3D scanning technology showcasing commercial applications in healthcare and industry - Global Banking & Finance Review
An illustration of 3D scanning technology highlights its increasing use in various industries, particularly healthcare, where it aids in creating prosthetics and modeling body organs. This image represents the expanding 3D scanners market projected to reach US$ 10 Bn by 2030.
Top Stories

Online Security threats counteracted as new Secure Communications system is launched

Published by Gbaf News

Posted on January 11, 2013

3 min read
Add as preferred source on Google

New security system uses patented technology to secure client-server
communications and protect against Internet communication vulnerabilities

MHI Launches Secure Communications Suite

UK-based MH Invent Ltd (MHI) has today launched three products (Hawk, Eagle and Merlin) which are designed to secure communication between services and users. The suite of products offers a radical new approach to tackling the ever-increasing threats to online security.

Innovative Security Model Redefines Protection

MHI’s Secure Communications Suite redesigns the security model incorporating simple methods that make it possible to secure communications end-to-end between users and services even across a ‘broken’ network. These solutions are device and protocol agnostic and require no certificates or tokens (but are fully compatible with legacy security infrastructure) and are designed to support any service from online banking to cloud services. The suite works by creating a secure client that creates multiple secure tunnels. This is further strengthened using MHI’s own, patented, anti-tamper and anti-cloning technology. The service supports forensic audit, location validation and network identification. Furthermore the patented image-based authentication option entirely removes the need to transmit user names or passwords. The services within the suite can be used stand alone or integrated into one family of products depending on user requirements.

Defending Against Modern Online Threats

MHI’s solutions are designed to protect against threats, vulnerabilities and exploits including attacks on the user (social networking scams, identity fraud, phishing), the user’s device (keylogging, man-in-the-browser/Trojans, malware, spyware) and against the network or service (man-in-the-middle, cross site scripting, brute force and denial of-service attacks).

Expert Insights on Internet Security Challenges

MHI’s Chief Scientific Officer, Mike Hawkes: “The Internet was never designed with security in mind – it was designed to share information not to protect it. So organisations have had to integrate a range of solutions in an attempt to make their networks and services as secure as possible. We have taken the approach that every part of the network (or any device) is already comprised, and have therefore created a secure client server environment, which provides an easy way to implement, deploy and manage security. As companies can use our services with their existing security
solutions we are confident we can provide the necessary resilience to combat the ever-increasing risks inherent with online communications.”

Product Availability and Partnership Opportunities

MHI’s solutions are available now and demonstrations of the services are being offered to organisations requiring further information. MHI are also interested in hearing from potential partners.

http://www.mhinvent.com

 

 

Key Takeaways

  • MHI has launched a Secure Communications Suite, comprising Hawk, Eagle and Merlin, to strengthen client–server communications.
  • The system enables end-to-end security over even compromised networks without requiring certificates or tokens.
  • It features patented anti‑tamper, anti‑cloning and image-based authentication that removes the need for passwords.
  • Solutions are device‑ and protocol‑agnostic, compatible with legacy systems, and suitable for services like online banking and cloud platforms.
  • The suite protects against a wide range of threats including phishing, keylogging, man‑in‑the‑browser, MITM, phishing, and DDoS.

References

Frequently Asked Questions

What products make up the Secure Communications Suite?
The suite consists of three products—Hawk, Eagle and Merlin—designed to secure communications between users and services.
Do these solutions require certificates or tokens?
No, the suite operates without certificates or tokens, though it remains compatible with existing legacy security infrastructures.
How is user authentication handled without transmitting usernames or passwords?
It uses patented image‑based authentication, removing the need to transmit usernames or passwords.
What types of threats does the suite defend against?
It protects against user‑targeted attacks (social scams, phishing), device threats (keylogging, Trojans), and network/service threats (MITM, XSS, brute force, DoS).
Is the solution flexible across environments?
Yes, it is device‑ and protocol‑agnostic, works across ‘broken’ networks, and supports a range of services from online banking to cloud platforms, either standalone or integrated.

Tags

Related Articles

More from Top Stories

Explore more articles in the Top Stories category