Presentation is loading. Please wait.

Presentation is loading. Please wait.

HQ in Israel Threat research, security operations center 24/7. In-depth understanding and insight into how cyber crime works. Over 10 million online identities.

Similar presentations


Presentation on theme: "HQ in Israel Threat research, security operations center 24/7. In-depth understanding and insight into how cyber crime works. Over 10 million online identities."— Presentation transcript:

1

2 HQ in Israel Threat research, security operations center 24/7. In-depth understanding and insight into how cyber crime works. Over 10 million online identities are already protected.

3 The risk outside the organization walls Firewall IPS Anti Virus Employees Customers SSL VPN, Webmail,.. Online Services Hacker

4 The Risk

5 Online fraud prevention focusing on Identity Protection and Transaction Integrity. Completely clienteles while solving problems like MITB, MITM identifying infected end-user machines, Phishing attacks set-up (!), Pharming attacks – and all in REAL-TIME. Bottom line: ZERO impact on user experience, MINIMAL implementation and very comprehensive fraud PROTECTION. Versafe solution is implemented in various environments, such as eBanking, insurance, Gaming and ecommerce.

6 Versafe Solution Architecture Organization Web Application vTrack vCrypt vHTML vCert Versafe Cloud vAlert System vScan vDomain vSpam vTrojan vSocial vMonitor vMobile vPharming vCrime vSpy vToken vSOC vTrack - Website Copy Detection vCrypt - Applaication Layer Encryption vHTML - HTML Modification Detection vCert - Man In The Middle Detection vToken - Automatic Malicious Activity Detection vMobile - Secure Web & Native Mobile Application vScan - Scanning For Similar Website vDomain - Detection Similar Domains vSPAM - Spam Collection And Spam Analysis vCrime - CyberCrime Intelligence vTrojan - Detection & Analysis & Forensics Trojan, C&C, DropZone, Malicious Script, Configuration Files, Mule Accounts And Credential Recovery vSocial - Monitoring Fraud In Social Networks vMonitor - Monitoring Old Fraud vSpy - Monitoring Hacker Communities vPharming - DNS hijacking Detection & MITM Intelligence vSOC - Security Operation Center - Analysis & Takedown Fraud, Phishing, Trojan & Pharming

7 Phishing Pharming

8 How long does it take to detect a Phishing site? When did the phishing site go on the air? Who is the attacker? How many victims? Who are these victims?

9 Faster response, shorter up times Real time alerts Take down of fraud sites within four hours of detection Blacklisting on browsers Disinformation of the attacker Detection of affected users Collecting forensic information

10 Versafe enables the immediate detection of a Phishing attack. Versafe provides the organization with useful information: Instant detection of phishing site setup The attackers IP Number of victims that logged into the phony site Usernames and IPs of victims Fast take down of the phishing site

11 Trojans Pharming Phishing

12 Trojans – what needs to be asked How can I neutralize end-users Trojans transparently? Who are my infected users? What can I do once I found out a user is infected? How do I prevent a Trojan from stealing my customers credentials? How can I protect the customers from automatic transactions?

13 Prevention, damage mitigation, identification of an infected PC vCrypt - Encryption in the application layer vHTML - Detect Malicious Code Injection in the client side vHTML - Detect Infected Computers Advanced Virtual Keyboard (Anti key loggers, Anti screenshot and Anti click position) vToken - Transaction & Authentication Integrity ( Encryption, Verification and Automation )

14 Trojan Intelligence Automatic scanning & collecting for: User Credentials in Trojan Drop Zones Dedicated Trojans Malicious Command & Control (C&C) Mule Accounts Malware DNS/Servers Monitoring Information collecting from hacker communities Malware honeypots technologies Collect Partners Feeds

15 Versafe neutralizes the effects of Trojans transparently Versafe provides the organization with useful information: Infected users are reported to the organization There is no need for intervention by the user Advanced encryption disables Trojan functionality There is no need for compliance or cooperation by the user

16 Pharming Trojans Phishing

17 How many users connect to the organization over a tapped network connection? Who are these users? Where have they logged in from? Who is the attacker? How do I prevent a Pharmer harvesting useful data?

18 Versafe enables the organization to know of each user that logs in from an unsecure location, in real time. Versafe provides the organization with useful information: Identities of Pharming victims Location and IP of compromised router IP of the attacker Advanced encryption renders harvested data useless

19

20 Malware detection Application level encryption Native Applications Components Java for Android C Objective for iPhone Web Application Components Certificate checks Virtual keyboard Malware detection Application level encryption Pharming detection Virtual keyboard Phishing detection

21 Versafe protects your customers & employees Firewall IPS Anti Virus Employees Customers SSL VPN, Webmail,.. Online Services Hacker

22 Enables organizations to become proactive, faster Fast implementation on the organizations websites No installation of software on the end user side Real time detection of identity theft Supply the organization with critical information Neutralize identity theft by Phishing, Trojans and Pharming

23 E T #104 F


Download ppt "HQ in Israel Threat research, security operations center 24/7. In-depth understanding and insight into how cyber crime works. Over 10 million online identities."

Similar presentations


Ads by Google