100 likes | 278 Views
MATRIX24x7 Maximum Protection for Enterprise. Agenda. Authentication and authorization Continuous monitoring and alerting Dynamic encryption of transactions Endorsing the authenticity of transaction Audit traces Computer vision and RFID based security protocols. MATRIX24x7 in Action.
E N D
Agenda • Authentication and authorization • Continuous monitoring and alerting • Dynamic encryption of transactions • Endorsing the authenticity of transaction • Audit traces • Computer vision and RFID based security protocols
MATRIX24x7 in Action Hypercom Vivotech Ingenico VeriFone
Authentication and authorization Peripheral Host PC MATRIX24x7 TinyAgent MATRIX24x7 Agent MATRIX24x7 Dashboard Views Protocol multiplexer Protocol multiplexer Physical Channel Device Command Processor POS Application MATRIX24x7 Server • Device sends a challenge to Host • Host sends the response to the challenge • Device identifies the authenticity of the Host and allows normal operations
Continuous monitoring and alerting Peripheral Host PC MATRIX24x7 TinyAgent MATRIX24x7 Agent MATRIX24x7 Dashboard Views Protocol multiplexer Protocol multiplexer Physical Channel Device Command Processor POS Application MATRIX24x7 Server • Continuous unique heartbeat signature sends both ways • Discontinuity or abnormality will be immediately notified
Dynamic encryption of transactions Peripheral Host PC MATRIX24x7 TinyAgent MATRIX24x7 Agent MATRIX24x7 Dashboard Views Protocol multiplexer Protocol multiplexer Physical Channel Device Command Processor POS Application MATRIX24x7 Server • Supports multiple encryption schemes (inter agent communication)
Endorsing the authenticity of transaction Peripheral Host PC MATRIX24x7 TinyAgent MATRIX24x7 Agent MATRIX24x7 Dashboard Views Protocol multiplexer Protocol multiplexer Physical Channel Device Command Processor POS Application MATRIX24x7 Server • A unique signature token to verify integrity and originality of the transaction messages • (firmware/application updates, diagnostic commands, device statistics requests)
Audit traces Peripheral Host PC MATRIX24x7 TinyAgent MATRIX24x7 Agent MATRIX24x7 Dashboard Views Protocol multiplexer Protocol multiplexer Physical Channel Device Command Processor POS Application MATRIX24x7 Server • All the user actions are monitored and recorded to ensure only legitimate activities are executed within the enterprise infrastructure
Computer vision and RFID based security protocols Peripheral Host PC MATRIX24x7 TinyAgent MATRIX24x7 Agent MATRIX24x7 Dashboard Views Protocol multiplexer Protocol multiplexer Physical Channel Device Command Processor POS Application MATRIX24x7 Server • Enforce physical tracking protocols for devices