Secure by Design
Wontok Prevents Malware From Reaching Its Target
Wontok’s Secure by Design philosophy and engineering design methodologies look at security from the ground up by assuming malware is already present on your desktop, mobile device, or terminal like POS or ATM. Unlike traditional antivirus or security companies which malware can easily bypass, Wontok prevents malware from reaching its target. By working at the deepest defense layer at kernel level for interception, monitoring and protection where malware resides, Wontok keeps sensitive data and transactions safe.
Patented TSX Technology
SafeCentral’s patented Trusted Security Extensions (TSX) technology locks down the operating system and blocks any malware or vulnerability-based activity on the endpoint PC. It then launches a hardened/secure session browser or VPN as required, so that web or communications sessions can run without any risk of sensitive data, identity data, logon data, etc. from being hijacked or compromised. SafeCentral also works when the endpoint device is already infected with malware and the malware is active, or where known vulnerabilities in Windows have been compromised. With SafeCentral, data is secure regardless of who (third-parties, customers, teleworkers, road warriors) or how (from any endpoint that may be infected, seriously threatened, safe or other) it is being accessed.
Financial Malware Testing Approach for Wontok SafeCentral
Wontok SafeCentral has been uniquely developed to work at the deepest kernel layer to protect transactions from modern financial malware. Wontok Labs tests against the most challenging type of malware that hides at the deepest level of the OS where it is difficult if not impossible for most security products to detect, let alone test for. To simulate real financial malware threats such as Zeus or SpyeEye, Wontok Lab maintains a financial malware “zoo” holding live strains of recent malware variants used for state of the art testing. Because dangerous new malware variants surface continuously, the Lab conducts daily tests against emergent threats and results are summarized weekly.
See our recent malware bulletins.
Third Party Assessments
Wontok actively invests in solution R&D to enhance its existing arsenal of advanced security technologies.
Wontok was recognized by Virus Bulletin’s VB Lab Experts in the VB100 in 2013, 2014 and June 2015 comparatives for technical expertise in advanced malware prevention with top rankings. Additionally, Wontok has also scored well in 2016 with official results being released soon. This will give Wontok certification in all major Windows operating systems.
Wontok SafeCentral™ has received 2013, 2014 as well as Q1, Q2 and Q3 2015 Certifications from MRG Effitas for real world Online Banking Browser Security Efficacy.
Contact Wontok today to learn more!
Cyber Threats Today
Financial Malware Goes Undetected by Traditional AV
In 2016, 85% of successful exploits occurred from the top 10 financial malware vulnerabilities. The other 15% were from approximately 900 other vulnerabilities. Fraudsters continue to unleashed new versions of Zeus, an account takeover (ATO) malware threat with frightening potential. The Trojan’s ability to bypass multifactor authentication allowed criminals to hijack a fully authenticated session and then divert funds from compromised accounts. By 2016, 89% of breaches had a financial or espionage motive.
Lying in Wait
Variants of Zeus and Citadel malware have proliferated and spread further, targeting consumer records and valuable IP in retail POS, hospitality, government, and healthcare. Most worrisome is the fact that today’s malware has been designed to lie undetected for long periods of time.
Endpoints are Vulnerable
Most APT vulnerabilities lie in transactions that take place on remote endpoints. With the emergence of smart devices capable of online shopping and banking, the past two years have seen an astounding quarter over quarter growth in mobile malware, with a major source of coming from untrusted app stores.
Malware Goes Mobile
Mobile Threats Are on the Rise
There are more active mobile devices than there are human beings. With mobile devices including tablets and smartphones growing faster than the human population, it’s no surprise that mobile is the latest focus of cyber criminals.
Rise of Mobile Money
As mobile devices become more powerful, consumers use their mobile devices for shopping, banking and payments. Across all regions of the world, much growth has been seen in the last four years in mobile money, in part driven by the wide availability of affordable handsets combined with the availability of mobile cellular network infrastructure and bandwidth speeds. This growth in mobile money transactions has spurred a greater than 100% increase in banking Trojans, keyloggers, spyware, ransomware, malware from app stores and Bitcoin stealing malware targeted specifically to mobile devices around the globe.
The mobile malware threat is particularly worrisome to the corporate world where personal BYOD devices being used at work are accessing corporate networks which can expose valuable corporate information and IP to cyber thieves.
That’s why Wontok offers malware prevention for both desktop and mobile. Download the Data Sheet to read more about mobile security