ERMES Security

ERMES Security

Defend your managers against targeted attacks
everywhere and without changing their habits.

48% of targeted attacks are delivered through browsers and mobile apps.
Targeted attacks like identity theft, data collection, keylogging and cyber espionage are the incoming warning for small and big industries.

Ermes Internet Shield defends employees against emerging web threats.


ERMES Security Features

Identity Theft

Online trackers collect information about employees and their devices. Such information is stored on systems external to the company and if lost or stolen, puts at risks the company’s security and privacy.
Fraudulent Data Collection

Sensitive information gets exposed to unknown third parties by employees who browse the web. Data such as web histories, click traces, contacts and credentials provided in forms can be stolen and used for malicious purposes.

Third-party services embedded in sites can record and store any action performed on visited web pages, such as clicks and keystrokes. Collected data contains credentials and credit card numbers too.
Tracking Links

Tracking links to third party web sites. Web sites provide links to third party web sites that contain identification information to track users.
Cyber Espionage

Profiles built by trackers are out of control of the tracked company. These are bought or stolen by competitors to capture strategic plans.

Many websites embed scripts which exploit computational resources available on visitors’ devices to mine cryptocurrencies and provide revenues to the attacker. Employees see their device performance slow down and unwillingly take part in an often illegal mining network.

Compromised websites fool users by means of tabnabbing techniques with the ultimate goal of performing phishing, scam, or distributing malware
Malicious Actors

Malicious actors intercepting, observing, and potentially even modifying your HTTP communications with web sites.

How secure is your organization?

Request your Security Rating Snapshot report to find out how secure your organisation really is.
View a baseline report of your current security rating
Compare your cybersecurity performance to industry peers & competitors
Get insights into the risk vectors of your security posture
Learn how to get a risk-based, outcome-driven approach to managing your security performance