Retail IT and security professionals need to protect sensitive information and ensure the ongoing operation of business systems from point of sale (POS) terminals to inventory management servers. Preventing information theft or system downtime is critical for customer trust and overall profitability. Credit card theft and attacks on financial systems are at an all time high The majority of these attacks require that a “payload” be delivered and executed on an endpoint in order for a would-be thief to “own” a system. And many of these attacks happen through the memory space. Bouncer denies the execution of these payloads, and alerts you that unknown software has arrived on an endpoint. You scan then use the CoreTrace Reputation Service to research and develop a plan of removal or remediation. And if the nefarious code attempts to inject itself into the memory space, Bouncer stops it. Even the most deadliest of memory attacks known as “reflective injections” are stopped using the patent-pendingmemory protection in Bouncer.
Point-of-sale systems generally are fixed function and have limited CPU and memory resources. Because Bouncer doesn’t scan, it is not a tax on the CPU like traditional anti-virus. Bouncer maintains a relatively small footprint and will fit nicely in most POS environments. If you are looking for a solution to stop unauthorized change to meet PCI compliance, Bouncer can deliver. You can manage against a gold standard application set, and monitor and alert on change. But even greater is Bouncer’s ability to prevent change. Can your current file integrity monitoring solution do this? Probably not.