Digital Transaction Limited

Groundbreaking cybersecurity

For

Insider monitoring.

PreventiveChain is a unique preventive security management system built upon our high performing ParallelChain™ platform. This biometric system incorporates cameras to enable businesses to monitor insider user behaviors and prevent improper use and leaking of the most absolutely organization-critical data.
PreventiveChain
Future-proof your cybersecurity

Insider threats are a growing problem.

Organizations conventionally focus on cyber threats that are external in origin; these include malware, DDoS, MiTM, and XSS attacks, and industrial espionage. Meanwhile insider threats, which pose just as great of a security risk to companies and organizations, are often responded to only after-the-fact, typically through legal action.
The size and the speed at which damaging or confidential information can spread through the internet is quickly making this approach insufficient, and companies are starting to realize this.
68%32%

68% of organizations feel moderately to extremely vulnerable to insider attacks.1

12019 Securonix™ Insider Threat Report
73%27%

73% of organizations confirm insider attacks are becoming more frequent.1

12019 Securonix™ Insider Threat Report
59%41%

59% think that privileged IT users pose the biggest insider security risk to organizations.1

12019 Securonix™ Insider Threat Report
PreventiveChain Login
A proprietary layer of protection

Enhanced security, at every point of interaction.

PreventiveChain logs and protects the safety of all user interaction with the system.
And by all, we mean everything. From something as mundane as opening a website, to something less clear-cut and possibly malicious as I/O traffic between the computer and the outside world.
Logged data is not only persisted in ParallelChain for investigation in the event of a data leak, it is analyzed in close to real-time. Suspicious patterns of behavior are flagged, and if need be, will lock the computer.
Dynamic watermarks
Biometric authentication

2D/3D anti-spoofing

A weakness with run-of-the-mill face recognition solutions is that they often cannot distinguish between three-dimensional faces and two-dimensional prints.
PreventiveChain's biometric authentication is intended to be paired with dual-sensor webcams, with one sensor capturing visible light, and another capturing infrared. The information this setup captures allows us to distinguish prints from real human beings, not only by analyzing depth information, but also by detecting the user' pulse.
Dynamic watermarks
Deterring data theft

Dynamic watermarks. Protection that extends beyond the screen.

Blocking screenshots on an operating system level does not do much to protect data when users can simply take a picture of their computer screen with a mobile phone.
With dynamic watermarks, malicious users who attempt to steal confidential data by taking a picture of a PreventiveChain-equipped system have their user details exposed in text overlaid across the screen contents. By eliminating leaker anonymity, PreventiveChain deters data theft.
PreventiveChain administrator page
Truly immutable, judicially permissible logs

What happens in PreventiveChain, stays in PreventiveChain

Since logged data is persisted over-the-air into ParallelChain, malicious actors cannot hide their tracks by tampering with their usage history.
Another benefit of having a blockchain-based security system is that in the event of a suspected data leak incident, both the organization and the employee can be confident that the evidence behind the suspicion is accurate, and has not been tampered with. Data persisted into ParallelChain is truly immutable. Neither user nor administrator can rewrite it.

Features

Multi factor
Multi-factor User Authentication

Adds a layer of physical security to your systems. No phone or token generator: no access.

Facial recognition
Facial Recognition with 2D/3D anti-spoofing.

Distinguishes between real persons and printed graphics.

Restricted access rights
Restricted Access Rights

Exposes different subsets of the filesystem to users in different permission levels.

Real-time tracking
Real-time tracking of user behaviour

AI models monitors the user's behaviour for suspicious activity, and automatically logs them out if need be.

User control
Control override

Administrators can forcibly take control of installed devices in the event of an attack.

Security watermarks
Security watermarks

Deters screen capture by making the potentially malicious user's identity visible in screenshots.

User activities recording
Immutable persisting of captured data

Everything the system monitors is stored in ParallelChain, making evidence-tampering impossible.

Restricted drives
Restricted external & network drives

Selectively blocks use of USB, Bluetooth, Network Storage, and other external peripherals.

Contact us

Schedule a consultation

Want to explore using our products for your business, non-profit, or institution?

Or

Want to build your own customized solution with us?

phone(+852) 2325-6667
Linkedininfo@digital-transaction.com
Request documents
Your inquiry has been submitted. We will send a reply to your email address ASAP.