Preloader

PURPOSE OF THE SERVICE

ATX Core Security

The mission of the software is the advanced and in-depth protection against computer attacks that are made to ATMs of multiple brands and models.

ATX Core Security has the Detection, Monitoring and Protection modules included in the ATX software.


The first protection layer specializes in BIOS controls to protect the Cashier against disk replacement attacks.

The second layer focuses on the configuration and control improvements of the Microsoft Windows operating system.

The third layer of protection is based on protecting the configurations of the software provider XFS, this protection function of the XFS stack is unique in the market you will not find another security solution that has these functions.

ATX core security

Technology in detail

ATX Core Security

Monitoring and Control

Centralized monitoring of ATMs, users, changes in hardware, use of the network and access in a single web console.

Assurance of the Operating System

ATX protections includes system files, Windows logs, user activity tracking and much more.

Remote management

Centrally define the required security policy configurations of each of the possible attack vectors.

Self-protection

ATX is specially designed under the experience of a multidisciplinary team in ATMs that has put all their knowledge and experience in protecting ATMs against all types of known attacks.

Malware

Advanced Malware protection based on detection and blocking based on pretention of binary attacks and calls to XFS APIs.

Hacker devices

Identification and protection for blackbox type attacks and advanced attacks that use hardware to intercede in the communications of the Network or the dispenser.

Start Protection

Exclusive protection for the ATM starting system, through BIOS level protections, which avoid possible compromise by replacing another disk or using the same disk cloned with other software.

RELEVANT DATA

0

Work hours

0

Active Client

0

Protected ATM

0

Protected attacks

GENERAL PROCESSES

ATX Core Security

Monitoring of Digital Certificates

Process management in Windows.

Sent patches.

Removing custom Logs

White list of applications

White list of perimeter equipment

Protection Task Programming

Design of ATM restoration points

Monitoring of Windows records

Review and monitoring of XFS ATMs states

Protections against malware attacks for ATMs

Implementing firewall policies

USB and Ethernet cable insertion monitoring

Virtual Private Network

Protections of XFS configurations

Extraction of Hardware IDs connected to the ATM.

Remote Key Loadder (KRL) for Windows 7 Agilis

BIOS password