H-Server Overview

The H-Server enables the remote management of large scale deployments of applications and devices in high-risk client environments exposed to malware attacks. It lets you deploy, configure, control and monitor the client-side installations with a high level of detail and flexibility. It is a cost-effective, highly scalable server platform with advanced remote management capabilities supporting a large number of client-side configurations and hardware devices.

Ideally suited for enterprise and financial service deployments, the H-Server allows consolidating security-sensitive client applications and services onto a single scalable, highly reliable enterprise-class platform.


Back to Top

Features

  • Available as a standalone cluster installation or as SaaS in-the-Cloud deployment.
  • Manages selected PC applications running on client computers either as software only installations or installed on security tokens
  • Allows monitoring the endpoint activity with remote deactivation capability
  • Prevents malware attacks by proactively pushing security updates based on active threats observed in the wild.
  • Leverages best-of-class PKI technologies to guarantee highly efficient and secure service levels.
  • Management Console accessible via any standard Web browser
  • Detailed auditing of all actions performed by the H-Server operators.
  • (Optional) User Interface of the management console customized based on corporate branding guidelines.

Back to Top

Static Code Dumping & Patching
Social Engineering & Interface Manipulation
Screen Capturing
Keystroke and Event Emulation
Window Overlay and Event Emulation
mTan & OOB Methods
Session Hijacking
Dynamic Code Dumping And Patching
Why Secure Browser?
PDF Form Spoofing
Keystroke and Mouse Logging

Videos

Successful hacking always leverages flaws in both the underlying technology as well as in our understanding of the transaction process. The short videos provided in this section try to fill this gap by describing how typical e-banking sessions are hacked and the key vulnerabilities exploited in each case.

We'd love to hear from you: let us know if you experienced any of such attacks and if you have any others to report.


Back to Top

Resources

Achieving good practical security requires the collaboration of informed users: basic knowledge of online security practices can go a long way to avoiding the majority of online frauds. Here you can find some resources of growing complexity to guide you through what our products do and why they provide outstanding practical security.

Back to Top

System Requirements

Server side
Processor IBM PC or compatible with Intel base processors
Intel Pentium 4 800-MHz or higher
(Intel Core 2 Duo or higher recommended)
Memory 512 megabytes (MB) of RAM (2GB recommended)
Operating System RedHat Enterprise Linux 5.6 (32/64bit editions)
Pre-Installed Applications Java Development Kit 6
Oracle Instant Client with SQLPLUS
JBoss 4.2.3 GA or JBoss EAP 4.3.0 GA CP09
Apache 2.2
PHP 5.3 with GNU Gettext and uploadprogress extension
Perl 5.8+.x interpreter (to run the H-Server Installer)
Client side
Web Browser Internet Explorer 7.0.x (9.0.x recommended)
Opera 8.0.x (11.0.x recommended) Mozilla Firefox 2.0.x (9.0.x recommended)
Apple Safari 4.0.x (5.0.x recommended)
Google Chrome 9.0.x.x (15.x.x.x recommended)
Display Resolution 1024*768 (1280*1024 recommended)

Back to Top

Testimonials from our Partners & Customers:

Your products gave me the peace of mind I needed to believe that Internet can still be
a safe place for our business. James Cooley, COO (UK)

The EISST team is the best I have interacted with and your support is excellent.
Jayakaran Paul, Technology Risk Manager, (UAE)

...no other solutions and products can match the range and strength of your protection
mechanisms. Compass Security Audit (CH)

Doing out of band transaction verification with your device provides our most valued
customers with the level of service and security they expect. Hans Bloch, CISO (FR)

Your products provide state of the art protections without losing sight of the need to
keep security usable. James Polster, CISSP (USA)