January 27, 2010
This year, Wincor World is showcasing innovative products that actively prevent skimming and other attacks on ATMs, including a solution that interferes with the reading of card data and systems that rely on optical surveillance to recognize manipulation. These new technologies belong to Wincor Nixdorf AG's ProTect portfolio, which consists of solutions for data and software security, cash security, security monitoring, and identity and access control.
Wincor Nixdorf introduced its first anti-skimming module back in 2003, and since then the company has been continually refining and improving this technology. Its latest Anti-Skimming II module detects skimming devices and then triggers a silent alarm and initiates other actions such as video monitoring. It also emits an interference field that prevents sensitive card data from being read. The advantage of this technology is that business can continue uninterrupted while skimming attacks are being repelled, and service to customers is not impaired in any way.
Another new technology for protecting ATMs against manipulation — such as cash-trapping devices or bogus electronic PIN pads — is the Optical Security Guard, which is available for the CINEO systems and the ATMs of the ProCash 8000 series. Thanks to its modern image analysis software, the Optical Security Guard can detect changes made to the ATM operating panel.
Biometric techniques for identity checking and access control are another focal point of this year's Wincor World. At a variety of devices — equipped with biometric sensors such as vein scanners and fingerprint sensors that can even tell whether the finger used is both real and alive — visitors can convince themselves that secure authentication at ATMs is indeed possible.
The solutions of the ProTect portfolio are not limited to hardware, software and services: the three-step security concept also includes consulting. In the first step, experts analyze a bank's threat scenario, examining in detail its business processes, information and communication structures, and working environments. On the basis of this analysis, the individual level of protection required by the bank is determined, and solution concepts for protective measures — under consideration of existing regulations and limitations — are formulated. The second step involves implementation of the tailored security solutions. Finally, in the third step, Wincor Nixdorf offers the bank the opportunity of handing over the operation of its security infrastructure to Wincor Nixdorf, and allowing it, for example, to look after the surveillance of entire branches.