updated August 2019

The sensitivity of actual keying records has been a mainstay of InstaKey® Security Systems for years. As such, security of those records has been a cornerstone of all software and administrative programs implemented by InstaKey® Security Systems for the past decade. When InstaKey® Security Systems began exploring the concept of using the Internet for communication of this type of information, security of that data became the number one priority.

Extensive work has been done and continues to be done to ensure the security of this data – the End User Client’s data. Working collectively with many Department of Defense clients and E-commerce protocols, we chose to use their security modeling standards as collected, regularly updated and published by the IETF (Internet Engineering Task Force). Such standards currently include the use of firewalls, secure socket layers (TLS), circuit level and application gateways, proxy servers, PGP, digital certificates, etc. all working in concert with each other to ensure the data security of the particular InstaKey® Security Systems client and their particular computer system.

InstaKey® Security Systems’ applications available via have the following data encryption/data protection features built in:

InstaKey® Security Systems also engages a third-party security consultant quarterly to actively scan InstaKey® Security Systems public IP addresses for vulnerabilities which is followed by recommendations for remediation. This scan actively searches for all open ports and protocols available and probes the associated resource for weaknesses. We also do application penetration testing to search for weaknesses within our applications.

InstaKey® Security Systems’ commitment to its clients shall be to stay at the forefront of data protection for its Software as a Service (SAAS) cloud-based solutions.

US Patents: 7,120,935 | 7,653,945 | 7,702,913 | 7,844,823 | 7,840,010 | 7,861,314