GlobeNewswire by notified

Following Stryker Cyberattack, Avatier Launches Identity Challenge Card to Protect Organizations When Standard Security Fails

22.4.2026 13:00:00 CEST | GlobeNewswire by notified | Press release

Share

New Solution Delivers the First Auto-Enrolled, Air-Gapped Multi-Factor Authentication (MFA) That Can Be Deployed Enterprise-Wide in a Single Day: No Devices, Apps, or Network Connectivity Required

PLEASANTON, Calif., April 22, 2026 (GLOBE NEWSWIRE) -- The cyberattack that disrupted Stryker Corporation earlier this year exposed a vulnerability that security professionals have long warned about when attackers target an organization's identity systems, the very tools companies rely on to verify employees and restore access can become the first casualties. Today, Avatier is responding to that threat with the launch of the Identity Challenge Card, the first auto-enrolled, air-gapped Multi-Factor Authentication (MFA) solution designed to remain operational even when enterprise devices, networks, and identity platforms have been compromised.

Unlike device- or network-dependent MFA solutions, the Identity Challenge Card is a secure printed card pre-issued to each employee. Authentication requires only the physical card and a simple challenge-response exchange — no smartphone, no app, no battery, and no internet connection required.

Alongside the new product, Avatier is also highlighting its free Attack Cost Calculator at AttackCost.com, which enables executives to quantify the financial exposure of a cyberattack based on workforce size, average compensation, daily revenue, and projected system downtime.

What Happened at Stryker and Why It Matters

Public reporting on the Stryker incident indicates that attackers gained access to administrative credentials and leveraged enterprise device management tools to execute a large-scale device wipe, effectively locking employees out of their systems and disrupting internal operations across the organization.

The attack underscores a growing and troubling trend in cybersecurity: identity infrastructure has become the primary target. Compromising an organization's identity systems doesn't just open the door to data — it can bring an entire business to a halt.

Can Multi-Factor Authentication (MFA) Fail During a Cyberattack?

The short answer is yes — and understanding why requires a closer look at how most MFA solutions are built.

Multi-Factor Authentication (MFA) is a security process that requires users to verify their identity using two or more independent factors before gaining access to a system. In practice, most enterprise MFA solutions rely on a combination of three things: the user's device (typically a smartphone running an authentication app), a connected identity provider such as Microsoft Azure Active Directory or Okta, and a live network connection to facilitate the verification process.

In a sophisticated cyberattack like the one targeting Stryker, all three of these dependencies can be knocked out simultaneously. When devices are remotely wiped, employees lose access to their authentication apps. When identity providers are taken offline or compromised, the systems that validate credentials stop functioning. And when network access is disrupted, authentication requests simply cannot complete. The result: employees cannot log in, service desks cannot verify caller identity, and IT teams are left without a reliable way to restore access at scale.

This is not a theoretical failure mode. It is an increasingly common outcome in enterprise-level attacks — and it is precisely the gap that the Identity Challenge Card was designed to address.

Introducing the Identity Challenge Card: Authentication That Works When Everything Else Doesn't

Avatier's Identity Challenge Card introduces a new category of enterprise security: Universal, Air-Gapped MFA. Unlike device- or network-dependent solutions, the Identity Challenge Card is a secure printed card pre-issued to each employee. Authentication requires only the physical card and a

simple challenge-response exchange — no smartphone, no app, no battery, and no internet connection required.

Key features of the Identity Challenge Card include:

  • Auto-Enrollment at Scale: Organizations can enroll 100 percent of their workforce in as little as one day, with no device provisioning, no app installation, and no reliance on IT infrastructure.
  • One-Time Challenge Values: Each authentication uses a unique, one-time challenge value — particularly when helpdesk is validating identity. Used values are permanently invalidated and never reused, preventing replay attacks while keeping valid entries available for future use.
  • Air-Gapped by Design: Because the system operates entirely offline, it cannot be remotely compromised. There is no attack surface for credential-based intrusion or network-level exploitation.
  • Crisis Continuity: When identity systems fail, service desks can still verify callers, employees can still authenticate, and business operations can continue — even in the middle of an active attack.

Quantifying the Financial Risk: AttackCost.com

For organizations seeking to translate cyber risk into boardroom-ready financial terms, Avatier has made its Attack Cost Calculator available at no cost at AttackCost.com. Unlike broad industry breach reports, the calculator allows organizations to model their own specific exposure — factoring in workforce size, compensation levels, revenue per day, and estimated downtime — to arrive at a concrete figure that executives and CFOs can act on.

For many mid-to-large enterprises, the results are sobering: a successful identity-targeting attack can translate into losses of $10 million to $100 million or more in a matter of days.

"Cybersecurity is no longer just an IT issue, but a business continuity issue. When identity systems are compromised, companies don't just risk data exposure; they lose the ability to operate. The industry has spent years adding layers to MFA, but those layers depend on devices, networks, and identity providers that attackers can take down at the same time. We took a different approach by removing those dependencies entirely. With the IdentityChallenge Card, organizations can maintain trust, access, and productivity even in the middle of an attack. Our goal is to help companies recover quickly and keep business operations running."

— Nelson Cicchitto, CEO, Avatier

What Organizations Should Do Now

In light of the Stryker incident and the broader trend of identity-targeting attacks, security and operations executives are encouraged to take the following steps:

  • Assess your current MFA solution's dependencies, including what happens to authentication if devices are wiped or identity providers go offline.
  • Calculate your organization's financial exposure using the free Attack Cost Calculator at AttackCost.com.
  • Request a rapid deployment briefing for Identity Challenge Card to understand how your organization can achieve enterprise-wide coverage within 24 hours.
  • Visitavatier.com to learn more about the full Avatier identity security platform.

About Avatier

Founded in 1997 by Nelson Cicchitto, Avatier secures and automates the entire identity foundation so organizations can move faster, reduce risk, and empower every interaction. The Avatier platform delivers Trusted Conversational AI for Identity — automating the critical controls that enable Zero Trust and ensure compliance, including passwordless authentication, credential governance, lifecycle provisioning, and access governance. Trusted by Fortune 500 organizations across healthcare, financial services, manufacturing, energy, government, military, and education, Avatier turns identity into a measurable driver of security, productivity, and cost efficiency.

Identity Anywhere™ | avatier.com

Media Materials:

Cyber Attack Cost Calculator

Watch Stryker Attack Cost Video

Watch Stop MFA Push Bombing Video

Speak With Avatier CEO

Avatier Media Kit

Media Contacts:
Mary Marshall, Director of Communications, Avatier | +1 925-217-5170

Michele Nachum, FirecrackerPR | michele@firecrackerpr.com | firecrackerpr.com | +1 425-698-7477

Photos accompanying this announcement are available at: 

https://www.globenewswire.com/NewsRoom/AttachmentNg/e91d712a-e5d6-479e-b6c4-5f2cd7f7c01e

https://www.globenewswire.com/NewsRoom/AttachmentNg/b9242356-8466-4a5a-a925-0c10707b3d67

Subscribe to releases from GlobeNewswire by notified

Subscribe to all the latest releases from GlobeNewswire by notified by registering your e-mail address below. You can unsubscribe at any time.

Latest releases from GlobeNewswire by notified

Iveco Group signs a 150 million euro term loan facility with Cassa Depositi e Prestiti to support investments in research, development and innovation11.6.2024 12:00:00 CEST | Press release

Turin, 11th June 2024. Iveco Group N.V. (EXM: IVG), a global automotive leader active in the Commercial & Specialty Vehicles, Powertrain and related Financial Services arenas, has successfully signed a term loan facility of 150 million euros with Cassa Depositi e Prestiti (CDP), for the creation of new projects in Italy dedicated to research, development and innovation. In detail, through the resources made available by CDP, Iveco Group will develop innovative technologies and architectures in the field of electric propulsion and further develop solutions for autonomous driving, digitalisation and vehicle connectivity aimed at increasing efficiency, safety, driving comfort and productivity. The financed investments, which will have a 5-year amortising profile, will be made by Iveco Group in Italy by the end of 2025. Iveco Group N.V. (EXM: IVG) is the home of unique people and brands that power your business and mission to advance a more sustainable society. The eight brands are each a

DSV, 1115 - SHARE BUYBACK IN DSV A/S11.6.2024 11:22:17 CEST | Press release

Company Announcement No. 1115 On 24 April 2024, we initiated a share buyback programme, as described in Company Announcement No. 1104. According to the programme, the company will in the period from 24 April 2024 until 23 July 2024 purchase own shares up to a maximum value of DKK 1,000 million, and no more than 1,700,000 shares, corresponding to 0.79% of the share capital at commencement of the programme. The programme has been implemented in accordance with Regulation No. 596/2014 of the European Parliament and Council of 16 April 2014 (“MAR”) (save for the rules on share buyback programmes set out in MAR article 5) and the Commission Delegated Regulation (EU) 2016/1052, also referred to as the Safe Harbour rules. Trading dayNumber of shares bought backAverage transaction priceAmount DKKAccumulated trading for days 1-25478,1001,023.01489,100,86026:3 June 20247,0001,050.597,354,13027:4 June 20245,0001,055.705,278,50028:6 June20243,0001,096.273,288,81029:7 June 20244,0001,106.174,424,68

Landsbankinn hf.: Offering of covered bonds11.6.2024 11:16:36 CEST | Press release

Landsbankinn will offer covered bonds for sale via auction held on Thursday 13 June at 15:00. An inflation-linked series, LBANK CBI 30, will be offered for sale. In connection with the auction, a covered bond exchange offering will take place, where holders of the inflation-linked series LBANK CBI 24 can sell the covered bonds in the series against covered bonds bought in the above-mentioned auction. The clean price of the bonds is predefined at 99,594. Expected settlement date is 20 June 2024. Covered bonds issued by Landsbankinn are rated A+ with stable outlook by S&P Global Ratings. Landsbankinn Capital Markets will manage the auction. For further information, please call +354 410 7330 or email verdbrefamidlun@landsbankinn.is.

Relay42 unlocks customer intelligence with a new insights and reporting module, powered by Amazon QuickSight11.6.2024 11:00:00 CEST | Press release

AMSTERDAM, June 11, 2024 (GLOBE NEWSWIRE) -- Relay42, a leading European Customer Data Platform (CDP), is leveraging Amazon QuickSight to power its new real-time customer intelligence, reporting, and dashboard module. Harnessing the breadth and quality of customer data, the new Insights module empowers marketing teams to dive deep into customer behaviors and gain invaluable insights into the performance of their marketing programs across all online, offline, paid, and owned marketing channels. Preview of the Relay42 Insights module, in pre-beta version Key capabilities of the Relay42 Insights module include: Deep insights into customer behaviors: With the Relay42 Insights module, marketers can ask unlimited questions about their data and gain a deeper understanding of how to serve their customers more effectively. Simplicity with AI-powered querying: Marketers can use artificial intelligence to query their data using natural language search, reducing the reliance on data scientists. Us

Metasphere Labs Announces X Spaces Event on the Topic of Green Bitcoin Mining and Sound Money for Sustainability11.6.2024 10:30:00 CEST | Press release

VANCOUVER, British Columbia, June 11, 2024 (GLOBE NEWSWIRE) -- Metasphere Labs Inc. (formerly Looking Glass Labs Ltd., "Metasphere Labs" or the "Company") (Cboe Canada: LABZ) (OTC: LABZF) (FRA: H1N) is thrilled to announce an engaging Twitter Spaces event on Green Bitcoin mining, energy markets, and sustainability on July 3, 2024 at 2 p.m. ET. Follow us on X at MetasphereLabs for updates and to join the event. What We'll Discuss Bitcoin Mining Basics: Understand the fundamentals of Bitcoin mining.Energy Market Dynamics: Explore how Bitcoin mining interacts with energy markets.Sustainable Innovations: Learn about our efforts to promote sustainability in Bitcoin mining.Sound Money: Discover how tamper-proof currency can enhance stability.Efficient Payment Rails: See how fast, neutral payment systems support humanitarian projects.Carbon Footprint: Compare Bitcoin's environmental impact with traditional banking. "We're excited to host this event and dive into the critical topics of Bitcoin

World GlobeA line styled icon from Orion Icon Library.HiddenA line styled icon from Orion Icon Library.Eye