- Contact Us
Using layered security, automatic engines and a 24/7 operation center, Versafe efficiently detects computers infected with Trojans, attempting to gain access to the organization’s servers. Advanced encryption of user log-in credentials, eliminates the risk of the Trojan, key logger or session hijacker.
Versafe’s knowledge is based on extensive research into the several forms of Trojan infections, experience with cleaning infections and repairing the damage caused by zero-day threats. Our deep understanding of how the malware works is the key to producing the right defence mechanisms required to safeguard the information transmitted between your client and your organization.
Versafe’s systems are all managed by a user-friendly console, with privileges settings defined by the organization’s security management.
Versafe’s components are embedded in the application layer and do not require the organization’s clients to install anything on their PC, resulting in a transparent process that does not affect the user experience or ease of use.
Versafe’s objective – fast, definitive detection and identification of a computer infected by a Trojan.
vTrack – Versafe’s advanced software component designed to immediately recognize the existence of duplicated credentials and communications from a client’s PC. As soon as a computer is recognized as containing a Trojan, the system alerts the organization and the operation center for immediate action, based on the organizations predefined procedures.
vScan – advanced scanning mechanisms that search the web for compromised user credentials belonging to Versafe’s customers. The engines cover drop zones, hacker communities, trading sites, etc.
Versafe’s objective – mitigate damage on the organizations’ clients, taking the responsibility out of their hands and putting it back in the company’s.
vCrypt - advanced encryption is applied within the organization’s application and scrambles all information transferred from the user to the organization. The encrypted credentials are then unscrambled exclusively on the organization’s servers. Any information reaching the attacker’s drop zone is useless.
Monitoring of the infected users in order to detect irregular activity that may insinuate fraud.
Real time alerts are sent to the organization’s control center in order to identify any users that may have been affected and to take the appropriate actions, based on the predefined company procedures and protocol.
Honeypots, containing fake user names, passwords, credit card numbers and other credentials, are fed to the hacker’s dropzone in order to cause confusion, to gain access to the attack server and for forensic use. The honeypots are customized to the organization and are deployed from several IP addresses and separate computers.
Versafe’s objective – investigate the attack in order to learn of any possible affected users, to track and identify the attacker and to quickly identify future attacks of the same form.
Versafe trojans investigations include: