication form factors and methods to replace, support or supplement password-based authentication services. From the very early days of the company, we have seen as our mission to solve the complexity of authentication regimes, multitude of passwords, weak single-factor authentication services, client certificates and more. It is only natural, though, to think that complexity could be replaced with simplicity for the benefit of efficiency of the overall system, its security, and usability. At the same time, we asked ourselves if singularity also brings an increased level of systemic vulnerability should a data breach occur or credentials are compromised.

Therefore, we need to ask ourselves too, and the industry as a whole, if the idea of single strong authentication “everywhere”, “every-time” is something that is, in fact, realistic. Realism here may refer to increased systemic vulnerability, but also to more high-level things like political realism – a tendency for regimes to form distinct sovereign identities and balance inter-operational frameworks among them. On this background, it could be concluded that coherent strong authentication services can be assumed to satisfy intra-regime coherence since it involves less complexity and provides better control over many distributed and hard-to-control authentication regimes.

Ideological connotations of global cyberspace

The question around coherence of the cyberspace boils down to the question of globalization as a broader process in the world. Only too rarely are those things tied together. Instead, cyberspace is oftentimes seen as a mythic distinctive supranational entity that unilaterally declares independence from the old international framework, yet escapes the traditional issue of globalization and its challenges. Authentication solutions are at the core of the establishment of sovereigns in the global cyberspace, identities thereof and distinctive regimes and mandates for their authority.

We at Proviatek with our Safewalk platform and solutions want to provide realistic authentication solutions that can interoperate and collaborate within the diverse and multipolar context of global cyberspace, without trying to claim unipolar authority or establish monolithic global concepts or mandates for authority.

 Download PDF

Misuse of personal information

Strong authentication can (not-rightfully) act as an enabler for companies to increase the level and amount of private and sensitive information stored and managed online in the cyberspace. Indeed, strong authentication services, like biometric authentication or one-time passwords, can increase users’ level of trust and the certainty of who they say they are. Moreover, with strong authentication in place, and robust access controls and audit logging running, many services achieve a good level of security. Governments store and manage private details of their citizens online, as long as there are robust authentication services and access controls in place. Yet, endpoint security makes most of the devices vulnerable and even strongest authentication services can become void if the endpoint has been compromised.

Endpoint security is more than screen mirroring in effect, or keyloggers. Companies going global with their systems and services need to be able and willing to take and manage the risk doing so. Global cyberspace is not just profits and capabilities; it is increased risks and uncertainties (referring e.g. to a recent Australian governmental paper expressing the need to balance risks and benefits of going global with services and businesses). Globalization of markets, labor, and services also include the globalization of data misuse. With strong authentication services, one may feel secure that the users are who they say they are on a practical certainty, yet additional measures need to be taken to ensure that globalized data and, more importantly, personal data, are not misused and endanger additional measures taken to strengthen the authentication mechanisms.

Multipolarity of the world

Addressing data misuse on a global level is more challenging than within territorially divided sociopolitical context. The diversity of the world produces a multitude of forms of corruption and a wide variety of attack vectors. Single sign-on services, same authentication used across services globally and even across companies or entities, can create a vulnerable weak single spot that cannot resist a diversity of attack vectors.

Data misuse, therefore, can be a challenge for global cybersecurity. We at Proviatek aim to provide strong authentication solutions that can fulfill and act in accordance with local and particular traditions. We acknowledge that effective governance for one might be ineffective for another. Since there is barely a single global scale, there must be multitude and custom solutions as well that provide secure and reliable IAM services for any particular use or context.

 Download PDF

Strong authentication and minimum private data collection

The global cyberspace is anything but a uniform regime. Where from one corner of the cyberspace it may show up as strangely coherent and competent for global coverage, it carries along institutional settings and ideological preferences that may not be able or willing to merge together. Security of the global cyberspace, including, for example, the security of authentication services that are based on biometric identifiers, depends on additional supportive institutions and interoperability frameworks. Biometric information and processing of biometric identifiers as a component of the authentication process is an inherently sensitive process. Strong authentication is oftentimes equated to biometric authentication, such as fingerprint scanning as an additional component for endpoint security in mobile devices.

Security of strong authentication mechanisms relies on more than technical solutions and architectures. Most strong authentication mechanisms need to process sensitive information, biometric in the worst case, in order to achieve a sufficient level of strength. The level of security of those systems ultimately depends on the level of security of the institutions its security is based on. This does refer to more than just corporate security. Comprehensive cybersecurity environment also requires lawful and covert accesses and visibility, something that is usually out of the scope of the corporate environment, yet something they need to take into account. In the global context, the range of lawful and covert interceptors may be unknown and include also hostile entities. Companies therefore, need to reevaluate the data they choose to process and consider their responsibility towards their stakeholders’ private and sensitive data, oftentimes minimize it in order to avoid/decrease risk.

Some companies may uphold a false or an outdated sense of trust and, thus, end up deploying identifiers and mechanisms that will ultimately expose their respective users to heavier risk of identity theft, industrial espionage and beyond. This can also become a business liability and a difficult risk to manage. Yet, modern data protection principles like GDPR put all the responsibility of reasonable protection on the data controller, which is the company running the services at the highest level in many cases.

We at Proviatek will ensure that we do our part, and that our applications do not collect or process any more private or sensitive data for the purposes of authentication other than what is necessary. Furthermore, we are glad to assist our clients to ensure that they do not expose their customers to further risks regarding privacy and protection of private data (e.g. biometric identifiers).

 Download PDF