Cook Security Group developed the RemoteView product line to utilize technology to remotely deliver support to the ATM | ITM industry.
RemoteView ATM | ITM product line has been developed into multiple modules to support all departments interfacing with the machines.
Resolve over 63% of issues without a tech being dispatched.
Monitor, manage and maintain your ATMs | ITMs. Reduce service calls with remote troubleshooting and expedited resolution. Includes remotely identifying the problem and repair of basic software issues for increased uptime.
RemoteView Diagnostics / ATM | ITM means more uptime resulting in the ability for more customer transactions. Without RemoteView ATM | ITM Diagnostics installed, when a fault occurs at your ATM | ITM, whether it can be a card reader, printer, or dispenser issue, the ATM | ITM is out of commission until a technician has the ability to diagnose the issue on-site.
The picture changes dramatically with RemoteView ATM | ITM Diagnostics: Our RemoteView technicians monitor, maintain and manage your ATMs | ITMs remotely regardless of brand. When a fault occurs an alert is sent to our team notifying us of the issue. With RemoteView ATM | ITM Diagnostics we have the ability to remotely connect to the ATM | ITM, and in less than 60 minutes on average we have been able to fix 63% of the time without a technician ever having to step foot on the premises. If are unable to resolve the issue remotely, a technician is dispatched with the exact error codes, which means a faster repair because the diagnosis has already been identified.
Do you know the current status of your ATMs | ITMs?
Are you managing all of your ATM | ITM details from a current spreadsheet?
How do you access your Electronic Journals?
Q. How does the ATM | ITM connect to RemoteView?
We install a small Windows-based agent on your ATM | ITM. The agent communicates Outbound only to the IP address & port specified.
Q. Can I view all my ATMs | ITMs from one interface?
YES, you finally can! our Command Center simplifies viewing all your locations and analyzing data—in aggregate or individually. For security purposes, you can designate which user has access to what data, and multi-factor authorization adds a PIN to enter before anyone can log in.
Protect your devices with trusted Application Control to prevent malicious attacks.
ATMs | ITMs run a Microsoft Windows computer internally that need security software, just like your personal computer. With ATM | ITMs capturing your customer’s bank account and financial information this is extremely vital. Since Microsoft discontinued support for older versions of Windows, the biggest threat to your ATM | ITM network is malicious attacks targeted to ATMs | ITMs. Having RemoteView ATM/ITM Security Suite installed on your ATM | ITM, we can prevent attacks.
Rest Easy Knowing your ATMs are Protected:
Q. What Anti-Virus and Anti-Malware definitions do you use?
We use CylancePROTECT, an integrated threat prevention solution combining the power of artificial intelligence (AI) to block malware infections with additional security controls safeguarding against script-based file-less memory and external device-based attacks.
Q. How do you prevent malicious or unintentional threats?
Combing RemoteView Security+ and CylancePROTECT will provide the most secure environment. Unlike traditional endpoint security products relying on signatures and behavior analysis to detect threats in the environment, uses AI to identify and block known and unknown malware from on endpoints.
Q. How secure are the connections you use for access?
Security is our #1 priority! The SOC 2 Type II audit confirms we follow a set of predefined benchmarks for security, availability, and confidentiality. We use AES 256 bit encrypted VPN connections, which are considered among the most secure available: AES (Advanced Encryption Standard) is used by the U.S. government to protect classified information and is implemented in both software and hardware throughout the world to encrypt sensitive data. In addition, we test for vulnerability each month.
Q. Why is Traditional White Listing Protection not enough?
White Listing simply checks the application’s ID and allows the application to run with no further controls. This lack of further monitoring results in possible “zero-day” vulnerabilities, which could turn the trusted application into a malicious application in run-time. The exploited White Listed application could easily alter system configurations, drop file-less code into the system via registry configurations to defeat the White Listing, and become persistent on the ATM/ITM. This approach to security does not defend against zero-day or other unknown vulnerabilities and requires signature and rule updates. Until these updates are applied, the ATM/ITM is at risk.
View and download real-time electronic journal activity and reports which are uploaded automatically.
Daily backups performed to limit downtime and data loss.
Maintain compliance and keep your ATMs | ITMs secure with up to date Microsoft software patches.
Managed Wireless Connectivity
Lockdown your hard drive with 256-bit encryption to prevent unauthorized access.
Deploy advertisement screens to any and all ATMs | ITMs, automatically, at the times you choose.
Portland (National Headquarters and Support Center) 9225 NE Cascades Parkway, Portland, OR 97220
Monday – Friday 8 AM – 5 PM
7 Days a Week 5 AM - 10 PM PST