Search
Close this search box.

How hardering and security works

Administration of security patches and attention to vulnerabilities through security agents installed in ATMs, which monitor and manage every aspect of their security.

Benefits

  • Analysis and correction of vulnerabilities in a timely manner.
  • Implementation of security controls.
  • Remote software updates.

 

Supplementary modules

  • Security module and monitoring agents.

Solution features

Ongoing and effective compliance with international safety policies and regulations, by means of:

Ongoing assessment

Continuously monitoring the security configurations of every endpoint to analyze their real-time compliance status based on standards such as CIS (Center for Internet Security), DISA (Defense Information System Agency), STIG (Security Technical Implementation Guides), or PCI (Payment Card Industry).

Real-time detection of deviations

Identifying in real time any deviation from the system hardening baseline configuration per ATM to restore it to the proper state by following the established guidelines and thus reduce the attack surface.

Comprehensive analysis and reporting

Monitoring the current status and history of security configurations, patches, and vulnerabilities for each device.

Equipment monitoring

Validating the maintenance status of the antivirus installed in each device, specifically to ensure that the antivirus is running correctly.

Early vulnerability detection

Based on the Open Vulnerability & Assessment Language (OVAL) published by CIS and on the vulnerabilities of the Windows operating system, as well as the identification of vulnerabilities in third-party tools.

PCI Compliance
PCI compliance analysis for each device within scope.
Application of modifications
All configurations are tested in secure environments.

Tell us what you need
With our technology, we will build the solution to make your business idea a reality together.