Every few months, reports on a new variant of ATM Malware are published. Financial Institutions report more and more losses related to Malware Attacks. Checker ATM Security’s Whitelist feature completely prevents Malware intrusion on an ATM.
There are many ways that viruses can infect an ATM; through the Network, a Technician’s USB Storage Device, Compromised Software Installation and so on. Using Checker, your ATM will be 100% Secure and you will not need to purchase additional Antivirus Software.
A Service Technician or Hacker can easily install Malware, Viruses, or Accidentally Crash the Operating System. The damage caused can range from the ATM requiring a Software Re-Installation, through to loss of Cash and a Tarnished Reputation for the ATM Deployer. Checker ATM Security Manages all Software Process and will Not Allow Unauthorized changes to an ATM’s Software.
Checker ATM Security® preserves your ATM Application Software, Libraries and Operating System Integrity, leveraging Cryptographic Signatures and Hard Disk Encryption designed specifically for ATMs.
Checker state-of-the-art technology:
Centralized, Comprehensive Security Administration and Monitoring; ranging from Operator Alerts to a Management-Level Dashboard, is built on top of Checker’s “Best-of-Breed Cyber Protection Technology”, to ensure this Incredible Combination of Security Features can be Properly, Easily and Securely Managed in Large, diverse Multi-Vendor ATM Networks in Complex Organizations.
Integrity Validation of critical Operating System Processes and Resources.
Any Detected Alteration will be Reported.
Use of Operating System Resources (Registry, Libraries and Drivers) is Granted or Denied on a process-by-process basis.
Non-Permitted Attempts at use of Resources will be Blocked and Reported.
Supports different Versions, “Fix Packs”, Service Packs, and so on, of the Operating System deployed in an ATM Network.
Integrity Validation Supports Different Versions of the same (authorized) Program or Resource.
Detects the Connection of New Hardware and Allows or Denies “Mounting” or “Access”.
Unauthorized Devices are Blocked and Reported.
Use of Connected Hardware filtered on a Process-by-Process basis.
Non-Permitted use of Connected Hardware is Blocked and Reported.
Reliable Control of Authorized USB drives for Easy, yet Secure Maintenance. Supports Content Encryption and Authentication of Authorized USB Drives.
Access to Local Files and Directories is Granted or Denied on a Process-by-Process basis.
Attempts at Illegal Access to Restricted Data are Blocked and Reported.
Integrity Validation of Sensitive Data Files.
Attempts at Illegally Altering Data are Blocked and Reported.
Detection of Track 2 Data Storage in-the-clear.
Attempting to Write Data that follows a Track 2 Pattern will be Reported.
Filtering of Incoming and Outgoing Communications by Protocol, Port, Address and Local Process provides High Level “Firewalling” Functionality matching the Data to the Process Whitelist.
Attempts at Non-Permitted Communications are Blocked and Reported.
Checker-Managed IPSec Tunneling enables Encrypted Communications between existing Applications in ATMs and Servers with no need to modify the Applications.
Permitted Communication is Tunneled Transparently.
ATM Hard Disk Drive Encryption can be Fully Managed from the Checker Console, including issuing Remote Commands to Encrypt or Decrypt ATM Hard Disk Drives. Key Management is Automatic and Completely Transparent to the User.
Once an Instruction to Encrypt a Hard Disk Drive, has been issued from the Server, the Encryption Process is undertaken whilst the ATM remains in an Operational State, and hence there is no relevant downtime associated with the Encryption of an ATM network.
To add another layer of Security; Decryption of the ATM Hard Disk Drive is only possible whilst that Encrypted Hard Disk Drive is in a “Specified ATM Environment”. The ATM Environment is defined as a Configurable Combination of Identifiers Associated to: the ATM Hard Disk Drive, the ATM Hardware and the ATM Network.
Whitelisting creates a List of Permitted and Approved Processes that are allowed to run on the ATM. Processes not included in this list are Blocked and Reported.
A Self-Learning Feature allows Whitelist Creation in a matter of minutes.
Use of Local Resources (Files, Directories, Libraries and Drivers) filtered by Whitelisted Process.
Any Attempt at Non-Permitted use of Resources is Blocked and Reported.
The “Java Virtual Machine” feature is critical to the operation of the ATM Applications, however most Whitelisting Solutions do not Manage or Control the Resources used by the Java Virtual Machine. Checker ATM Security Manages and Controls a detailed list of All Resources loaded by the Java Virtual Machine.
Attempted Loading of Non-Permitted Java Virtual Machine Resources are Blocked and Reported.
Send this to a friend