ATM Security


100% of the security market products are based on protecting the operating system regardless of the operating logic of the XFS software solution provider, in the cyber security market focused on ATMs you will not find a solution with greater understanding of the problem of operations and real ATM security.

Industry for ATM security, it is based on 2 factors:

  • Hardware-based protections like antiskimmer and cash trapping.
  • Based on software such as Whitelist, antivirus, antimalware, VPN among others.
  • Our vision on cyber security protection through our End-point solution for ATM networks is specially developed to cover the most advanced needs to control and ensure that the CEN / XFS or XFS layer (eXtensions for Financial Services) is completely secure and avoiding that software designed to damage and be able to steal customer data or extract money from the ATM can be implemented.


    ATM security is our priority and understanding the new challenges of cyber attacks suffered by banks today is a complex task, our solutions based on the great experience in the 3 largest ATM providers in the world, have allowed us to develop a solution that covers the greatest security needs that a bank needs.

    Our agent for ATM monitoring allows us to perfectly understand the messages of the XFS layer between the ATM and the core of transactions, messages from windows systems, malware events and logical attacks in order to be processed and analyze security incidents that may occur in any of ATM phases, as well as in software configurations, our system works with XFS (Diebold Agilis, Aptra ActiveXFS, Probase / procash, J / XFS, KAL XFS, Dynasty, XFS proprietary).

    Through a Client-Server architecture our agent communicates through an encrypted protocol with the server to alert our graphic interface of any events classified as unwanted and alerts of possible cybernetic attacks as well as hardware errors for the logical operation of the ATM.

    Some of the most important features we have:

  • Centralized graphic interface.
  • Implementation of white list security rules.
  • Control of perimeter devices.
  • Control and white list of execution processes.
  • Implementation of Windows policies.
  • Encrypted communications.
  • Monitoring of Windows records.
  • Low level protections for third party software execution.
  • Digital certificates monitoring.
  • Incident response capabilities through the execution of forensic audits.
  • Monitoring and auditing of Journal XFS and Microsoft Event Viewer.
  • "Roll back ATM" management of production points.
  • Creation of customized security rules.
  • Activation and deactivation of modules.
  • More than 90 functions to be able to use.
  • Need help? Chat with us!
    Start a conversation
    Hello! Click on one of our members below to chat on WhatsApp
    We usually respond in a few minutes