SlideShare a Scribd company logo
1 of 21
Rapport Browser Security

How it works and how it protects against
malware and other browser attacks
About Trusteer Rapport




 • A lightweight browser security plug-in and
   security service
 • Protects relationship with banks against online
   identity theft and fraud – even when anti-virus
   fails
 • Downloadable from your bank in seconds
 • Three main features
    – Browser Vault
    – Armored Communications
    – Actionable Intelligence
Internet

The Browser
Vault
The Rapport Browser Vault



               Internet
                            Your browser
                            maintains an internal
                            record of Web pages
                            viewed and
                            information entered.
The Rapport Browser Vault



               Internet
                            Your bank statements,
                            transactions, and login
                            information are all stored
                            inside the browser for the
                            duration of the session.
The Rapport Browser Vault



               Internet
                            The browser has many
                            doors (aka interfaces)
                            through which its internal
                            storage is accessible to
                            others
The Rapport Browser Vault


                                These doors are legitimate
               Internet         and are designed to allow
                                toolbars and other software
                              to interface with the
                                browser

                            
The Rapport Browser Vault



               Internet     Unfortunately these doors
                            are also used by malware
                            to read sensitive
                            information, tamper with
                            transactions and modify
                            Web pages.
The Rapport Browser Vault



               Internet
                            Rapport replaces
                            internal browser
                            storage with a vault
                            that cannot be opened
                            by malware
The Rapport Browser Vault
                                Bank



               Internet

                            Your bank configures a
                            vault policy to identify
                            which information should
                            not be accessible
                            through any browser
                            doors
                              Passwords
                                  Transactions
                                         Statements
The Rapport Browser Vault



               Internet
                            Rapport enforces the
                            policy and prevents
                            access to sensitive
                            information residing
                            within the vault.
                            Malware, whether
                            recognized by antivirus
                            or not, is defeated.
Internet

Armored
Communication
Rapport’s Armored Communication
                                       Fraudulent Server   Bank Server




              Internet


                                  Your browser consults a
                                  “DNS” service (usually
                                  provided by your Internet
                                  Service Provider) to find
                                  your bank’s server on the
                                  Internet.




                                                               DNS
Rapport’s Armored Communication
                                       Fraudulent Server     Real Server




              Internet


                                  Unfortunately many attacks
                                  allow criminals to control or
                                  bypass this DNS service
                                  and direct customers to
                                  fraudulent servers




                                                                  DNS
Rapport’s Armored Communication
                                  Fraudulent Server   Real Server




              Internet




                                  Rapport provides a secure
                                  DNS service that also
                                  authenticates the Web site
                                  to makes sure that you
                                  safely reach the real bank
                                  server
Rapport’s Armored Communication
                                     Bank



              Internet
                                  Your bank configures
                                  Rapport to instruct it
                                  how to reach its genuine
                                  servers
Internet

Actionable
Intelligence
Rapport’s Actionable Intelligence
                                        Bank



                 Internet

                                    Attempts to crack the
                                    Rapport browser vault or
                                    direct customers to
                                    fraudulent Web sites are
                                    reported to the Trusteer
                                    Fraud Prevention Center




                                     Fraud Prevention Center
Rapport’s Actionable Intelligence
                                        Bank



                 Internet


                                    Security and fraud
                                    prevention experts
                                    analyze these events to
                                    detect new threats




                                     Fraud Prevention Center
Rapport’s Actionable Intelligence
                                         Bank



                 Internet

                                    Based on this analysis,
                                    the bank takes server-side
                                    actions to defeat the
                                    threat and protect
                                    customer accounts




                                      Fraud Prevention Center
Internet
  Thank You
www.trusteer.com

More Related Content

What's hot

Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authentication
Hai Nguyen
 
Psdot 11 highly secured net banking system using fingerprint recognition tech...
Psdot 11 highly secured net banking system using fingerprint recognition tech...Psdot 11 highly secured net banking system using fingerprint recognition tech...
Psdot 11 highly secured net banking system using fingerprint recognition tech...
ZTech Proje
 
Wayfs and Strays - Jonathan Richardson
Wayfs and Strays - Jonathan RichardsonWayfs and Strays - Jonathan Richardson
Wayfs and Strays - Jonathan Richardson
Eduserv
 
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guide
Hai Nguyen
 
Session 7 e_raja_kailar
Session 7 e_raja_kailarSession 7 e_raja_kailar
Session 7 e_raja_kailar
Hai Nguyen
 
Vfm security with aruba wireless
Vfm security with aruba wirelessVfm security with aruba wireless
Vfm security with aruba wireless
vfmindia
 
World of digital banking author muthu siva
World of digital banking author muthu sivaWorld of digital banking author muthu siva
World of digital banking author muthu siva
Muthu Siva
 

What's hot (19)

Why Two-Factor Authentication?
Why Two-Factor Authentication?Why Two-Factor Authentication?
Why Two-Factor Authentication?
 
Two-factor Authentication
Two-factor AuthenticationTwo-factor Authentication
Two-factor Authentication
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authentication
 
3 reasons your business can't ignore Two-Factor Authentication
3 reasons your business can't ignore Two-Factor Authentication3 reasons your business can't ignore Two-Factor Authentication
3 reasons your business can't ignore Two-Factor Authentication
 
Psdot 11 highly secured net banking system using fingerprint recognition tech...
Psdot 11 highly secured net banking system using fingerprint recognition tech...Psdot 11 highly secured net banking system using fingerprint recognition tech...
Psdot 11 highly secured net banking system using fingerprint recognition tech...
 
Managing identity frauds
Managing identity fraudsManaging identity frauds
Managing identity frauds
 
Wayfs and Strays - Jonathan Richardson
Wayfs and Strays - Jonathan RichardsonWayfs and Strays - Jonathan Richardson
Wayfs and Strays - Jonathan Richardson
 
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guide
 
Session 7 e_raja_kailar
Session 7 e_raja_kailarSession 7 e_raja_kailar
Session 7 e_raja_kailar
 
Avoiding Two-factor Authentication? You're Not Alone
Avoiding Two-factor Authentication? You're Not AloneAvoiding Two-factor Authentication? You're Not Alone
Avoiding Two-factor Authentication? You're Not Alone
 
Entrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust IdentityGuard Mobile
Entrust IdentityGuard Mobile
 
ppt
pptppt
ppt
 
this is test for today
this is test for todaythis is test for today
this is test for today
 
test
testtest
test
 
Infographic: The State of Financial Trojans in 2014
Infographic: The State of Financial Trojans in 2014Infographic: The State of Financial Trojans in 2014
Infographic: The State of Financial Trojans in 2014
 
Vfm security with aruba wireless
Vfm security with aruba wirelessVfm security with aruba wireless
Vfm security with aruba wireless
 
TheGRID - Stop Identity Theft
TheGRID - Stop Identity TheftTheGRID - Stop Identity Theft
TheGRID - Stop Identity Theft
 
World of digital banking author muthu siva
World of digital banking author muthu sivaWorld of digital banking author muthu siva
World of digital banking author muthu siva
 
Secure Online Banking
Secure Online BankingSecure Online Banking
Secure Online Banking
 

Viewers also liked

The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection SuiteThe Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
IBM Security
 
5 parts of research paper
5 parts of research paper5 parts of research paper
5 parts of research paper
Queene Balaoro
 

Viewers also liked (13)

Web Browser Security - 2016 Comparative Test Results
Web Browser Security - 2016 Comparative Test ResultsWeb Browser Security - 2016 Comparative Test Results
Web Browser Security - 2016 Comparative Test Results
 
Browser Security
Browser SecurityBrowser Security
Browser Security
 
Browser security — ROOTS
Browser security — ROOTSBrowser security — ROOTS
Browser security — ROOTS
 
Browser Security 101
Browser Security 101 Browser Security 101
Browser Security 101
 
Web Browsers
Web BrowsersWeb Browsers
Web Browsers
 
Web browser privacy and security
Web browser privacy and security Web browser privacy and security
Web browser privacy and security
 
Security-Web Vulnerabilities-Browser Attacks
Security-Web Vulnerabilities-Browser AttacksSecurity-Web Vulnerabilities-Browser Attacks
Security-Web Vulnerabilities-Browser Attacks
 
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection SuiteThe Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
 
Research on Web Browsers ppt
Research on Web Browsers pptResearch on Web Browsers ppt
Research on Web Browsers ppt
 
Web browser(pp ts)
Web browser(pp ts)Web browser(pp ts)
Web browser(pp ts)
 
Web browser
Web browserWeb browser
Web browser
 
Web Browsers
Web BrowsersWeb Browsers
Web Browsers
 
5 parts of research paper
5 parts of research paper5 parts of research paper
5 parts of research paper
 

Similar to Trusteer Rapport – Browser Security - How It Works

Fy09 Sask Tel Learn It Ie7 And Ie8 Joel Semeniuk
Fy09 Sask Tel Learn It   Ie7 And Ie8   Joel SemeniukFy09 Sask Tel Learn It   Ie7 And Ie8   Joel Semeniuk
Fy09 Sask Tel Learn It Ie7 And Ie8 Joel Semeniuk
sim100
 
Top Ten Web Attacks
Top Ten Web Attacks Top Ten Web Attacks
Top Ten Web Attacks
Ajay Ohri
 
גיא אילון Websense
גיא אילון   Websenseגיא אילון   Websense
גיא אילון Websense
lihig
 
Vfm bluecoat proxy sg solution with web filter and reporter
Vfm bluecoat proxy sg solution with web filter and reporterVfm bluecoat proxy sg solution with web filter and reporter
Vfm bluecoat proxy sg solution with web filter and reporter
vfmindia
 
50357 a enu-module02
50357 a enu-module0250357 a enu-module02
50357 a enu-module02
Bố Su
 
Axial What We Do
Axial What We DoAxial What We Do
Axial What We Do
dmcleodglas
 
Corona - Ph.D. Defense Slides
Corona - Ph.D. Defense SlidesCorona - Ph.D. Defense Slides
Corona - Ph.D. Defense Slides
Pluribus One
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12
Symantec
 

Similar to Trusteer Rapport – Browser Security - How It Works (20)

Fy09 Sask Tel Learn It Ie7 And Ie8 Joel Semeniuk
Fy09 Sask Tel Learn It   Ie7 And Ie8   Joel SemeniukFy09 Sask Tel Learn It   Ie7 And Ie8   Joel Semeniuk
Fy09 Sask Tel Learn It Ie7 And Ie8 Joel Semeniuk
 
Web security 2012
Web security 2012Web security 2012
Web security 2012
 
Bulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat LandscapefinalBulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat Landscapefinal
 
Top Ten Web Attacks
Top Ten Web Attacks Top Ten Web Attacks
Top Ten Web Attacks
 
Jon ppoint
Jon ppointJon ppoint
Jon ppoint
 
גיא אילון Websense
גיא אילון   Websenseגיא אילון   Websense
גיא אילון Websense
 
Spiceworld 2011 - AppRiver breakout session
Spiceworld 2011 - AppRiver breakout sessionSpiceworld 2011 - AppRiver breakout session
Spiceworld 2011 - AppRiver breakout session
 
Vfm bluecoat proxy sg solution with web filter and reporter
Vfm bluecoat proxy sg solution with web filter and reporterVfm bluecoat proxy sg solution with web filter and reporter
Vfm bluecoat proxy sg solution with web filter and reporter
 
50357 a enu-module02
50357 a enu-module0250357 a enu-module02
50357 a enu-module02
 
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...
 
Thought Paper: Overview of Banking Applications
Thought Paper: Overview of Banking ApplicationsThought Paper: Overview of Banking Applications
Thought Paper: Overview of Banking Applications
 
Financial Risks to Internet Security
Financial Risks to Internet SecurityFinancial Risks to Internet Security
Financial Risks to Internet Security
 
Axial What We Do
Axial What We DoAxial What We Do
Axial What We Do
 
Corona - Ph.D. Defense Slides
Corona - Ph.D. Defense SlidesCorona - Ph.D. Defense Slides
Corona - Ph.D. Defense Slides
 
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012
 
Mobile Security
Mobile Security Mobile Security
Mobile Security
 
Mobile Security
Mobile Security Mobile Security
Mobile Security
 
Tools and methods used in cyber crime
Tools and methods used in cyber crimeTools and methods used in cyber crime
Tools and methods used in cyber crime
 
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019 Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Recently uploaded (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 

Trusteer Rapport – Browser Security - How It Works

  • 1. Rapport Browser Security How it works and how it protects against malware and other browser attacks
  • 2. About Trusteer Rapport • A lightweight browser security plug-in and security service • Protects relationship with banks against online identity theft and fraud – even when anti-virus fails • Downloadable from your bank in seconds • Three main features – Browser Vault – Armored Communications – Actionable Intelligence
  • 4. The Rapport Browser Vault Internet Your browser maintains an internal record of Web pages viewed and information entered.
  • 5. The Rapport Browser Vault Internet Your bank statements, transactions, and login information are all stored inside the browser for the duration of the session.
  • 6. The Rapport Browser Vault Internet The browser has many doors (aka interfaces) through which its internal storage is accessible to others
  • 7. The Rapport Browser Vault These doors are legitimate Internet and are designed to allow toolbars and other software  to interface with the browser 
  • 8. The Rapport Browser Vault Internet Unfortunately these doors are also used by malware to read sensitive information, tamper with transactions and modify Web pages.
  • 9. The Rapport Browser Vault Internet Rapport replaces internal browser storage with a vault that cannot be opened by malware
  • 10. The Rapport Browser Vault Bank Internet Your bank configures a vault policy to identify which information should not be accessible through any browser doors Passwords Transactions Statements
  • 11. The Rapport Browser Vault Internet Rapport enforces the policy and prevents access to sensitive information residing within the vault. Malware, whether recognized by antivirus or not, is defeated.
  • 13. Rapport’s Armored Communication Fraudulent Server Bank Server Internet Your browser consults a “DNS” service (usually provided by your Internet Service Provider) to find your bank’s server on the Internet. DNS
  • 14. Rapport’s Armored Communication Fraudulent Server Real Server Internet Unfortunately many attacks allow criminals to control or bypass this DNS service and direct customers to fraudulent servers DNS
  • 15. Rapport’s Armored Communication Fraudulent Server Real Server Internet Rapport provides a secure DNS service that also authenticates the Web site to makes sure that you safely reach the real bank server
  • 16. Rapport’s Armored Communication Bank Internet Your bank configures Rapport to instruct it how to reach its genuine servers
  • 18. Rapport’s Actionable Intelligence Bank Internet Attempts to crack the Rapport browser vault or direct customers to fraudulent Web sites are reported to the Trusteer Fraud Prevention Center Fraud Prevention Center
  • 19. Rapport’s Actionable Intelligence Bank Internet Security and fraud prevention experts analyze these events to detect new threats Fraud Prevention Center
  • 20. Rapport’s Actionable Intelligence Bank Internet Based on this analysis, the bank takes server-side actions to defeat the threat and protect customer accounts Fraud Prevention Center
  • 21. Internet Thank You www.trusteer.com