Research, detection, correlation and analysis of all brand models and versions of
ATMs combining experience and advanced analysis in BigData
Both the banks and the securities transport companies that manage cash for ATMs, today face hundreds of cases of possible shortages per year per country, not only short of cash but each time the attacks are more and more complex to detect for ATMs, this derives from the fact that any of the parties involved must have a specialized team or refer directly to the supplier the cases so that they can not be resolved and determined who is responsible for the errors that result in economic shortages for the ATMs of the services of alternative banking channels.
Thanks to our experience the maximum time for the resolution of a case does not exceed 3 minutes, this increases by 99.95% the time to solve missing problems and prevent investigations from going to days, weeks or even more cases difficult to miss months.
for highly specialized and dedicated full time staff to identify and analyze the problems of the ATMS network.
Hardware, Software and replacement of cash in their routine tasks, as well as identify advanced attacks in real time.
The analysis of any type of problem in the ATM network of any brand of hardware and software all centralized.
Impartial and truthful about the information collected in real time, with a large knowledge base.
Windows XP or 7
All models of NCR, Diebold-Nixdorf (Diebold and Wincor Nixdorf), GRC, WRG, Fujitsu, Nautilus and others.
Kal, Agilis, APTRA, Procash/Probase, Dynasty, J/XFS, Phoenix XFS and others.
(P-OFF) Ram raid
(P-OFF) Smash and grab
(P/L-ON) Card trapping
(P/L-ON) Skimming
(P/L-ON) Shimming
(P-ON) TRF I / II
(P-ON) Cash trapping I / I
(L-OFF) Malware
(L-OFF) Unauthorized management
applications and services
(L-ON/OFF) PAC=MITM
(L-OFF) Black box
(L-ON) Malicious dispense orders
(L-ON) Malware distribution
(L-ON) Active Man-in-the-middle (A-MITM)
(L-ON) Passive MITM (P-MITM)
(L-OFF) Host spoofing.