iTracer UDI-Collecting System
User Device Info Collecting System
iTracer, the UDI-Collecting System, is the real-time solution to trace and analyze IPs and software information of access device’s hardware and OS, etc.
Core Functions and Superiority
Solve in real time the problem of personal info leakages through judgement (patterns) on anomalies
Detect and Block bulk searching (bots, etc.) in real time
Determine on access device's anomalies proactively, and Block fraud accesses
Introduce the appliance-type and package-type solution of verified hardware (GS (Good-Soft) certified)
Why Need iTracer
- Urgently need the way to block personal info from being searched and leaked in bulk indiscriminately via the Internet.
- Have to prevent the service-response speed drop caused by bulk searching for every crucial info (of private or public) of the internet services.
- Urgently need the way to immediately determine and prevent malevolent hackers’ behavior patterns and ways of illegal accesses.
What iTracer Actualize
OSs supported by iTracer
Real-time Detecting/Blocking of Personal Info Leakage, and IP-tracing
- Detecting and Blocking of personal info leakage
- Rule/Policy Management through detected pattern analysis
- Monitoring of real-time detecting/blocking
- Collecting and analyzing info of fraud access device leaking critical info
Prevent Web Hackings and Fraud Accesses
- Access-Info Collecting
- Monitor collected information (Real-time Control to detect and block).
- Retrieve accessed device information by using various queries.
- Provide Access statistics and collected info-specific Statistical lists.
- Deliver services for evidential materials.
- Provide templates of evidential materials to be presented to the police and the prosecution.
- Collect with service system logs added.
- Detect and analyze Blacklists.
- Send alert and alarm of risk factors.
- Send SMS to customers and bank managers, according to the policy on fraud access.
- Send Alert and SMS in regard to a specific grade among collected info.
Trace down Hackings and Prevent e-banking Fraud transactions
- Trace down all information in real time, even if hackers’ or accessors’ “Private IP, Public IP or Proxy IP” is used.
- Implement the highest real-time performance of info collecting and the highest accuracy of collected info.
- Provide apparent evidential materials of accidents that have happened by interlocking account transfer info with tracking info, and prevent banking accidents in future.
- Trace down hackers analytically and prevent every illegal e-banking transaction by detecting, analyzing and blocking fraud-accessing info coming out from priority watch countries as well as domestic and overseas countries.
- Support Multi-Browser, Multi OS and smartphone.
- Minimize load on existing web servers by independent architecture of web server and collecting-server.
- Maximize scalability and stability of system by implementing functions of blocking/collecting and analyzing/DB managing separately.