H-LOGIN
Overview
H-LOGIN
Product Features
H-LOGIN
Resources
H-LOGIN
Requirements

H-LOGIN: OFF TO A GOOD START

The first step common to all modules of the H-Apps suite is the user authentication procedure required to gain access to any application/device resources and to setup the isolated execution environment. These tasks are handled by the H-Login module which allows users to setup their secret credentials (username and passphrase, or PIN and PUK when the module is interfacing with a Smart Card) and which can set up a hardened desktop environment (H-Desktop) inside of which the H-Apps will be running.

The H-Login module allows also entering the general settings for network connections (e.g. proxy authentication credentials), as well as user preferences (default language, auto-logoff time, H-Apps startup priority, etc.). Furthermore, the H-Login handles communication with the H-Server enabling the Proactive Security Updates of the licensed H-Apps and the remote management of the user access to any deployed hardware devices (e.g. smart USB drives).

  • Zero-footprint (no prior installation, special drivers or admin privileges required to run on the host PC)
  • Enforces corporate policies for end user enrolment and authentication. Can interface with any authentication server and transaction protocol.
  • Supports mutually authenticated network access to safeguard from man-in-the-middle and host tampering attacks
  • Enforces integrity checks on all application components and updates before allowing execution
  • User interface localized in English, French, German, Italian. Additional languages available upon request.
  • (Optional) Establishes the H-Desktop, a hardened, lightweight virtual operating environment isolated from host applications, capable of operating securely also in the presence of active malware
  • (Optional) Provides active protections against the following attack vectors:
    • -    Screen Capture
    • -    Windows Overlay
    • -    GUI Controls Manipulation
    • -    Keystroke Logging
    • -    Mouse Logging
    • -    Keystroke Event Emulation
    • -    Mouse Event Emulation
    • -    Function and code injection
  • Enables the centralized cloud-based management of the H-Apps, allowing to receive Proactive Security Updates from the H-Server and to block access to the H-Apps resources and data.

Browse our list of product briefings,
white papers and research reports.

Register by filling out the information in the form below.
The download link will be sent to your email.





Learn about the latest malware attacks
and view educational videos on how the
H-Apps can help secure your business.

Sing up for a FREE DEMO of the H-Apps
of your choice.

System Requirements

Processor IBM PC or compatible with Intel base processors
Intel Pentium 4 800-MHz or higher
(Intel Core 2 Duo or higher recommended)
Memory 512 megabytes (MB) of RAM (2GB recommended)
Operating System Microsoft® Windows® XP SP3 or higher
Microsoft® Windows® VISTA all versions
Microsoft® Windows® 7 all versions
Mac OSX 10.6.x and higher
Linux Ubuntu 11.4
Display 1024 x 768 resolution, 65 536 colors minimum
(32-bit color recommended)
mTan & OOB Methods

mTan & OOB Methods more

Social Engineering & Interface Manipulation

Social Engineering & Interface Manipulation more

Static Code Dumping & Patching

Static Code Dumping & Patching more

Screen Capturing

Screen Capturing more

PDF Form Spoofing

PDF Form Spoofing more

Dynamic Code Dumping And Patching

Attack whereby malware uses DLL-injection more

Window Overlay and Event Emulation

Window Overlay and Event Emulation more

Keystroke and Event Emulation

Common attack scenario which uses the keystroke and mouse event more

Session Hijacking

How a Hacker can hijack an active browsing session more

Keystroke and Mouse Logging

How to retrieve personal and transaction information more