How hardering and security works
Administration of security patches and attention to vulnerabilities through security agents installed in ATMs, which monitor and manage every aspect of their security.
Benefits
- Analysis and correction of vulnerabilities in a timely manner.
- Implementation of security controls.
- Remote software updates.
Supplementary modules
- Security module and monitoring agents.
Solution features
- Early detection of patches and vulnerabilities.
- Security configuration management: Addresses any configuration errors that compromise the data security of the operating system or of third-party applications that use unsecured ports, as well as inadequate or unnecessary accesses, generic accounts, port blocking, password parameters, folder permissions, antivirus status, and more, in order to protect the endpoint data from intruders.
- Equipment protection: Each ATM model is analyzed to determine the ideal security level setting to achieve a balance between device operability and the implementation of security controls to protect against different types of cyber-attacks.
Ongoing and effective compliance with international safety policies and regulations, by means of:
Ongoing assessment
Continuously monitoring the security configurations of every endpoint to analyze their real-time compliance status based on standards such as CIS (Center for Internet Security), DISA (Defense Information System Agency), STIG (Security Technical Implementation Guides), or PCI (Payment Card Industry).
Real-time detection of deviations
Identifying in real time any deviation from the system hardening baseline configuration per ATM to restore it to the proper state by following the established guidelines and thus reduce the attack surface.
Comprehensive analysis and reporting
Monitoring the current status and history of security configurations, patches, and vulnerabilities for each device.
Equipment monitoring
Validating the maintenance status of the antivirus installed in each device, specifically to ensure that the antivirus is running correctly.
Early vulnerability detection
Based on the Open Vulnerability & Assessment Language (OVAL) published by CIS and on the vulnerabilities of the Windows operating system, as well as the identification of vulnerabilities in third-party tools.