Title: HQ in Israel Threat research, security
1Versafes Real Time Anti-Fraud Technology
Services
- A proven solution for eliminating Online threats
- Phishing Trojans Pharming
2About the Company
- HQ in Israel
- Threat research, security operations center
24/7. - In-depth understanding and insight into how
cyber crime works. - Over 10 million online identities are already
protected.
3The risk outside the organization walls
Employees
Anti Virus
IPS
SSL VPN, Webmail,..
Firewall
Customers
Online Services
Hacker
4The Risk
5Versafe Solution
Online fraud prevention focusing on Identity
Protection and Transaction Integrity.
Completely clienteles while solving problems
like MITB, MITM identifying infected end-user
machines, Phishing attacks set-up (!), Pharming
attacks and all in REAL-TIME. Bottom line
ZERO impact on user experience, MINIMAL
implementation and very comprehensive fraud
PROTECTION. Versafe solution is implemented in
various environments, such as eBanking,
insurance, Gaming and ecommerce.
6Versafe Solution Architecture
vScan
vDomain
vCrime
vSpam
vHTML
vTrack
vSpy
Versafe Cloud
vTrojan
vToken
vCrypt
vSocial
vSOC
vMonitor
vPharming
vCert
Organization Web Application
vTrojan - Detection Analysis Forensics
Trojan, CC, DropZone, Malicious Script,
Configuration Files, Mule Accounts And Credential
Recovery
vToken - Automatic Malicious Activity Detection
vSOC - Security Operation Center - Analysis
Takedown Fraud, Phishing, Trojan Pharming
vMobile - Secure Web Native Mobile Application
vSPAM - Spam Collection And Spam Analysis
vSocial - Monitoring Fraud In Social Networks
vHTML - HTML Modification Detection
vDomain - Detection Similar Domains
vTrack - Website Copy Detection
vCrypt - Applaication Layer Encryption
vCert - Man In The Middle Detection
vScan - Scanning For Similar Website
vPharming - DNS hijacking Detection MITM
Intelligence
vCrime - CyberCrime Intelligence
vMonitor - Monitoring Old Fraud
vSpy - Monitoring Hacker Communities
vAlert System
vMobile
7(No Transcript)
8 Phishing What needs to be asked
- How long does it take to detect a Phishing site?
- When did the phishing site go on the air?
- Who is the attacker?
- How many victims?
- Who are these victims?
9Anti-Phishing Our Response
- Faster response, shorter up times
- Real time alerts
- Take down of fraud sites within four hours of
detection - Blacklisting on browsers
- Disinformation of the attacker
- Detection of affected users
- Collecting forensic information
10Anti-Phishing solution
- Versafe enables the immediate detection of a
Phishing attack.
- Versafe provides the organization with useful
information - Instant detection of phishing site setup
- The attackers IP
- Number of victims that logged into the phony site
- Usernames and IPs of victims
- Fast take down of the phishing site
11(No Transcript)
12Trojans what needs to be asked
- How can I neutralize end-users Trojans
transparently?
- Who are my infected users?
- What can I do once I found out a user is
infected? - How do I prevent a Trojan from stealing my
customers credentials? - How can I protect the customers from automatic
transactions?
13Trojans what we do
- Prevention, damage mitigation, identification of
an infected PC - vCrypt - Encryption in the application layer
- vHTML - Detect Malicious Code Injection in the
client side - vHTML - Detect Infected Computers
- Advanced Virtual Keyboard (Anti key loggers,
Anti screenshot and Anti click position) - vToken - Transaction Authentication Integrity
(Encryption, Verification and Automation)
14vTrojan (Advanced Malware Analysis Center)
- Trojan Intelligence
- Automatic scanning collecting for
- User Credentials in Trojan Drop Zones
- Dedicated Trojans
- Malicious Command Control (CC)
- Mule Accounts
- Malware DNS/Servers Monitoring
- Information collecting from hacker communities
- Malware honeypots technologies
- Collect Partners Feeds
15Anti Trojans solution
- Versafe neutralizes the effects of Trojans
transparently
- Versafe provides the organization with useful
information - Infected users are reported to the organization
- There is no need for intervention by the user
- Advanced encryption disables Trojan functionality
- There is no need for compliance or cooperation by
the user
16(No Transcript)
17Pharming What needs to be asked
- How many users connect to the organization over
a tapped network connection?
- Who are these users?
- Where have they logged in from?
- Who is the attacker?
- How do I prevent a Pharmer harvesting useful
data?
18Pharming Our Response
- Versafe enables the organization to know of each
user that logs in from an unsecure location, in
real time.
- Versafe provides the organization with useful
information - Identities of Pharming victims
- Location and IP of compromised router
- IP of the attacker
- Advanced encryption renders harvested data useless
19Solution Browsers Languages
20Native Applications Components Java for Android C
Objective for iPhone
Web Application Components
Malware detection
Malware detection
Application level encryption
Application level encryption
Pharming detection
Certificate checks
Phishing detection
Virtual keyboard
Virtual keyboard
21Versafe protects your customers employees
Anti Virus
Employees
IPS
SSL VPN, Webmail,..
Firewall
Online Services
Customers
Hacker
22Summary
- Enables organizations to become proactive, faster
- Fast implementation on the organizations
websites - No installation of software on the end user side
- Real time detection of identity theft
- Supply the organization with critical information
- Neutralize identity theft by Phishing, Trojans
and Pharming
23Questions...
- E info_at_versafe-login.com
- T 972-3-9622655 104
- F 972-3-9511433