HARDENING

Software hardening und mobile security
Software Haertung CORONIC

Closing security gaps

If you ask security software manufacturers, they will tell you that for every single malware program, there is an adequate software package; for every virus, there is an appropriate antivirus; and for every security vulnerability, there is the right firewall… But despite their reassurances, the number of computer viruses and spyware attacks is increasing. For years now, protection against malware by means of internal Windows SSL encryption has been ineffective. Every time you click on something, you run the risk of opening the floodgates to hackers and Trojans. This is why CORONIC focuses on the basis itself of software programmes, identifies the typical weaknesses and gaps in operating systems and drivers at that level, and then helps users resolve them.

CORONIC in the media

One could say that CORONIC breeds “digital guard dogs”.This software company develops secure browsers and includes banks and the German Federal Armed Forces in its client base.

Kieler Nachrichten

Article published on 20 February 2009

Coronic-Medien-Kieler-Nachrichten-Logo
Click on the image to read the article.

Software hardening - for your apps too

Flexible defence

If a line of defence is too rigid, then it will automatically lose the battle. Of course, there is no perfect security mechanism, because by nature, due to the systems applied, every software programme can be circumvented. CORONIC therefore uses numerous security features, which can all be combined and connected into a network in its products.

Protection for your apps

CORONIC's dynamic security processes can also be integrated into other products and programmes to harden and protect apps and desktop programmes. This means that a very simple app can be hardened for use on a business smartphone, and a normal desktop programme can become a security centre that can defend itself against attacks.

Ten years of hardening experience

We are experts in online banking security processes. For over ten years now, CORONIC has been supporting and consulting German and international banks and financial service providers to secure their client and banking processes. Benefit from our know-how for your own protection!

Honest & straightforward

We are open and honest, and are clear about our work and the tasks at hand. You will never hear us say that we will meet a tight deadline if this is not achievable: indeed, we speak about risks openly and always recommend alternatives.

Client testimonials

„As a cooperative, our members’ security is very important to us. This is why we chose to use CORONIC’s hardened browser in 2013 already. In April 2014, VR-PROTECT was introduced into our online bank account models with a certificate.”

coronic-kunde-icon-VR-Logo-v2
Andrew Termöllen

Team Leader, Payment Systems, Volksbank Greven eG

What is software hardening?

Definition

Software hardening is a series of technical measures to secure the protection of individual programmes or transactions on vulnerable IT systems. The hardening library monitors the memory, interfaces, loading routines and processing patterns in the protected programme. It uses watchdogs to monitor the system, controls IP and network traffic, secures encryption and therefore protects all components of the software in its interaction with the rest of the IT world. Software hardening is not an antivirus, firewall or intrusion detection system. These traditional security programmes aim to protect IT systems as a whole. Over the past years, however, we have seen that global system protection faces an impossible task (even if antivirus manufacturers tell you the exact opposite).

Examples of use

In cases in which the IT system cannot be protected as a whole anymore, software hardening can provide protection for specific programmes or extremely important transactions. This is only used for critical processes that cannot be accessed under any circumstances by a third party, hacker or Trojan. Software hardening is often implemented on end clients' IT systems, because individuals are unable to implement professional IT protection or can only do so with great difficulty. Other common applications are the protection of sensitive data and processes on badly protected or out-of-date IT systems. Examples thereof are: life-support IT infrastructures in hospitals, critical IT programmes in the field of energy or the automobile industry. The most common errors targeted by software hardening, however, are to be found in online banking, push apps and all types of financial transactions on the internet.