1 / 10

MATRIX24x7 Maximum Protection for Enterprise

MATRIX24x7 Maximum Protection for Enterprise. Agenda. Authentication and authorization Continuous monitoring and alerting Dynamic encryption of transactions Endorsing the authenticity of transaction Audit traces Computer vision and RFID based security protocols. MATRIX24x7 in Action.

zasha
Download Presentation

MATRIX24x7 Maximum Protection for Enterprise

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. MATRIX24x7Maximum Protection for Enterprise

  2. Agenda • Authentication and authorization • Continuous monitoring and alerting • Dynamic encryption of transactions • Endorsing the authenticity of transaction • Audit traces • Computer vision and RFID based security protocols

  3. MATRIX24x7 in Action Hypercom Vivotech Ingenico VeriFone

  4. Authentication and authorization Peripheral Host PC MATRIX24x7 TinyAgent MATRIX24x7 Agent MATRIX24x7 Dashboard Views Protocol multiplexer Protocol multiplexer Physical Channel Device Command Processor POS Application MATRIX24x7 Server • Device sends a challenge to Host • Host sends the response to the challenge • Device identifies the authenticity of the Host and allows normal operations

  5. Continuous monitoring and alerting Peripheral Host PC MATRIX24x7 TinyAgent MATRIX24x7 Agent MATRIX24x7 Dashboard Views Protocol multiplexer Protocol multiplexer Physical Channel Device Command Processor POS Application MATRIX24x7 Server • Continuous unique heartbeat signature sends both ways • Discontinuity or abnormality will be immediately notified

  6. Dynamic encryption of transactions Peripheral Host PC MATRIX24x7 TinyAgent MATRIX24x7 Agent MATRIX24x7 Dashboard Views Protocol multiplexer Protocol multiplexer Physical Channel Device Command Processor POS Application MATRIX24x7 Server • Supports multiple encryption schemes (inter agent communication)

  7. Endorsing the authenticity of transaction Peripheral Host PC MATRIX24x7 TinyAgent MATRIX24x7 Agent MATRIX24x7 Dashboard Views Protocol multiplexer Protocol multiplexer Physical Channel Device Command Processor POS Application MATRIX24x7 Server • A unique signature token to verify integrity and originality of the transaction messages • (firmware/application updates, diagnostic commands, device statistics requests)

  8. Audit traces Peripheral Host PC MATRIX24x7 TinyAgent MATRIX24x7 Agent MATRIX24x7 Dashboard Views Protocol multiplexer Protocol multiplexer Physical Channel Device Command Processor POS Application MATRIX24x7 Server • All the user actions are monitored and recorded to ensure only legitimate activities are executed within the enterprise infrastructure

  9. Computer vision and RFID based security protocols Peripheral Host PC MATRIX24x7 TinyAgent MATRIX24x7 Agent MATRIX24x7 Dashboard Views Protocol multiplexer Protocol multiplexer Physical Channel Device Command Processor POS Application MATRIX24x7 Server • Enforce physical tracking protocols for devices

  10. THANK YOU

More Related