checker ATM security currently protects more than
Every few months, reports on a new variant of ATM malware are published. Financial Institution reports more and more about losses, related to malware attacks. Checker ATM security whitelist feature completely prevent malware intrusion on ATM.
Exists a lot of ways how viruses can come to ATM : network, infected technical engineer USB storage, infected software installation. Using Checker, your ATM will 100% secure and you will no need to buy additional Antivirus SW.
Engineer or hacker can install malware or viruses or simply accidentally to crash a Operating System. Minimal losses will ATM reinstallation, biggest - stolen money and spolied reputation. Checker ATM security fully manage all process and will not allow to make any hidden system changes.
scroll down to read more about checker ATM security features
Checker preserves your ATM application software, libraries and operating system integrity, leveraging cryptographic signatures and Hard Disk Encryption designed specifically for ATMs.
Checker state-of-the-art technology:
Centralized, comprehensive security administration and monitoring, ranging from operator alerts to management-level dashboard, is built on top of checker's best of breed cyber protection technology to ensure this amazing combination of security features can be properly, easily and securely managed in large, diverse multi-vendor ATM networks in complex organizations.
Integrity validation of critical operating system processes and resources.
Any detected alteration will be reported.
Use of operating system resources (registry, libraries and drivers) is granted or denied on a process-by-process basis.
Non permitted use of resources will be blocked and reported.
Supports different versions, fix packs, service packs, ... of the operating system deployed in an ATM network.
Integrity validation supports different versions of the same (authorized) program or resource.
Detects the connection of new hardware and allows or denies mounting.
Unauthorized devices will be blocked and reported.
Use of connected hardware filtered on a process-by-process basis.
Non permitted use of connected hardware will be blocked and reported.
Reliable control of authorized USB drives for easy, yet secure maintenance. Supports content encryption and authentication of authorized USB drives.
Access to local files and directories is granted or denied on a process-by- process basis.
Illegal access to restricted data will be blocked and reported.
Integrity validation of sensitive data files.
Data illegally altered will be blocked and reported.
Detection of track2 data storage in the clear.
Writing data that follows a track2 pattern will be reported.
Filtering of incoming and outgoing communications by protocol, port, address and local process provides high level firewalling functionality matching the process whitelist.
Non permitted communications will be blocked and reported.
Checker-managed IPSec tunneling enables encrypted communications between existing applications in ATMs and servers with no need to modify the applications.
Permitted communication will be transparently tunneled.
ATM hard disks encryption can be fully managed from the Checker console, including remote commands to encrypt or decrypt ATM disks. Key management is automatic and transparent to the user.
The encryption can be commanded from the server and the disk can undergo the encryption process while the ATM keeps operating, so there is no relevant downtime associated to the encryption of an ATM network.
Decryption is only possible for a specified ATM environment. ATM environment is defined as a configurable combination of identifiers associated to the ATM hard disk, the ATM hardware and the ATM network.
List of permitted and approved processes. Processes not included in this list will be blocked and reported.
Self-learning feature allows whitelist creation in a matter of minutes.
Integrity validation of whitelisted process and its resources.
Processes or resources illegally altered will be blocked and reported.
Use of local resources (files, directories, libraries and drivers) filtered by whitelisted process.
Non permitted uses of resources will be blocked and reported.
Detailed list of all resources loaded by the Java Virtual Machine (this feature is critical but not provided by most whitelisting solutions).
Loading of non permitted Java resources will be blocked and reported.
Member of European ATM Security Team (EAST)
Official partner of CashPhenix
Official partner of GMV
The SPL StopSkimmer solution offers a reliable, high-quality and affordable solution against various types of skimming including deep insert skimming, digital, analogue and stereo skimming. Skimming remains one of the most popular and well-known ATM frauds. Today, attackers are more sophisticated and are relentless in their efforts to outsmart the ATM security industry.
ATM Armor is a state-of- the-art hardware product designed specifically to protect ATMs from Black Box and malware attacks. The SPL Group provides consulting, installation and sales of the ATM Armor product.