Authentiums VirtualATM technology significantly limits the threat posed by online thieves and helps satisfy new FFIEC regulations. Financial institutions and their clients are currently facing a deluge of security threats. Consumers are regularly deceived by phishing e-mails, which pose as legitimate messages from financial institutions and attempt to coax personal information and passwords from victims. In addition, malicious spyware and screen-scraper technology embedded by hackers in seemingly harmless websites, downloads or e-mail can log keystrokes, capturing log-on data without the user even noticing. In response, banks are looking to a variety of security technologies that meet or exceed industry regulations calling for stronger defenses. The FFIEC is mandating that online businesses implement stronger security technologies by the end of the year. Among the requirements, all consumer online banking must be protected by two-factor authentication, meaning that all online consumers must use two separate processes for accessing account information. Financial institutions can purchase Authentiums VirtualATM SDK to build their own branded solutions. When implemented, end users receive a thin client from the VirtualATM-enabled bank immediately after logging in to their accounts. The client creates a secure tunnel to the banks website, while locking down the users desktop. The client halts interaction with other desktop applications, such as keystroke loggers, spyware or other malicious agents. Many ISPs, such as Cox Communications, are already using Authentium technology as part of their branded security suites; These ISPs now can embed the VirtualATM technology into their offerings and offer the highest protection for users conducting financial business. Authentiums solution is based on the companys trusted security extensions toolkit, which watches web-based interactions and can monitor attempts to interfere with those interactions. Authentium developed the core technology over the past five years to ensure it is seamless and does not adversely interfere with end user actions. How it works Authentiums VirtualATM technology creates a direct, secure connection between an end users computer and a third-party web site, such as a bank. The connection is based on Authentiums proprietary trusted security extensions, a toolkit that allows applications to monitor and intercept any interactions with fundamental portions of a computers operating system. Developers use trusted security extensions to build functionality that intercepts device driver installations and other system events, or any computer activity that requires the processor to function. Since the functionality is broad reaching, developers are afforded tremendous flexibility in building various security solutions, such as anti-spyware or firewall products, which react based on insidious attempts to hijack computer resources. VirtualATM uses trusted security extensions to block third parties from interfering with Internet data transactions. For example, VirtualATM eliminates the threat of keyloggers by prohibiting keylogger applications from running, since these applications would initiate events with the processor. VirtualATM initiates a virtual private network over IP from the end user to the bank. The combination of this VPN link and the locked-down end user machine means that, while that user is logged into a website powered by VirtualATM, no one can interfere with that session, either while the data is in transit or by virtue of spyware installed on the users machine. Pricing and availability Authentiums VirtualATM is available today. It is priced on a project-by-project basis and is sold to financial institutions, banks and ISPs who would like to create secure end-to-end connections for their users.
Every day we send out a free e-mail with the most important headlines of the last 24 hours.
Subscribe now