The 'onion model': Nine layers of security every ATM deployer needs

Feb. 3, 2015 | by Suzanne Cluckey

"Black Box," "Ploutus," "Man in the Middle."ATM software attacks come in many guises, but the underlying objective never varies: Get the device to give up its cash with the least possible risk of detection.

The ATM industry has seen millions of dollars lost year after year to increasingly sophisticated malware attacks, deployed by increasingly businesslike organized crime rings.

In response, ATM operators have spent millions of dollars more to secure ATMs against known criminal attacks. The problem is that criminals keep coming up with new ones.

How can they be stopped? The answer lies in the onion.

On Tuesday, Feb. 10, at 10 a.m. EST, Wincor Nixdorf and ATM Marketplace will present the webinar, "ATM security: Using the 'onion model' to repel software attacks."

During the one-hour event, Terence Devereux, Senior Trusted Advisor for Wincor Nixdorf Software C.V., will provide an overview of various categories of ATM malware attacks that have surfaced in recent years — and that we can expect to see even more of in ever more dangerous and difficult to detect forms.

Regardless of whose (and how many) solutions an ATM deployer chooses, Devereux says, the net result should be nine critical layers of protection addressing all points of access that criminals aim to exploit.

Devereux will share a detailed methodology for surrounding your ATM fleet with the most impermeable protection possible, using a layered security approach. This "onion model" ensures that if one security layer fails, others will take over to shield and secure your organization's critical assets, including customer data and proprietary information.

Valuable takeaways from this webinar will include:

  • a picture of current and emerging threats;
  • a clearer understanding of the limitations of singular-fault security methods;
  • an overview of the comprehensive array of safeguards that can — and must — be integrated into a multilayered security approach; and
  • a description of Wincor Nixdorf's implementation of the onion model.

Registration for the webinar is now open online. Registrants who are unable to attend the live event will receive an emailed link to the webinar replay and slide presentation. 

photo courtesy (matt) | flickr

 


Topics: Manufacturers, Security, Webinars


Suzanne Cluckey / Suzanne’s editorial career has spanned three decades and encompassed all B2B and B2C communications formats. Her award-winning work has appeared in trade and consumer media in the United States and internationally. She is now the editor of ATMmarketplace.com and BlockChainTechNews.com
wwwView Suzanne Cluckey's profile on LinkedIn

Sponsored Links:


Related Content


Latest Content

Get the latest news & insights


NEWS

RESOURCES

TRENDING

FEATURES