H-BROWSER
Overview
H-BROWSER
Product Features
H-BROWSER
Resources
H-BROWSER
Requirements

H-BROWSER: THE WEB SECURITY GEAR

The H-Browser is a hardened Web browser specifically designed at the architectural level for securing Internet transactions and intended to work as a single-purpose security application. At the same time, the H-Browser feels and operates just as any standard Web browser, without impacting the user experience.

Critical sections of the H-Browser executable code are modified (virtualized) at the level of the original processor commands, converting these into new byte code unknown to the operating system’s processors. This forces hackers to operate in unknown territory, having to develop new tools for analyzing and decompiling the virtualized byte code.

The specific implementation details of the internal virtual machine can be changed (polymorphs) across different builds of the H-Browser executable code, preventing the scalability of malware attacks.

  • Zero-footprint (no prior installation, special drivers or admin privileges required to run on the host PC)
  • Available as a software-only downloadable application or integrated with secure USB tokens, including devices with a Smart Card (e.g. Safenet, Crealogix) and biometric sensor (e.g. Imation).
  • Fully integrated with the H-Login module, providing active protections against all major attack vectors exploited by financial malware, including keystroke/mouse logging, screen capture and code injection.
  • Application files and resources are kept inside of encrypted containers, never exposed to attackers and loaded in memory only at run time after full integrity checks.
  • Certified for use against Man in the Browser attacks by IndenTrust, the global leader in identity solutions for financial institutions (www.identrust.com). Transaction signing is supported via the integrated locked ISPI plug-in component.
  • Enforces integrity checks on Web form entries, preventing on-the-fly memory attacks to critical fields.
  • Supports Java Script and Adobe Flash (Optional).
  • Allows connecting only to the web sites hard coded in the internal Access Control List (ACL). The target web sites are checked at the URL, IP address and certificate fingerprint levels before any connection is enabled. The ACL can be adapted and updated according to customer requirements.
  • User interface localized in English, French, German, Italian. Additional languages available upon request.
  • (Optional) User Interface customized based on corporate branding guidelines.
  • (Optional) Integrated with the centralized cloud-based management, allowing to receive Proactive Security Updates from the H-Server and to block access to the H-Browser resources and data.

Browse our list of product briefings,
white papers and research reports.

Register by filling out the information in the form below.
The download link will be sent to your email.





Learn about the latest malware attacks
and view educational videos on how the
H-Apps can help secure your business.

Sing up for a FREE DEMO of the H-Apps
of your choice.

System Requirements

Processor IBM PC or compatible with Intel base processors
Intel Pentium 4 800-MHz or higher
(Intel Core 2 Duo or higher recommended)
Memory 512 megabytes (MB) of RAM (2GB recommended)
Operating System Microsoft® Windows® XP SP3 or higher
Microsoft® Windows® VISTA all versions
Microsoft® Windows® 7 all versions
Mac OSX 10.6.x and higher
Display 1024 x 768 resolution, 65 536 colors minimum
(32-bit color recommended)
mTan & OOB Methods

mTan & OOB Methods more

Social Engineering & Interface Manipulation

Social Engineering & Interface Manipulation more

Static Code Dumping & Patching

Static Code Dumping & Patching more

Screen Capturing

Screen Capturing more

PDF Form Spoofing

PDF Form Spoofing more

Dynamic Code Dumping And Patching

Attack whereby malware uses DLL-injection more

Window Overlay and Event Emulation

Window Overlay and Event Emulation more

Keystroke and Event Emulation

Common attack scenario which uses the keystroke and mouse event more

Session Hijacking

How a Hacker can hijack an active browsing session more

Keystroke and Mouse Logging

How to retrieve personal and transaction information more