PT SYDECO
is
Presenting
Artificial Intelligence
better protection against
Frauds and Cyber attacks
WORLD
INDONESIA
41%
INDONESIA
INDONESIA
33%
INDONESIA
INDONESIA
155%
INDONESIA
INDONESIA
INDONESIA
INDONESIA
$228
INDONESIA
ACCORDING to the recent Google Temasek research
In 2017 e-commerce sales of first-hand goods will reach
US$10.9 billion in gross merchandise value
Up from US$5.5 billion in 2015
Growing 41% CAGR.
REMARK
IF THE USE OF INTERNET IS GROWING FAST
IF E-COMMERCE AND M-COMMERCE ARE ALSO
GROWING THAT FAST
CRIME IS NOT LEFT BEHIND
HAVE BEEN HACKED
UBER 57M ACCOUNTS HACKED (RANSOM PAID $ 100k)
IMGUR 1.7M EMAILS AND PASSWORDS BREACHED IN 2014 HACK
JP MORGAN 83 M customers and small businesses
T-MOBILE 15M personal data stolen
HEALTH CARE SECTOR More than 101 M personal data stolen
ASHLEY MADISON 32M data stolen
HOME DEPOT 53 M email addresses stolen and 56 M payment cards
EBAY 145M users’ credentials and physical addresses
TARGET SHOPPIMG 110 M personal and financial data
US GOVERNEMENT 21.5 M data and 5 M finger prints
...
Source: http:// [Link]/2015/10/02/heres-whos-been-hacked-in-the-past-two-years/
[Link]
[Link]
HAVE BEEN HACKED
Twitter, Facebook, Whatsap, Apple, The Times The Wall
Street Journal, The Washington Post, Linkedin, Oracle,
Dropbox, Snapchat, Verizon, e-mails providers,
Governments (US, Philippines…), Universities…
4.93 million Gmail accounts hacked
500 million Yahoo accounts hacked
Source: [Link]
HAVE BEEN HACKED
International Olympic Committee, Exxon Mobil, Baker
Hughes, Royal Dutch Shell, BP, ConocoPhillips,
Chesapeake Energy, BG Group, ArcelorMittal, Coca-Cola…
“I divide the entire set of Fortune Global 2000 firms into
two categories: those that know they’ve been
compromised and those that don’t yet know.”
(Mr. Dmitri Alperovitch, then McAfee’s vice president for threat research)
Source: [Link]
HAVE BEEN HACKED
AND THEY LOST
Taiwan Bank LOSS $ 60 Million
Bangladesh Bank LOSS $ 81 Million
Italia Bank 400.000 Accounts Attacked
British Bank £ 650 MILLION
Russian Central Bank RUB 2 Million
Tesco Bank £ 2,500 Million
Indonesian Banks Rp 130 Milliar
Danamon Bank Rp 400 Million
BRI MATARAN Bank Rp 1,500 Million
CIMB Niaga Bank Rp 121 Million
…
FRAUDS
The first goal of hackers is gain.
Either they take it immediately from the banks or they get
it in the form of ransom, or they steal the private data of
the customers of their direct victims to attack the small
traders and their customers.
The studies showed that what hackers are stealing are
mainly customer names, payment card numbers, email
addresses and passwords, addresses, birth dates, phone
numbers and Social Security numbers.
Each of us is a potential victim
FRAUDS ON INTERNET CARDS – NON
PRESENT
FRAUDS
Vulnerabilities
IN THE SHOP
CARDS ARE PRESENT
It is very easy to understand that card payment system is quite vulnerable, when
one considers the complexity of its operation.
1. DUE TO THE NUMBER OF HUMAN OR MECHANICAL
FACTORS THAT ARE INVOLVED
cardholder
Scheme
portal
software
vendor
card itself
(payment brand's
issuer
network) (buyer's bank)
hardware
merchant manufacturer
processors Acquirer
(the merchant's
bank)
Vulnerabilities
Payment by cards is made in two stages
The first stage
Is the most dangerous because it is during this phase that sensitive authentication data is
transmitted from the buyer to the seller.
This is the authorization phase during which sensitive data passes through interfaces that
communicate with the outside world (POI Device, POS, Payment Processor Link) and
Processing Modules that perform the transfer and storage of sensitive data on hard disks
(Router, S & F, TOR, Batch).
The second stage : the settlement phase
which is the second phase without transmission of sensitive data, therefore less
dangerous.
Vulnerabilities
The authorization phase
Gateway Acquirer
Routes Transmits
request request
Multiple Processor Multiple Processor
Routes Routes
request request
Merchant’s Payment brand’s
payment software
Processes payment
network Scheme
Transmits request
Transmits request
Issuer
Checks
available
credit of founds
Merchant’s Cardholder
payment hardware Swipes the
Accepts and transmits card
the card data
Vulnerabilities
2. DUE TO THE DIFFERENT STATES OF THE DATA
Data that are transferred from the POS are at different times in different states.
In transit, at rest or stored.
Data IN MEMORY
they are stored in the memory of the seller's computer.
Data AT REST
They are queued for a shorter or longer period on the hard disk (data base or
log files) while waiting to be processed.
Data IN MOTION
They travel during their transfer via LAN or serial connection.
Vulnerabilities
Key vulnerability areas
Retail Store Payment Processor
Data in memory Data Center
POS Machine Application code
& configuration Data in transit
Memory
Payment-
Payment Processing
Application Host
POS App Data in transit
Hard Drive Data in transit
Data in transit
Application code
Data at rest
POI Device
FRAUDS
« To successfully fight fraudsters, the
industry needs to close the security gaps,
continue to improve and consumers must
be proactive. »
Al PASCAL, senior vice president, research director and head of fraud & security,
Javelin Strategy & Research
It is in this perspective of total security that
PT SYDECO has created
SST
BECAUSE THE KEYS USED TO ENCRYPT DOCUMENTS OR
MESSAGES ARE WHAT THE HACKERS ARE LOOKING FOR IN A
COMPUTER, PT SYDECO HAS CREATED A SYSTEM OF
PROTECTION BASED ON ARTIFICIAL INTELLIGENCE THAT IS
NOT USING ANY KEY TO PROTECT DATA. THIS SYSTEM IS
SST ©
SST
SST SYSTEM
SST© a new product resulting from the
research of PT SYDECO, is the intelligent
system that makes cryptography an obsolete
means of protection. SST© allows you to
safely store, send and receive unencrypted
data on and from a mobile phone or any other
mobile or non-mobile device, such as a These data have the same degree of security that a
computer, using the internet to do so. quantum computer confers to fiber optic cable
transport in the sense that if interception occurs, the
message becomes unreadable: with SST©, the
message that is sent automatically evaporates if it is
intercepted or if it reaches the wrong destination. The
same applies if an unauthorized person tries to
appropriate or read the message.
The system is equipped with intelligent
agents that protect data either
automatically or on demand, which keeps
them safe from any intrusion and / or
sends them.
SST
The protection of data is conferred by their
transformation into writings in the form of
progressive waves of lengths and colors
varying according to the content they carry
or contain
The intelligent agent of the transmitter
protects the data and writes them as waves,
while the intelligent agent of the receiver
replaces the data in the original text for
reading before saving them if required.
These intelligent agents are not likely to be
corrupted or attacked because they are not
located in the mobile medium or in the
computer.
SST may also protect the content of
telephone conversations in the same way.
SST
Server is sending to the
The Sender wants sender his own
to send a Intelligent Agent
message identified by his DNA
I.A. DNA
ABC
The Intelligent Agent The Sender types the
translates the message message on a virtual
and writes the message keyboard
under the form of waves
The Sender is sending his message to
the Server
The I.A. is going back with the
message
Server translates the message in a The Server stores the
language known by the I.A. of the message in the vault of
Sender
Recipient and stores it in the vault the Sender which is in a
of the Recipient which is in a protected area, and
protected area where it will stay
Recipient
Recipient requests access to
his vault
Server sends I.A.
Recipient to the
application of the I.A. DNA XYZ
The message will stay in Recipient
the vault of the Recipient
Thanks to his I.A., Recipient can read
The message can be automatically destroyed the message on his interface
Information Memorandum
SSP
BECAUSE
THE PAYMENT SYSTEM BY CARD IS HIGHLY VULNERABLE
THE MOBILE SUPPORTS ARE HIGHLY VULNERABLE
SSP
PT SYDECO
Has created
For ONLINE and IN SHOP shopping
SSP
SSP©
SSP© is an innovation in the back-end infrastructure of payments and in the financial inclusion
allowing small actors to access to the financial services.
SSPcl
SSPcl is a totally new concept in the system of payment, contactless, using Smartphone without
any bank or credit card (without any scheme) and absolutely secure as there is no transfer of
sensitive data such as identity, account number, .... It authorizes peer 2 peer payments, cash and
immediate transfer, payment of invoices, quick payment and plenty of other financial and
business possibilities that are very useful in the active life for the professionals and the
consumers.
SSPsc
SSPsc makes affordable for everyone, at low cost, the mobile payment service. Everyone can
have an e-wallet and make mobile payment even without Smartphone, and therefore access the
financial services using just a mobile phone in order to improve their live and livelihoods.
SSP© is protected by
System
Main server is :
No sensitive data in the Mirror
- Highly protected application
- Isolated from Internet No data in the Customers' money is in
Smartphone the bank of the Customer
No data trace in the
Confidentiality memory of the REAL TIME
Off line Integrity Smartphone
Availability No direct transaction
between Customer and
Seller
STRONG
AUTHENTICATION
PROTECTED BY SST©
No transmission of personal data
No intermediary
Asymmetrical & Parallel System
One Way
System
Payement P2P
Transfer
B2B & B2C
E-Commerce
Withdrawal
Shopping Real Time
POS POS
Tablet
One Wallet
BNI
BRI BCA
6 BANKS
1 WALLET
MANDIRI DANAMON
UOB
Archangel
ARCHANGEL
ARCHANGEL is a Smart Box that creates an internal network within a
company or office and through which all data transmitted via the
internet, either via WIFI or cable, must pass.
Its function is to protect all computers or other mobile devices
belonging to this network against cyber attack from outside and to
protect each computer belonging to this network against the spread
of a virus or a worm from an infected computer to another computer
on the network.
ARCHANGEL is equipped with 3 INTELLIGENT AGENTS, 2 BRAINS, 3
FIREWALLS, to stop the maximum of attacks and to impeach the attacks
that could penetrate the BOX to send back any information to the hacker, a
ROUTER and 2 SWITCH, each part of it being made by PT SYDECO.
Archangel
ARCHANGEL
ARCHANGEL is a SMART BOX because it has 3 INTELLIGENT AGENTS (IA) and 2 e-learning
Machines :
IA 1 IA 2 IA 3
In the HONEYPOT who Who is Who receives
is analysing the data filtering the the result of the
and sending data and analysis made
their characteristics to transferring by BRAIN 1 and
BRAIN 1 (e-learning them to integrates them
Machine) in order to the in the system of
be studied SWITCH protection
Archangel
ARCHANGEL
SERVER 1 (BRAIN 1) is transferring the characteristics to SERVER 2 (BRAIN 2)
in order to study the evolution of the attacks and anticipate the future ones
Archangel
ARCHANGEL
ARCHANGEL is the latest from PT SYDECO technology, a 100%
Indonesian product. Together with SSP© (Secure System of
Payment) and SST© (Secure System of Transmission), ARCHANGEL
constitutes the best arsenal of protection for internet users, the
best defence against all CYBER ATTACKS.
ARCHANGEL is protected by
Archangel
COMPARATIVE
TECHNICAL SHEET
McAfee Network Security Platform
Archangel FortiGate 3600C HP TippingPoint NX S5200NX
NS9100
POWER DEVICE
Nominal Voltage DC 12 V AC 120 / 230 V AC 120 / 230 V AC 120 / 230 V
Frequency Required 50 Hz 50 / 60 Hz 50 / 60 Hz 50 / 60 Hz
Power Consumption
10 Watt 512 Watt 750 Watt 1130 Watt
Operational
POWER
Power Redundancy Yes Optional
MISCELLANEOUS
Rack Mounting Kit Included Included Included
Height(Rack Units) 3m 2m 2m
NETWORKING
Remote Management Protocol HTTP, SNMP, SSH HTTP, SNMP
Alarm, Fan, Link/Activity, Power,
Status Indicators Power, Fan, eth
Status
Network / Transport Protocol TCP/IP IPSec
IPv6 support, IPv4 support, triple
IPv6 support, IPv4 support, NAT
firewall protection, IDS, IPS, VPN,
Support, VPN acceleration Intrusion Detection System (IDS),
Features Honeypot, Intrusion Prevention System (IPS)
capability, VPN support, firewall Intrusion Prevention System (IPS)
Artificial Intelligence,
protection, traffic shaping
NAT support, Log Attacker
Connectivity Technology Wired Wired Wired Wired
Archangel
COMPARATIVE
TECHNICAL SHEET
SECURITY
Secure System of Transmission 256-bit AES, SHA-1, SSL,
Security RSA, AES, Triple-DES, SHA-1 SHA-256
(SST) TLS 1.2
SYSTEM REQUIREMENTS
Apple MacOS X 10.6 or later,
OS Required Linux OS
Microsoft Windows Vista / XP / 7 / 8
SPEEDS
Data Transfer rate 2 Gbps 1 Gbps 3 Gbps 1 Gbps
Firewall 125 Mpps 90 Mpps
ENVIRONMENTAL PARAMETERS
Min Operating Temperature 68 oF 32 oF 32 oF 32 oF
Max Operating Temperature 122 oF 104 oF 104 oF 95 oF
Archangel
COMPARATIVE
TECHNICAL SHEET
HEADER
Brand Sydeco Fortinet HP McAfee
Product Line Archangel Fortinet FortiGate HP TippingPoint NX Network Security Playform
Model - 3600C S5200NX NS9100
Packaged Quantity 1 1 1 1
Compatibility PC Mac, PC PC PC
CABLE DETAILS
USB Cable, Console Cable, Network
Type Network Cable, VGA Cable
Cable
SOFTWARE
Type Source Code, Web App & Utilities Drivers & Utilities
DIMENSIONS & WEIGHT
Width 5.11 in 17.5 in 16.8 in 17.2 in
Depth 5.11 in 21.7 in 21.8 in 28.8 in
Height 2.69 in 5.2 in 3.5 in 3.4 in
Weight 48.68 lbs 42.11 lbs 67.02 lbs
GENERAL
Manufacturer Sydeco Fortinet HP McAfee
THEY TRUST US
PT BLISS OVIS
INDONESIA
• Jl. Perumas, Perumahan Jogja Regency Kav. D. 10,
Yogyakarta 55283
• Tel . (+62) 274- 488.272
• [Link]
• [Link]
• [Link]
• [Link]