Wontok's Secure by Design Approach Against Cyber Threats

Secure by Design

Wontok Prevents Malware From Reaching Its Target

Wontok’s Secure by Design philosophy and engineering design methodologies look at security from the ground up by assuming malware is already present on your desktop, mobile device, or terminal like POS or ATM. Unlike traditional antivirus or security companies which malware can easily bypass, Wontok prevents malware from reaching its target. By working at the deepest defense layer at kernel level for interception, monitoring and protection where malware resides, Wontok keeps sensitive data and transactions safe.

linedownarrow

Patented TSX Technology

SafeCentral’s patented Trusted Security Extensions (TSX) technology locks down the operating system and blocks any malware or vulnerability-based activity on the endpoint PC. It then launches a hardened/secure session browser or VPN as required, so that web or communications sessions can run without any risk of sensitive data, identity data, logon data, etc. from being hijacked or compromised.  SafeCentral also works when the endpoint device is already infected with malware and the malware is active, or where known vulnerabilities in Windows have been compromised.  With SafeCentral, data is secure regardless of who (third-parties, customers, teleworkers, road warriors) or how (from any endpoint that may be infected, seriously threatened, safe or other) it is being accessed.

 

lineuparrow

Financial Malware Testing Approach for Wontok SafeCentral

Wontok SafeCentral has been uniquely developed to work at the deepest kernel layer to protect transactions from modern financial malware. Wontok Labs tests against the most challenging type of malware that hides at the deepest level of the OS where it is difficult if not impossible for most security products to detect, let alone test for. To simulate real financial malware threats such as Zeus or SpyeEye, Wontok Lab maintains a financial malware “zoo” holding live strains of recent malware variants used for state of the art testing. Because dangerous new malware variants surface continuously, the Lab conducts daily tests against emergent threats and results are summarized weekly.

See our recent malware bulletins.

linedownarrow

Third Party Assessments

Wontok actively invests in solution R&D to enhance its existing arsenal of advanced security technologies.

Wontok was recognized by Virus Bulletin’s VB Lab Experts in the VB100 in 2013, 2014 and June 2015 comparatives for technical expertise in advanced malware prevention with top rankings. Additionally, Wontok has also scored well in 2016 with official results being released soon. This will give Wontok certification in all major Windows operating systems.

VB100

Wontok SafeCentral™ has received 2013, 2014 as well as Q1, Q2 and Q3 2015 Certifications from MRG Effitas for real world Online Banking Browser Security Efficacy.

 

Contact Wontok today to learn more!

lineuparrow

Cyber Threats Today

Financial Malware Goes Undetected by Traditional AV

In 2016, 85% of successful exploits occurred from the top 10 financial malware vulnerabilities. The other 15% were from approximately 900 other vulnerabilities. Fraudsters continue to unleashed new versions of Zeus, an account takeover (ATO) malware threat with frightening potential. The Trojan’s ability to bypass multifactor authentication allowed criminals to hijack a fully authenticated session and then divert funds from compromised accounts. By 2016, 89% of breaches had a financial or espionage motive.

Lying in Wait

Variants of Zeus and Citadel malware have proliferated and spread further, targeting consumer records and valuable IP in retail POS, hospitality, government, and healthcare. Most worrisome is the fact that today’s malware has been designed to lie undetected for long periods of time.

Endpoints are Vulnerable

Most APT vulnerabilities lie in transactions that take place on remote endpoints. With the emergence of smart devices capable of online shopping and banking, the past two years have seen an astounding quarter over quarter growth in mobile malware, with a major source of coming from untrusted app stores.

linedownarrow

Malware Goes Mobile

Mobile Threats Are on the Rise

There are more active mobile devices than there are human beings. With mobile devices including tablets and smartphones growing faster than the human population, it’s no surprise that mobile is the latest focus of cyber criminals.

Rise of Mobile Money

As mobile devices become more powerful, consumers use their mobile devices for shopping, banking and payments. Across all regions of the world, much growth has been seen in the last four years in mobile money, in part driven by the wide availability of affordable handsets combined with the availability of mobile cellular network infrastructure and bandwidth speeds. This growth in mobile money transactions has spurred a greater than 100% increase in banking Trojans, keyloggers, spyware, ransomware, malware from app stores and Bitcoin stealing malware targeted specifically to mobile devices around the globe.

BYOD Risks

The mobile malware threat is particularly worrisome to the corporate world where personal BYOD devices being used at work are accessing corporate networks which can expose valuable corporate information and IP to cyber thieves.

That’s why Wontok offers malware prevention for both desktop and mobile. Download the Data Sheet to read more about mobile security

lineuparrow

Contact Form

First Name*

Last Name*

Company

Email*

Phone

Interest*

More Details

Verify You're not a Robot