Upload
shayne-christine
View
220
Download
1
Tags:
Embed Size (px)
Citation preview
• HQ in Israel
• Threat research, security operations center 24/7.
• In-depth understanding and insight into how ‘cyber
crime’ works.
• Over 10 million online identities are already
protected.
The risk outside the organization walls
Firewall
IPS
Anti Virus Employees
Customers
SSL VPN, Webmail..,
Online Services
Hacker
The Risk
Online fraud prevention focusing on Identity Protection and Transaction Integrity.
Completely clienteles while solving problems like MITB, MITM identifying infected end-user machines, Phishing attacks set-up (!), Pharming attacks – and all in REAL-TIME.
Bottom line: ZERO impact on user experience, MINIMAL implementation and very comprehensive fraud PROTECTION.
Versafe solution is implemented in various environments, such as eBanking, insurance, Gaming and ecommerce.
Versafe Solution Architecture
OrganizationWeb Application
vTrack
vCrypt
vHTML
vCert
Versafe Cloud
vAlert System
vScanvDomain
vSpam
vTrojan
vSocial
vMonitor
vMobile
vPharming
vCrime
vSpy
vToken
vSOC
vTrack - Website Copy DetectionvCrypt - Applaication Layer EncryptionvHTML - HTML Modification Detection
vCert - Man In The Middle DetectionvToken - Automatic Malicious
Activity DetectionvMobile - Secure Web & Native
Mobile ApplicationvScan - Scanning For Similar
WebsitevDomain - Detection Similar
Domains
vSPAM - Spam Collection And Spam Analysis
vCrime - CyberCrime IntelligencevTrojan - Detection & Analysis & Forensics Trojan, C&C, DropZone,
Malicious Script, Configuration Files, Mule Accounts And Credential Recovery
vSocial - Monitoring Fraud In Social NetworksvMonitor - Monitoring Old FraudvSpy - Monitoring Hacker
Communities
vPharming - DNS hijacking Detection & MITM Intelligence
vSOC - Security Operation Center - Analysis & Takedown Fraud, Phishing, Trojan & Pharming
How long does it take to detect a Phishing site?
When did the phishing site go on the air? Who is the attacker? How many victims? Who are these victims?
Faster response, shorter up times
Real time alerts Take down of fraud sites within four hours of detection Blacklisting on browsers Disinformation of the attacker Detection of affected users Collecting forensic information
Versafe enables the immediate detection of a Phishing attack.
Versafe provides the organization with useful information: Instant detection of phishing site setup The attacker’s IP Number of victims that logged into the phony site Usernames and IP’s of victims Fast take down of the phishing site
Trojans – what needs to be asked
How can I neutralize end-users’ Trojans transparently?
Who are my infected users? What can I do once I found out a user is infected? How do I prevent a Trojan from stealing my customers
credentials? How can I protect the customers from automatic
transactions?
Prevention, damage mitigation, identification of an infected PC
vCrypt - Encryption in the application layervHTML - Detect Malicious Code Injection in the client sidevHTML - Detect Infected ComputersAdvanced Virtual Keyboard (Anti key loggers, Anti screenshot and Anti click position)
vToken - Transaction & Authentication Integrity (Encryption, Verification and
Automation)
Trojan Intelligence Automatic scanning & collecting for:
User Credentials in Trojan Drop Zones Dedicated Trojans Malicious Command & Control (C&C) Mule Accounts
Malware DNS/Servers Monitoring Information collecting from hacker communities Malware honeypots technologies Collect Partners Feeds
Versafe neutralizes the effects of Trojans transparently
Versafe provides the organization with useful information: Infected users are reported to the organization There is no need for intervention by the user Advanced encryption disables Trojan functionality There is no need for compliance or cooperation by the
user
How many users connect to the organization over a tapped network connection?
Who are these users? Where have they logged in from? Who is the attacker? How do I prevent a “Pharmer” harvesting useful data?
Versafe enables the organization to know of each user that logs in from an unsecure location, in real time.
Versafe provides the organization with useful information:
Identities of Pharming victims Location and IP of compromised router IP of the attacker Advanced encryption renders harvested data useless
Malware detectionMalware detection
Application level encryption
Application level encryption
Native Applications Components
Java for AndroidC Objective for iPhone
Web Application Components
Certificate checksCertificate checks
Virtual keyboardVirtual keyboard
Malware detectionMalware detection
Application level encryption
Application level encryption
Pharming detectionPharming detection
Virtual keyboardVirtual keyboard
Phishing detectionPhishing detection
Versafe protects your customers & employees
Firewall
IPS
Anti VirusEmployees
Customers
SSL VPN, Webmail..,
Online Services
Hacker
Enables organizations to become proactive, faster
Fast implementation on the organization’s websites
No installation of software on the end user side
Real time detection of identity theft
Supply the organization with critical information
Neutralize identity theft by Phishing, Trojans and Pharming
E [email protected] T +972-3-9622655 #104
F +972-3-9511433