H-PDF Overview

The H-PDF application allows working with PDF files and forms, shielding the content against malware attacks and privacy breaches. Differently from standard PDF readers and applications (e.g. Adobe Acrobat), H-PDF keeps all internal resources protected from the operating system and from external applications.

H-PDF can be used as a standard PDF reader or be extended to support any custom business logic, including encryption and digital signing/verification with a PKCS11 compliant device. H-PDF is complaint with Adobe Live Cycle ES2 allowing the automated back-end processing of PDF files submitted by end users in both electronic and paper formats.

The Proactive Security Updates (PSU) allows both preventing and responding to malware attacks. Once malware is launched against a hardened application, the attack will be effective only until the target code contains the exploited vulnerabilities. The PSU practice can be applied preemptively to frustrate ongoing hacking efforts and prevent scalable attacks. This underlines the core strength of application hardening, inasmuch the application’s architectural design and multiple protection layers allow engaging the e-criminals even before they have deployed any attack. Differently from standard maintenance updates of non-hardened software, the PSU are designed to keep the application equipped with the strongest protections using knowledge acquired from security research and constant monitoring of malware in the wild. The PSU represent a true shift in the delivery of value to customers of security solutions, whereby forces in the battle with e-criminals can be finally rebalanced by requiring them to work hard and again for any practical gains.

Back to Top


  • Zero-footprint: no special drivers or admin privileges needed.
  • Available as a software-only downloadable application or integrated with smart security tokens
  • PDF Digital Signing with any PKCS11 compliant device using standard PDF, 2D barcode, detached PKCS#7, PAdES-BASIC and PAdES-BES.
  • PDF Encryption with 40-bit RC4, 128-bit RC4 and 128-bit AES.
  • Supports Acrobat Forms and XFA Forms with JavaScript, as well as paper based forms (barcodes) as QR Code, Data Matrix and PDF417.
  • Localized in English, French, German, Italian, and Spanish. Additional languages available upon request.
  • (Optional) User Interface customized based on corporate branding guidelines.
  • (Optional) Integrated with the H-Server cloud-based management console for Proactive Security Updates.

Back to Top

Why Secure Browser?
Social Engineering & Interface Manipulation
Keystroke and Mouse Logging
Screen Capturing
Keystroke and Event Emulation
PDF Form Spoofing
Window Overlay and Event Emulation
mTan & OOB Methods
Dynamic Code Dumping And Patching
Static Code Dumping & Patching
Session Hijacking


Successful hacking always leverages flaws in both the underlying technology as well as in our understanding of the transaction process. The short videos provided in this section try to fill this gap by describing how typical e-banking sessions are hacked and the key vulnerabilities exploited in each case.

We'd love to hear from you: let us know if you experienced any of such attacks and if you have any others to report.

Back to Top


Achieving good practical security requires the collaboration of informed users: basic knowledge of online security practices can go a long way to avoiding the majority of online frauds. Here you can find some resources of growing complexity to guide you through what our products do and why they provide outstanding practical security.

Back to Top

System Requirements

Processor IBM PC or compatible with Intel base processors
Intel Pentium 4 800-MHz or higher
(Intel Core 2 Duo or higher recommended)
Memory 512 megabytes (MB) of RAM (2GB recommended)
Operating System Microsoft® Windows® VISTA all versions
Microsoft® Windows® 7 all versions
Microsoft® Windows® 8 all versions
Microsoft® Windows® 8.1 all versions
Microsoft® Windows® 10 all versions
Mac OSX 10.7.x and higher
Display 1024 x 768 resolution, 65 536 colors minimum
(32-bit color recommended)

Back to Top

Testimonials from our Partners & Customers:

Your products gave me the peace of mind I needed to believe that Internet can still be
a safe place for our business. James Cooley, COO (UK)

The EISST team is the best I have interacted with and your support is excellent.
Jayakaran Paul, Technology Risk Manager, (UAE)

...no other solutions and products can match the range and strength of your protection
mechanisms. Compass Security Audit (CH)

Doing out of band transaction verification with your device provides our most valued
customers with the level of service and security they expect. Hans Bloch, CISO (FR)

Your products provide state of the art protections without losing sight of the need to
keep security usable. James Polster, CISSP (USA)