New technologies protect against the growing number of attacks

Published: 21 January 2009 y., Wednesday

 

Wincor Nixdorf ensures security at branches with an enhanced product offer called ProTect. ProTect’s three-tier concept begins with analysis of potential risks, continues with a solution portfolio for minimizing risks, and offers service components for complete monitoring of branches and systems. In response to the growing number of attacks on automated teller machines, Wincor Nixdorf is demonstrating new technologies that prevent manipulation of cards, presenting systems that withstand attempted attacks using explosives, and showing how automated teller machines and cassettes can be protected against theft.

- Wincor Nixdorf is offering a new model that helps protect card information from being copied with skimmers, and hinders spying-out (phishing) of PIN numbers.

- The company is also showing how card fraud can be avoided through additional authorization at automated teller machines using biometric identification methods. Fingerprint identification – together with detection of whether the finger is real and alive – and methods for scanning hand veins are showcased. These means of verifying identities and controlling access are regarded as especially clear, forgery-proof and user-friendly.

- The integrated ink staining system is now also available for systems from the ProCash 4000 series. Ink staining is triggered when the ATM’s cassettes are removed without authorization, or when the ATM is shaken or its position changed. The ink spray renders the banknotes completely useless.

- Also on show is innovative safe technology with a strengthened design to withstand attempted attacks with explosive gas.

The first step in Wincor Nixdorf’s three-tier security concept is a risk analysis, in which experts assess the potential threats to a bank. The bank’s various business processes, information and communications infrastructures and work environments are examined. The protection requirements of individual areas or departments are classified on the basis of this analysis, and solution concepts for protective measures are formulated under consideration of existing regulations and limitations.

The second step comprises the implementation of customized security measures, solutions and technologies, such as those described above. Additional solutions for protecting against different types of attack are also presented.

The third step involves offers for controlling and monitoring risks. An example is the linking of alarm and video systems to enable rapid detection of criminal attacks and thus protect systems and buildings.


 

Copying, publishing, announcing any information from the News.lt portal without written permission of News.lt editorial office is prohibited.

Facebook Comments

New comment


Captcha

Associated articles

New Release of Unisys Baggage Reconciliation System Helps Enhance Security and Efficiency of Baggage Handling at Airport

Unisys Corporation (NYSE: UIS) announced enhancements to its Baggage Reconciliation System (BRS) featuring more detailed information about baggage handling requirements for incoming flights, real-time monitoring and alerts of service level agreements (SLAs), and a mobile app to provide passengers with live updates on when and where to collect their bags. more »

Samsung gains tablet market share as Apple lead narrows

Samsung doubled its share of the tablet PC market in the last three months of 2012, research firm IDC has said. more »

Facebook boss insists site is not making a phone

Facebook boss Mark Zuckerberg has strongly denied the social network is planning to release its own phone. more »

Google TVs get gaming service via LG deal

The OnLive gaming service is to be made available to Google TV users, following a deal with electronics firm LG. One of a handful of firms making hardware for Google TV. LG's G2 series sets have Google's TV service built in. more »

Blackberry introduces free wi-fi calls on BBM

Blackberry has become the latest smartphone to offer free wi-fi calls to users via its own software. Research In Motion (RIM) has added the facility to its Blackberry Messenger (BBM) app, which already offered an alternative to text messages. more »

2012 SIIA CODiE Awards

We are delighted to announce that on 26th of January SafeNet Sentinel Cloud was awarded the SiiA 2012 Best Digital Rights Management Solution! more »

Anti-internet piracy law adopted by Spanish government

The Spanish government has approved tough new legislation which could see websites deemed to be trading in pirated material blocked within ten days. more »

Los Angeles World Airports Selects Unisys to Upgrade ID Card Reader System and Network

The Los Angeles World Airports (LAWA), which oversees airport operations for the city of Los Angeles, has awarded a contract modification to Unisys (NYSE: UIS) to upgrade its access control and alarm monitoring system, used to identify the 45,000 airport employees, contractors, police and others who work at the organization’s three airports. more »

Unisys Strengthens Enterprise-Class Cloud Offerings with New Version of Secure Private Cloud Solution

Unisys Corporation (NYSE: UIS) today announced Version 2 of its Unisys Secure Private Cloud Solution, the company’s flagship cloud solution for clients’ and cloud service providers’ data centers. more »

Fake Apple stores found in China

An American blogger has discovered three fake Apple stores operating in Kunming city, China. more »