ExchangeDefender™

Securing

Exchanges

ExchangeDefender™

Crypto exchanges have hot wallets and cold wallets. The wallets store user secret keys as well as the exchange’s secret keys. Most of the keys are stored offline in vaults (cold wallet). A portion of the keys are stored on servers connected to the internet (hot wallet) to facilitate transactions. These servers are susceptible to a data breach just like any other hacker attack.

Exchange Defender comprises two products to protect the internal systems of the crypto exchange. These are – CryptoDefender™ (described earlier) and ProtectID®. ™protects the exchange’s computers and mobile devices from keylogging, screen capture and clickjack attacks. ProtectID® secures access to the internal systems via two factor out-of-band authentication. The ProtectID® system is shown below –

ProtectID® System

Authentication methods include:

 

  • Out-of-Band – #, PIN, OTP, Voice

  • OTP Delivery to Phone via SMS, Voice, Email, and/or Push

  • Out-of-Band Push – Accept/Deny, PIN, and/or Fingerprint

  • Hard Tokens – Key Fob, USB Key, and/or Wallet Cards

  • Mobile Tokens – iOS, Android

  • Desktop Tokens – PC/Mac/Linux

Study Case
ExchangeDefender™ Use Case


A typical crypto exchange architecture is shown below –

 

ExchangeDefender can secure the following vulnerability points –

ExchangeDefender™

Crypto exchanges have hot wallets and cold wallets. The wallets store user secret keys as well as the exchange’s secret keys. Most of the keys are stored offline in vaults (cold wallet). A portion of the keys are stored on servers connected to the internet (hot wallet) to facilitate transactions. These servers are susceptible to a data breach just like any other hacker attack.

Exchange Defender comprises two products to protect the internal systems of the crypto exchange. These are – CryptoDefender™ and ProtectID®™ protects the exchange’s computers and mobile devices from keylogging, screen capture and clickjack attacks. ProtectID® secures access to the internal systems via two factor out-of-band authentication.

Authentication methods include:

OUT-OF-BAND – #, PIN, OTP, VOICE

OTP DELIVERY TO PHONE VIA SMS, VOICE, EMAIL, AND/OR PUSH

OUT-OF-BAND PUSH – ACCEPT/DENY, PIN, AND/OR FINGERPRINT

HARD TOKENS – KEY FOB, USB KEY, AND/OR WALLET CARDS

MOBILE TOKENS – IOS, ANDROID, DESKTOP TOKENS – PC/MAC/LINUX

  • Facebook
  • LinkedIn
  • Twitter

Keep up to Date, Subscribe Now...