hreflang="uk-UA"

Cyber security of bank branches

VERNA offers services for building and maintaining comprehensive information security for the financial sector. A well-implemented cybersecurity system reduces the cost of implementing and operating a variety of security systems, reduces the risks of loss or leakage of information, allows you to prevent and eliminate the consequences of a virus attack, restore the operability of IT infrastructure.

Audit and support of information security systems

VERNA has extensive experience in auditing the information security of various solutions used in the banking sector. Our experts provide information security systems outsourcing services. We also offer training to work with various information security systems. Our design department develops design and working documentation for various information security systems and implements them.

Antivirus protection for workstations and servers

Through the use of antivirus protection systems for servers and workstations, a bank or financial institution monitors all possible ways through which viruses can penetrate - e-mail, network protocols (HTTP, FTP), external media and file servers that have access to the network. Protects against various types of threats and constantly monitors the antivirus system and periodically scans all servers and workstations for viruses. When a virus is detected, the system automatically notifies about the detection of “infections” and “treatment” of viruses. Performs the protection of mobile and other devices.

When choosing a particular antivirus product, our specialists always take into account the following factors: the performance of the systems on which the antivirus solution is planned to be used, the results of our own tests, the ratings of independent research companies, ease of administration and the presence of a centralized management system.

The key component of any antivirus software is the Anti-Virus Engine (antivirus engine), which performs a direct check of objects for malicious code. Different manufacturers use their own algorithms, but the general principle of their operation is the same. All antivirus engines have antivirus databases that store information about known viruses that have been detected by manufacturers' research laboratories. Modern antivirus programs will try to “cure” infected files from malicious code, but if this is not possible, they quarantine the suspicious file or delete it. If there is a suspicion of the presence of a virus, the antivirus software sends the data for verification to the manufacturer's specialists, who then update their antivirus databases with information about new malicious codes. The effectiveness of detecting malicious code and, accordingly, the level of protection provided by the antivirus depends on the development of the antivirus engine itself, the virus detection methods used. Therefore, when testing various antivirus products, it is important to pay special attention to this module, evaluate its quality and impact on the performance of the hardware platform on which it works.

Protection against leakage of confidential information

Due to employee misconduct and intentional theft of corporate data, companies suffer serious financial losses that exceed the cost of providing information security. To protect confidential information and intellectual property from accidental or intentional leakage, it is recommended to use products from the DLP class (Data Loss Prevention - Data Loss Prevention).

DLP solutions prevent unauthorized transactions with confidential information, such as copying, alteration, etc., as well as its improper movement, such as sending outside the organization, transferring or storing it in alternative directories. Modern DLP systems have many characteristics and features to consider when choosing a solution to protect against leaks of confidential information. One of the key parameters of any DLP system is the network architecture used.

According to this parameter, DLP solutions are divided into two groups: gateway and host. Gateway DLP solutions use a server that routes all outgoing network traffic of the corporate network. The gateway processes this traffic in order to detect possible leaks of confidential data. Hosted DLP solutions, for their part, are based on the use of agent software that is installed on workstations, servers, etc. The best option is to share the two types of DLP.

Control of I/O devices

VERNA's information I/O control system allows you to avoid unintentional and unexpected cases of unauthorized transfer of corporate data to external media and regulate the further use of data I/O devices in accordance with the information security of the organization.

There is a whole class of device control systems that perform the following functions:

• Control the copying of data to different media and through different ports.

• Allow or prohibit the use of certain devices and the copying of certain data on authorized devices, as well as limiting the copying of data by users from certain locations and applications.

• Centralized assignment, deployment, administration, and updating of policies and safeguards across the enterprise through a centralized management system that allows you to configure device and data usage policies for each user, group, or department.

• Obtaining detailed information about devices, timestamps, data, etc. in order to conduct an audit quickly and correctly.

Device control systems operate on a single principle: an agent installed on users' workstations monitors physical ports according to policies that are configured by system administrators. Agents are often deployed to user PCs using AD Group Policies or through the server part of the solution.

Network perimeter protection

Solutions aimed at protecting the perimeter of the network can be divided into several categories, such as internetwork firewalls, intrusion prevention systems, network access controls, behavior analysis and security threat detection systems, and virtual private networks.

The modern market offers a variety of means to protect the network, for example, universal UTM (Unified Threat Management) devices that combine a complex of information security functions in a single software and hardware platform. The use of such solutions saves costs not only for the purchase of equipment, but also for its management. However, the most common and reliable mechanism for protecting the perimeter of the network remains internetwork firewalls. The main purpose of such systems is to limit access to information resources of external sources:

• Protection against network attacks (intrusion prevention systems, intrusion detection systems).

• Establishing secure tunnels between networks and ensuring access for mobile users (IPsec VPN, SSL VPN).

• Network access control and user authentication.

• Regulating access of internal users to external resources.

• Separation of the common network into zones to increase security.

• Analysis of network traffic in order to identify possible security threats.

• Monitoring the state of communication channels in order to promptly respond to problems.

These solutions help ensure effective control and security of the network at the perimeter.

We use the hardware and software of our partners

Зв'яжіться з нами, щоб отримати більше інформації про наші рішення та проєкти

Залишити заявку
Дякуємо! Ми зв'яжемось з вами найближчим часом.
Oops! Something went wrong while submitting the form.
Дякуємо! Ми зв'яжемось з вами найближчим часом.
Oops! Something went wrong while submitting the form.
Дякуємо! Ми зв'яжемось з вами найближчим часом.
Oops! Something went wrong while submitting the form.
Отримати консультацію
Отримати консультацію
Отримати консультацію
Отримати консультацію
Отримати консультацію
Отримати консультацію