www.verimatrix.com
Open in
urlscan Pro
162.159.137.54
Public Scan
Submitted URL: https://c24p-04.na1.hubspotlinks.com/Ctc/ZN+113/c24p-04/VWszzN6hnnj1V73LC78ryvQpVfQRxk599P41MrH-SW5n4LbW7lCGcx6lZ3kSW7wl4p-4VLyYlN1D9...
Effective URL: https://www.verimatrix.com/cybersecurity/knowledge-base/how-verimatrix-helps-financial-institutions-meet-hefty-regulation-r...
Submission: On February 06 via api from ES — Scanned from ES
Effective URL: https://www.verimatrix.com/cybersecurity/knowledge-base/how-verimatrix-helps-financial-institutions-meet-hefty-regulation-r...
Submission: On February 06 via api from ES — Scanned from ES
Form analysis
3 forms found in the DOMPOST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/327778/3b0cf0ec-8ec4-472a-aced-94d2db503aaa
<form id="hsForm_3b0cf0ec-8ec4-472a-aced-94d2db503aaa" method="POST" accept-charset="UTF-8" enctype="multipart/form-data" novalidate=""
action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/327778/3b0cf0ec-8ec4-472a-aced-94d2db503aaa"
class="hs-form-private hsForm_3b0cf0ec-8ec4-472a-aced-94d2db503aaa hs-form-3b0cf0ec-8ec4-472a-aced-94d2db503aaa hs-form-3b0cf0ec-8ec4-472a-aced-94d2db503aaa_e8c19d67-152a-4f24-9451-ddd4a60c65b1 hs-form stacked"
target="target_iframe_3b0cf0ec-8ec4-472a-aced-94d2db503aaa" data-instance-id="e8c19d67-152a-4f24-9451-ddd4a60c65b1" data-form-id="3b0cf0ec-8ec4-472a-aced-94d2db503aaa" data-portal-id="327778"
data-test-id="hsForm_3b0cf0ec-8ec4-472a-aced-94d2db503aaa" data-hs-cf-bound="true">
<div class="hs_email hs-email hs-fieldtype-text field hs-form-field"><label id="label-email-3b0cf0ec-8ec4-472a-aced-94d2db503aaa" class="" placeholder="Enter your Email" for="email-3b0cf0ec-8ec4-472a-aced-94d2db503aaa"><span>Email</span><span
class="hs-form-required">*</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input id="email-3b0cf0ec-8ec4-472a-aced-94d2db503aaa" name="email" required="" placeholder="name@company.com " type="email" class="hs-input" inputmode="email" autocomplete="email" value=""></div>
</div>
<div class="hs_gclid hs-gclid hs-fieldtype-text field hs-form-field" style="display: none;"><label id="label-gclid-3b0cf0ec-8ec4-472a-aced-94d2db503aaa" class="" placeholder="Enter your gclid"
for="gclid-3b0cf0ec-8ec4-472a-aced-94d2db503aaa"><span>gclid</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input name="gclid" class="hs-input" type="hidden" value=""></div>
</div>
<div class="legal-consent-container">
<div class="hs-richtext">
<p>By submitting this form, I agree to the processing of my personal data for the purpose of receiving the Verimatrix newsletter, in compliance with Verimatrix’s
<a href="https://www.verimatrix.com/privacy/" target="_blank" rel="noopener">Privacy Notice</a>.</p>
</div>
</div>
<div class="hs_submit hs-submit">
<div class="hs-field-desc" style="display: none;"></div>
<div class="actions"><input type="submit" class="hs-button primary large" value="SIGN UP"></div>
</div><input name="hs_context" type="hidden"
value="{"embedAtTimestamp":"1707236862320","formDefinitionUpdatedAt":"1700711767119","lang":"en","legalConsentOptions":"{\"legitimateInterestSubscriptionTypes\":[195799,11540568,1285403,28271797],\"communicationConsentCheckboxes\":[{\"communicationTypeId\":28271797,\"label\":\"I agree to receive other communications from Verimatrix.\",\"required\":false}],\"legitimateInterestLegalBasis\":\"LEGITIMATE_INTEREST_PQL\",\"communicationConsentText\":\"Inside Secure is committed to protecting and respecting your privacy, and we’ll only use your personal information to administer your account and to provide the products and services you requested from us. From time to time, we would like to contact you about our products and services, as well as other content that may be of interest to you. If you consent to us contacting you for this purpose, please tick below to say how you would like us to contact you:\",\"processingConsentType\":\"IMPLICIT\",\"processingConsentText\":\"In order to provide you the content requested, we need to store and process your personal data. If you consent to us storing your personal data for this purpose, please tick the checkbox below.\",\"processingConsentCheckboxLabel\":\"I agree to allow Inside Secure to store and process my personal data.\",\"privacyPolicyText\":\"<p>By submitting this form, I agree to the processing of my personal data for the purpose of receiving the Verimatrix newsletter, in compliance with Verimatrix’s <a href=\\\"https://www.verimatrix.com/privacy/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\">Privacy Notice</a>.</p>\",\"isLegitimateInterest\":true}","clonedFromForm":"a530710b-9b67-4140-babe-053ecdef00ef","renderRawHtml":"true","userAgent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.6167.139 Safari/537.36","pageTitle":"How Financial Institutions Can Navigate New Regulations","pageUrl":"https://www.verimatrix.com/cybersecurity/knowledge-base/how-verimatrix-helps-financial-institutions-meet-hefty-regulation-requirements/?utm_campaign=2023%20Cybersecurity%20One-Off%20Email&utm_medium=email&_hsmi=292901585&_hsenc=p2ANqtz-80ywJD42-bJPT9dWXuxzBvM0ihOa8Qk4DnUH8yz6ZjYABWcunJxGKAT6iSVsddNGyLJcoIyIt3bJjel55PJwPTbU0_l5nRgdQHQWXqy-zfxTOs0O8&utm_content=292901291&utm_source=hs_email","urlParams":{"utm_campaign":"2023 Cybersecurity One-Off Email","utm_medium":"email","_hsmi":"292901585","_hsenc":"p2ANqtz-80ywJD42-bJPT9dWXuxzBvM0ihOa8Qk4DnUH8yz6ZjYABWcunJxGKAT6iSVsddNGyLJcoIyIt3bJjel55PJwPTbU0_l5nRgdQHQWXqy-zfxTOs0O8","utm_content":"292901291","utm_source":"hs_email"},"isHubSpotCmsGeneratedPage":false,"hutk":"946d14e0218e28db83f692f7d0e9e17e","__hsfp":704125834,"__hssc":"35684543.1.1707236864591","__hstc":"35684543.946d14e0218e28db83f692f7d0e9e17e.1707236864591.1707236864591.1707236864591.1","formTarget":"#hbspt-form-e8c19d67-152a-4f24-9451-ddd4a60c65b1","rumScriptExecuteTime":3477.7000007629395,"rumTotalRequestTime":3747,"rumTotalRenderTime":3849.1000003814697,"rumServiceResponseTime":269.29999923706055,"rumFormRenderTime":102.10000038146973,"connectionType":"4g","firstContentfulPaint":0,"largestContentfulPaint":0,"locale":"en","timestamp":1707236864599,"originalEmbedContext":{"portalId":"327778","formId":"3b0cf0ec-8ec4-472a-aced-94d2db503aaa","region":"na1","target":"#hbspt-form-e8c19d67-152a-4f24-9451-ddd4a60c65b1","isBuilder":false,"isTestPage":false,"isPreview":false,"isMobileResponsive":true},"correlationId":"e8c19d67-152a-4f24-9451-ddd4a60c65b1","renderedFieldsIds":["email","gclid"],"captchaStatus":"NOT_APPLICABLE","emailResubscribeStatus":"NOT_APPLICABLE","isInsideCrossOriginFrame":false,"source":"forms-embed-1.4639","sourceName":"forms-embed","sourceVersion":"1.4639","sourceVersionMajor":"1","sourceVersionMinor":"4639","allPageIds":{},"_debug_embedLogLines":[{"clientTimestamp":1707236862418,"level":"INFO","message":"Retrieved pageContext values which may be overriden by the embed context: {\"pageTitle\":\"How Financial Institutions Can Navigate New Regulations\",\"pageUrl\":\"https://www.verimatrix.com/cybersecurity/knowledge-base/how-verimatrix-helps-financial-institutions-meet-hefty-regulation-requirements/?utm_campaign=2023%20Cybersecurity%20One-Off%20Email&utm_medium=email&_hsmi=292901585&_hsenc=p2ANqtz-80ywJD42-bJPT9dWXuxzBvM0ihOa8Qk4DnUH8yz6ZjYABWcunJxGKAT6iSVsddNGyLJcoIyIt3bJjel55PJwPTbU0_l5nRgdQHQWXqy-zfxTOs0O8&utm_content=292901291&utm_source=hs_email\",\"userAgent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.6167.139 Safari/537.36\",\"urlParams\":{\"utm_campaign\":\"2023 Cybersecurity One-Off Email\",\"utm_medium\":\"email\",\"_hsmi\":\"292901585\",\"_hsenc\":\"p2ANqtz-80ywJD42-bJPT9dWXuxzBvM0ihOa8Qk4DnUH8yz6ZjYABWcunJxGKAT6iSVsddNGyLJcoIyIt3bJjel55PJwPTbU0_l5nRgdQHQWXqy-zfxTOs0O8\",\"utm_content\":\"292901291\",\"utm_source\":\"hs_email\"},\"isHubSpotCmsGeneratedPage\":false}"},{"clientTimestamp":1707236862419,"level":"INFO","message":"Retrieved countryCode property from normalized embed definition response: \"ES\""},{"clientTimestamp":1707236864596,"level":"INFO","message":"Retrieved analytics values from API response which may be overriden by the embed context: {\"hutk\":\"946d14e0218e28db83f692f7d0e9e17e\"}"}]}"><iframe
name="target_iframe_3b0cf0ec-8ec4-472a-aced-94d2db503aaa" style="display: none;"></iframe>
</form>
POST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/327778/a530710b-9b67-4140-babe-053ecdef00ef
<form id="hsForm_a530710b-9b67-4140-babe-053ecdef00ef" method="POST" accept-charset="UTF-8" enctype="multipart/form-data" novalidate=""
action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/327778/a530710b-9b67-4140-babe-053ecdef00ef"
class="hs-form-private hsForm_a530710b-9b67-4140-babe-053ecdef00ef hs-form-a530710b-9b67-4140-babe-053ecdef00ef hs-form-a530710b-9b67-4140-babe-053ecdef00ef_23c53966-fb77-49ad-ac61-28806143f1de hs-form stacked"
target="target_iframe_a530710b-9b67-4140-babe-053ecdef00ef" data-instance-id="23c53966-fb77-49ad-ac61-28806143f1de" data-form-id="a530710b-9b67-4140-babe-053ecdef00ef" data-portal-id="327778"
data-test-id="hsForm_a530710b-9b67-4140-babe-053ecdef00ef" data-hs-cf-bound="true">
<div class="hs_email hs-email hs-fieldtype-text field hs-form-field"><label id="label-email-a530710b-9b67-4140-babe-053ecdef00ef" class="" placeholder="Enter your Email" for="email-a530710b-9b67-4140-babe-053ecdef00ef"><span>Email</span><span
class="hs-form-required">*</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input id="email-a530710b-9b67-4140-babe-053ecdef00ef" name="email" required="" placeholder="name@company.com " type="email" class="hs-input" inputmode="email" autocomplete="email" value=""></div>
</div>
<div class="hs_gclid hs-gclid hs-fieldtype-text field hs-form-field" style="display: none;"><label id="label-gclid-a530710b-9b67-4140-babe-053ecdef00ef" class="" placeholder="Enter your gclid"
for="gclid-a530710b-9b67-4140-babe-053ecdef00ef"><span>gclid</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input name="gclid" class="hs-input" type="hidden" value=""></div>
</div>
<div class="legal-consent-container">
<div class="hs-richtext">
<p>By submitting this form, I agree to the processing of my personal data for the purpose of receiving the Verimatrix newsletter, in compliance with Verimatrix’s
<a href="https://www.verimatrix.com/privacy/" target="_blank" rel="noopener">Privacy Notice</a>.</p>
</div>
</div>
<div class="hs_submit hs-submit">
<div class="hs-field-desc" style="display: none;"></div>
<div class="actions"><input type="submit" class="hs-button primary large" value="SIGN UP"></div>
</div><input name="hs_context" type="hidden"
value="{"embedAtTimestamp":"1707236862350","formDefinitionUpdatedAt":"1701247339036","lang":"en","legalConsentOptions":"{\"legitimateInterestSubscriptionTypes\":[28271797],\"communicationConsentCheckboxes\":[{\"communicationTypeId\":28271797,\"label\":\"I agree to receive other communications from Verimatrix.\",\"required\":false}],\"legitimateInterestLegalBasis\":\"LEGITIMATE_INTEREST_PQL\",\"communicationConsentText\":\"Inside Secure is committed to protecting and respecting your privacy, and we’ll only use your personal information to administer your account and to provide the products and services you requested from us. From time to time, we would like to contact you about our products and services, as well as other content that may be of interest to you. If you consent to us contacting you for this purpose, please tick below to say how you would like us to contact you:\",\"processingConsentType\":\"IMPLICIT\",\"processingConsentText\":\"In order to provide you the content requested, we need to store and process your personal data. If you consent to us storing your personal data for this purpose, please tick the checkbox below.\",\"processingConsentCheckboxLabel\":\"I agree to allow Inside Secure to store and process my personal data.\",\"privacyPolicyText\":\"<p>By submitting this form, I agree to the processing of my personal data for the purpose of receiving the Verimatrix newsletter, in compliance with Verimatrix’s <a href=\\\"https://www.verimatrix.com/privacy/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\">Privacy Notice</a>.</p>\",\"isLegitimateInterest\":true}","clonedFromForm":"98b07e3a-eca9-414b-9f41-2f4161f72a9d","renderRawHtml":"true","userAgent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.6167.139 Safari/537.36","pageTitle":"How Financial Institutions Can Navigate New Regulations","pageUrl":"https://www.verimatrix.com/cybersecurity/knowledge-base/how-verimatrix-helps-financial-institutions-meet-hefty-regulation-requirements/?utm_campaign=2023%20Cybersecurity%20One-Off%20Email&utm_medium=email&_hsmi=292901585&_hsenc=p2ANqtz-80ywJD42-bJPT9dWXuxzBvM0ihOa8Qk4DnUH8yz6ZjYABWcunJxGKAT6iSVsddNGyLJcoIyIt3bJjel55PJwPTbU0_l5nRgdQHQWXqy-zfxTOs0O8&utm_content=292901291&utm_source=hs_email","urlParams":{"utm_campaign":"2023 Cybersecurity One-Off Email","utm_medium":"email","_hsmi":"292901585","_hsenc":"p2ANqtz-80ywJD42-bJPT9dWXuxzBvM0ihOa8Qk4DnUH8yz6ZjYABWcunJxGKAT6iSVsddNGyLJcoIyIt3bJjel55PJwPTbU0_l5nRgdQHQWXqy-zfxTOs0O8","utm_content":"292901291","utm_source":"hs_email"},"isHubSpotCmsGeneratedPage":false,"hutk":"946d14e0218e28db83f692f7d0e9e17e","__hsfp":704125834,"__hssc":"35684543.1.1707236864591","__hstc":"35684543.946d14e0218e28db83f692f7d0e9e17e.1707236864591.1707236864591.1707236864591.1","formTarget":"#hbspt-form-23c53966-fb77-49ad-ac61-28806143f1de","rumScriptExecuteTime":3503.800000190735,"rumTotalRequestTime":3769.300000190735,"rumTotalRenderTime":3845.4000005722046,"rumServiceResponseTime":265.5,"rumFormRenderTime":76.10000038146973,"connectionType":"4g","firstContentfulPaint":0,"largestContentfulPaint":0,"locale":"en","timestamp":1707236864605,"originalEmbedContext":{"portalId":"327778","formId":"a530710b-9b67-4140-babe-053ecdef00ef","region":"na1","target":"#hbspt-form-23c53966-fb77-49ad-ac61-28806143f1de","isBuilder":false,"isTestPage":false,"isPreview":false,"isMobileResponsive":true},"correlationId":"23c53966-fb77-49ad-ac61-28806143f1de","renderedFieldsIds":["email","gclid"],"captchaStatus":"NOT_APPLICABLE","emailResubscribeStatus":"NOT_APPLICABLE","isInsideCrossOriginFrame":false,"source":"forms-embed-1.4639","sourceName":"forms-embed","sourceVersion":"1.4639","sourceVersionMajor":"1","sourceVersionMinor":"4639","allPageIds":{},"_debug_embedLogLines":[{"clientTimestamp":1707236862442,"level":"INFO","message":"Retrieved pageContext values which may be overriden by the embed context: {\"pageTitle\":\"How Financial Institutions Can Navigate New Regulations\",\"pageUrl\":\"https://www.verimatrix.com/cybersecurity/knowledge-base/how-verimatrix-helps-financial-institutions-meet-hefty-regulation-requirements/?utm_campaign=2023%20Cybersecurity%20One-Off%20Email&utm_medium=email&_hsmi=292901585&_hsenc=p2ANqtz-80ywJD42-bJPT9dWXuxzBvM0ihOa8Qk4DnUH8yz6ZjYABWcunJxGKAT6iSVsddNGyLJcoIyIt3bJjel55PJwPTbU0_l5nRgdQHQWXqy-zfxTOs0O8&utm_content=292901291&utm_source=hs_email\",\"userAgent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.6167.139 Safari/537.36\",\"urlParams\":{\"utm_campaign\":\"2023 Cybersecurity One-Off Email\",\"utm_medium\":\"email\",\"_hsmi\":\"292901585\",\"_hsenc\":\"p2ANqtz-80ywJD42-bJPT9dWXuxzBvM0ihOa8Qk4DnUH8yz6ZjYABWcunJxGKAT6iSVsddNGyLJcoIyIt3bJjel55PJwPTbU0_l5nRgdQHQWXqy-zfxTOs0O8\",\"utm_content\":\"292901291\",\"utm_source\":\"hs_email\"},\"isHubSpotCmsGeneratedPage\":false}"},{"clientTimestamp":1707236862442,"level":"INFO","message":"Retrieved countryCode property from normalized embed definition response: \"ES\""},{"clientTimestamp":1707236864602,"level":"INFO","message":"Retrieved analytics values from API response which may be overriden by the embed context: {\"hutk\":\"946d14e0218e28db83f692f7d0e9e17e\"}"}]}"><iframe
name="target_iframe_a530710b-9b67-4140-babe-053ecdef00ef" style="display: none;"></iframe>
</form>
POST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/327778/a530710b-9b67-4140-babe-053ecdef00ef
<form id="hsForm_a530710b-9b67-4140-babe-053ecdef00ef" method="POST" accept-charset="UTF-8" enctype="multipart/form-data" novalidate=""
action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/327778/a530710b-9b67-4140-babe-053ecdef00ef"
class="hs-form-private hsForm_a530710b-9b67-4140-babe-053ecdef00ef hs-form-a530710b-9b67-4140-babe-053ecdef00ef hs-form-a530710b-9b67-4140-babe-053ecdef00ef_eae9347e-a2fd-4c4b-af6b-7f2c10c582ac hs-form stacked"
target="target_iframe_a530710b-9b67-4140-babe-053ecdef00ef" data-instance-id="eae9347e-a2fd-4c4b-af6b-7f2c10c582ac" data-form-id="a530710b-9b67-4140-babe-053ecdef00ef" data-portal-id="327778"
data-test-id="hsForm_a530710b-9b67-4140-babe-053ecdef00ef" data-hs-cf-bound="true">
<div class="hs_email hs-email hs-fieldtype-text field hs-form-field"><label id="label-email-a530710b-9b67-4140-babe-053ecdef00ef" class="" placeholder="Enter your Email" for="email-a530710b-9b67-4140-babe-053ecdef00ef"><span>Email</span><span
class="hs-form-required">*</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input id="email-a530710b-9b67-4140-babe-053ecdef00ef" name="email" required="" placeholder="name@company.com " type="email" class="hs-input" inputmode="email" autocomplete="email" value=""></div>
</div>
<div class="hs_gclid hs-gclid hs-fieldtype-text field hs-form-field" style="display: none;"><label id="label-gclid-a530710b-9b67-4140-babe-053ecdef00ef" class="" placeholder="Enter your gclid"
for="gclid-a530710b-9b67-4140-babe-053ecdef00ef"><span>gclid</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input name="gclid" class="hs-input" type="hidden" value=""></div>
</div>
<div class="legal-consent-container">
<div class="hs-richtext">
<p>By submitting this form, I agree to the processing of my personal data for the purpose of receiving the Verimatrix newsletter, in compliance with Verimatrix’s
<a href="https://www.verimatrix.com/privacy/" target="_blank" rel="noopener">Privacy Notice</a>.</p>
</div>
</div>
<div class="hs_submit hs-submit">
<div class="hs-field-desc" style="display: none;"></div>
<div class="actions"><input type="submit" class="hs-button primary large" value="SIGN UP"></div>
</div><input name="hs_context" type="hidden"
value="{"embedAtTimestamp":"1707236862342","formDefinitionUpdatedAt":"1701247339036","lang":"en","legalConsentOptions":"{\"legitimateInterestSubscriptionTypes\":[28271797],\"communicationConsentCheckboxes\":[{\"communicationTypeId\":28271797,\"label\":\"I agree to receive other communications from Verimatrix.\",\"required\":false}],\"legitimateInterestLegalBasis\":\"LEGITIMATE_INTEREST_PQL\",\"communicationConsentText\":\"Inside Secure is committed to protecting and respecting your privacy, and we’ll only use your personal information to administer your account and to provide the products and services you requested from us. From time to time, we would like to contact you about our products and services, as well as other content that may be of interest to you. If you consent to us contacting you for this purpose, please tick below to say how you would like us to contact you:\",\"processingConsentType\":\"IMPLICIT\",\"processingConsentText\":\"In order to provide you the content requested, we need to store and process your personal data. If you consent to us storing your personal data for this purpose, please tick the checkbox below.\",\"processingConsentCheckboxLabel\":\"I agree to allow Inside Secure to store and process my personal data.\",\"privacyPolicyText\":\"<p>By submitting this form, I agree to the processing of my personal data for the purpose of receiving the Verimatrix newsletter, in compliance with Verimatrix’s <a href=\\\"https://www.verimatrix.com/privacy/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\">Privacy Notice</a>.</p>\",\"isLegitimateInterest\":true}","clonedFromForm":"98b07e3a-eca9-414b-9f41-2f4161f72a9d","renderRawHtml":"true","userAgent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.6167.139 Safari/537.36","pageTitle":"How Financial Institutions Can Navigate New Regulations","pageUrl":"https://www.verimatrix.com/cybersecurity/knowledge-base/how-verimatrix-helps-financial-institutions-meet-hefty-regulation-requirements/?utm_campaign=2023%20Cybersecurity%20One-Off%20Email&utm_medium=email&_hsmi=292901585&_hsenc=p2ANqtz-80ywJD42-bJPT9dWXuxzBvM0ihOa8Qk4DnUH8yz6ZjYABWcunJxGKAT6iSVsddNGyLJcoIyIt3bJjel55PJwPTbU0_l5nRgdQHQWXqy-zfxTOs0O8&utm_content=292901291&utm_source=hs_email","urlParams":{"utm_campaign":"2023 Cybersecurity One-Off Email","utm_medium":"email","_hsmi":"292901585","_hsenc":"p2ANqtz-80ywJD42-bJPT9dWXuxzBvM0ihOa8Qk4DnUH8yz6ZjYABWcunJxGKAT6iSVsddNGyLJcoIyIt3bJjel55PJwPTbU0_l5nRgdQHQWXqy-zfxTOs0O8","utm_content":"292901291","utm_source":"hs_email"},"isHubSpotCmsGeneratedPage":false,"hutk":"946d14e0218e28db83f692f7d0e9e17e","__hsfp":704125834,"__hssc":"35684543.1.1707236864591","__hstc":"35684543.946d14e0218e28db83f692f7d0e9e17e.1707236864591.1707236864591.1707236864591.1","formTarget":"#hbspt-form-eae9347e-a2fd-4c4b-af6b-7f2c10c582ac","rumScriptExecuteTime":3529.4000005722046,"rumTotalRequestTime":3755.800000190735,"rumTotalRenderTime":3850.800000190735,"rumServiceResponseTime":226.39999961853027,"rumFormRenderTime":95,"connectionType":"4g","firstContentfulPaint":0,"largestContentfulPaint":0,"locale":"en","timestamp":1707236864602,"originalEmbedContext":{"portalId":"327778","formId":"a530710b-9b67-4140-babe-053ecdef00ef","region":"na1","target":"#hbspt-form-eae9347e-a2fd-4c4b-af6b-7f2c10c582ac","isBuilder":false,"isTestPage":false,"isPreview":false,"isMobileResponsive":true},"correlationId":"eae9347e-a2fd-4c4b-af6b-7f2c10c582ac","renderedFieldsIds":["email","gclid"],"captchaStatus":"NOT_APPLICABLE","emailResubscribeStatus":"NOT_APPLICABLE","isInsideCrossOriginFrame":false,"source":"forms-embed-1.4639","sourceName":"forms-embed","sourceVersion":"1.4639","sourceVersionMajor":"1","sourceVersionMinor":"4639","allPageIds":{},"_debug_embedLogLines":[{"clientTimestamp":1707236862428,"level":"INFO","message":"Retrieved pageContext values which may be overriden by the embed context: {\"pageTitle\":\"How Financial Institutions Can Navigate New Regulations\",\"pageUrl\":\"https://www.verimatrix.com/cybersecurity/knowledge-base/how-verimatrix-helps-financial-institutions-meet-hefty-regulation-requirements/?utm_campaign=2023%20Cybersecurity%20One-Off%20Email&utm_medium=email&_hsmi=292901585&_hsenc=p2ANqtz-80ywJD42-bJPT9dWXuxzBvM0ihOa8Qk4DnUH8yz6ZjYABWcunJxGKAT6iSVsddNGyLJcoIyIt3bJjel55PJwPTbU0_l5nRgdQHQWXqy-zfxTOs0O8&utm_content=292901291&utm_source=hs_email\",\"userAgent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.6167.139 Safari/537.36\",\"urlParams\":{\"utm_campaign\":\"2023 Cybersecurity One-Off Email\",\"utm_medium\":\"email\",\"_hsmi\":\"292901585\",\"_hsenc\":\"p2ANqtz-80ywJD42-bJPT9dWXuxzBvM0ihOa8Qk4DnUH8yz6ZjYABWcunJxGKAT6iSVsddNGyLJcoIyIt3bJjel55PJwPTbU0_l5nRgdQHQWXqy-zfxTOs0O8\",\"utm_content\":\"292901291\",\"utm_source\":\"hs_email\"},\"isHubSpotCmsGeneratedPage\":false}"},{"clientTimestamp":1707236862428,"level":"INFO","message":"Retrieved countryCode property from normalized embed definition response: \"ES\""},{"clientTimestamp":1707236864600,"level":"INFO","message":"Retrieved analytics values from API response which may be overriden by the embed context: {\"hutk\":\"946d14e0218e28db83f692f7d0e9e17e\"}"}]}"><iframe
name="target_iframe_a530710b-9b67-4140-babe-053ecdef00ef" style="display: none;"></iframe>
</form>
Text Content
Skip to content * VMX Labs * Partners * Partners Portal * About * Verimatrix.com * VMX Labs * Partners * Partners Portal * About * Verimatrix.com * Learn Learn A closer look THE XTD DIFFERENCE Going beyond MTD and EDR. AGENTLESS TELEMETRY Cybersecurity without inconvenience to consumers. SHIFT LEFT – CI/CD INTEGRATION Injecting security early in the development process. SIEM INTEGRATION Providing a comprehensive view of your security environment. HUMAN & MACHINE Combining AI/ML with human expertise to respond effectively. ZERO TRUST Eliminating implicit trust in favor of continuous validation. VMX labs Our cybersecurity resource hub with the latest threat advisories and commentaries from experts. Visit VMX Labs Browse resources * Cybersecurity Insights * White Papers * Ebooks * Knowledge Base * Cybersecurity Manifesto * Cybersecurity Insights * White Papers * Ebooks * Knowledge Base * Cybersecurity Manifesto Get the latest cybersecurity insights Email* gclid By submitting this form, I agree to the processing of my personal data for the purpose of receiving the Verimatrix newsletter, in compliance with Verimatrix’s Privacy Notice. * Product Verimatrix XTD™– Mobile App Protection Extended Threat Defense XTD was engineered to monitor new entry vectors from the fastest growing attack surface: connected apps, APIs, and unmanaged devices. View product XTD's powerful SaaS features Prevent Formerly App Shield. Start with RASP and shielding to create bulletproof apps. Detect & Respond Monitor and detect attacks. Receive guidance to apply countermeasures. Predict Actionable threat intelligence to prepare for future attacks. Security Center Cybersecurity Products * Web Protect * App Shield * Code Shield * Key Shield * Web Protect * App Shield * Code Shield * Key Shield Techniques * Code Obfuscation * Anti-tamper Technology * Jailbreak Detection * Root Detection * Environmental Checks * Anti Reverse Engineering * Code Obfuscation * Anti-tamper Technology * Jailbreak Detection * Root Detection * Environmental Checks * Anti Reverse Engineering * Customer Customers By industry FINANCIAL SERVICES BANKING E-COMMERCE HEALTHCARE GAMING By persona CISO Gain complete visibility of security risks to protect revenue streams. SECURITY OPERATIONS CENTER Effectively manage incident response and reporting. RESEARCH & DEVELOPMENT AND ENGINEERING Secure apps early in the development process for faster speed-to-market. FRAUD PREVENTION DEPARTMENT Strengthens anti-fraud measures by illuminating blindspots where fraudsters can attack. More * VMX Labs * Partners * Partners Portal * About * Verimatrix.com * VMX Labs * Partners * Partners Portal * About * Verimatrix.com * Pricing Talk to us FINTECH HOW VERIMATRIX HELPS FINANCIAL INSTITUTIONS MEET HEFTY REGULATION REQUIREMENTS December 26, 2023 TABLE OF CONTENTS 1. General Data Protection Regulation (GDPR) – EU & some non-EU entities 2. Data Protection Act of 2018 (DPA) – United Kingdom 3. EU Cybersecurity Act – EU 4. Gramm Leach Bliley Act – United States 5. Network and Information Systems Directive 2 (NIS2) – EU 6. Payment Services Directive 2 (PSD2) – EU 7. Cyber Resilience Act (CRA) – EU 8. U.S. state-level data privacy regulations 9. Protection against man-in-the-middle (MITM) attacks The massive digital transformation of the global financial system and customer demands for ubiquitous transactions make financial institutions prime targets for cyberattacks. The breadth of cyber risks and threats runs the gamut, but the mobile banking applications and payments now pervasively used are a particularly fast-growing target. The sensitive personal information transacted through mobile devices greatly increases the risk of endpoint attacks. Thus, financial institutions now face a growing list of cybersecurity and data privacy regulations designed to protect customers’ information and assets. For instance, as of May 2022, the Federal Reserve System in the United States requires that financial institutions disclose cyber incidents to regulators within 36 hours of an incident if it could impact the U.S. banking system. The New York State Department of Financial Services has published its NYDFS Cybersecurity Regulation (23 NYCRR 500), requiring financial services institutions, including agencies and branches of non-U.S. banks licensed in the state of New York, to assess their cybersecurity risk profile. Verimatrix Extended Threat Defense (XTD), App Shield, Code Shield, and Key Shield protection solutions help banking and financial services organizations comply with the breadth of regulations, leveraging leading industry frameworks and standards that guide best data protection practices. The following is a list of leading United States and European cybersecurity regulations that are particularly relevant for banking and financial institutions to address and how Verimatrix can help support those efforts: GENERAL DATA PROTECTION REGULATION (GDPR) – EU & SOME NON-EU ENTITIES The General Data Protection Regulation, which applies to EU entities as well as non-EU entities processing the data of EU citizens, is considered by many to be the toughest privacy and security law in the world. Enacted in May 2018, it applies to any organization that targets or collects data about EU citizens and establishes specific protections for the processing of that data. The law was, in large part, a response to the growing numbers of people providing their personal data to cloud service providers. Of particular relevance to mobile apps is Article 25: Data protection by design and by default, under which data processors and controllers are required to consider privacy while designing new applications, systems, or processes that use personal data. Also, Article 32: Security of processing, which requires application developers, data controllers, and processors to implement necessary and sufficient organizational and technical measures to assure the integrity of processing data and deploy a level of security appropriate to the risk of breach, loss, unlawful destruction, or modification of data. DATA PROTECTION ACT OF 2018 (DPA) – UNITED KINGDOM The Data Protection Act (DPA) regulates the handling of UK citizens’ personal data. Intended to control how that personal data is used by organizations, businesses, or the government, it sets data protection principles that require personal data be used only for specified, explicit purposes, in a way that is adequate, relevant, and limited to only what is necessary, accurate, and current, and handled in a way that ensures appropriate security. The DPA requires organizations to inform customers about their data handling practices and provide a way for customers to access and delete their data. It also sets out requirements for handling data breaches, preventing unauthorized access, and ensuring secure data disposal. EU CYBERSECURITY ACT – EU The EU Cybersecurity Act imposes cybersecurity obligations on all products with digital elements whose use includes direct or indirect data connections to a device or network. It provides an EU-wide cybersecurity certification framework for information and communication technology (ICT) products, services, and processes, rather than leaving a patchwork of differing regulations across member countries. It introduces cybersecurity by design and by default principles and imposes a duty of care for the lifecycle of products. The Act also grants a permanent mandate and increased resources for the watchdog European Union Agency for Cybersecurity (ENISA). GRAMM LEACH BLILEY ACT – UNITED STATES Issued by the U.S. Federal Trade Commission, the Gramm Leach Bliley Act is a consumer protection act enacted to ensure that financial institutions protect the privacy of consumers’ personal financial information. It regulates the collection, usage, and disclosure of that information. For instance, it includes efficiently delivering information and services that are financial in nature through the use of technological means, including any application necessary to protect the security or efficacy of systems for the transmission of data. NETWORK AND INFORMATION SYSTEMS DIRECTIVE 2 (NIS2) – EU Widening the scope of the original Network and Information Systems Directive, NIS2, slated for enforcement by November 2024, is the first EU-wide cybersecurity legislation. It is intended to enhance cybersecurity and resilience in European organizations by improving cybersecurity risk management practices across the EU. It mandates that entities must take appropriate and proportionate technical, operational, and organizational measures to manage the risks posed to the security of network and information systems that those entities use for their operations or for the provision of their services, and to prevent or minimize the impact of incidents on recipients of their services and on other services. PAYMENT SERVICES DIRECTIVE 2 (PSD2) – EU The Payment Services Directive 2 (PSD2) legislation requires payment service providers to contribute to a more integrated, secure, and efficient payment ecosystem. Beyond the first Payment Services Directive, PSD2 mandates stronger security requirements for online transactions through multi-factor authentication. It also forces banks and other financial institutions to give third-party payment service providers access to consumer bank accounts if an account holder has given their consent. For mobile banking apps, PSD2’s security requirements require protection against known and unknown attacks on mobile apps. Mobile app requirements are particularly guided by Article 9 of PSD2’2 final Regulatory Technical Standards (RTS) on Strong Customer Authentication (SCA) and Common and Secure Communication (CSC). Verimatrix XTD provides passive protection through continual data monitoring and integrates AI/ML that evolves to identify future and unknown attacks against mobile apps. Additionally, Verimatrix provides Strong Customer Authentication (SCA) and Common and Secure Communication (CSC) while also providing protection against man-in-the-middle (MITM) attacks. CYBER RESILIENCE ACT (CRA) – EU (Legislation pending as of late 2023) On December 3, 2023, the European Parliament and EU Council reached an agreement to move forward with the Cyber Resilience Act (CRA). Now subject to formal adoption by the same bodies, the CRA would go into force 20 days after being entered into the Official Journal of the European Union. The CRA’s intent is to set common security standards for connected devices and services, which would make the CRA the first IoT legislation anywhere in the world. The goal of the Act is to bolster cybersecurity rules to ensure more secure hardware and software products, which are increasingly subject to successful cyberattacks. This includes a breadth of mobile and IoT devices, many of which run applications to make them useful. The CRA is intended to overcome a low level of cybersecurity, reflected by widespread vulnerabilities and the insufficient and inconsistent provision of security updates to address them; and an insufficient understanding and access to information by users, preventing them from choosing products with adequate cybersecurity properties or using them in a secure manner. Verimatrix provides mobile app security and cybersecurity for connected devices (typically managed employee devices), while defending the enterprise against myriad unmanaged devices powered by those apps. And now, Verimatrix XTD (Extended Threat Defense) expands these defenses to the new unmanaged endpoint, defending against endpoint attacks by preventing apps from being weaponized. XTD enables configuration capabilities that only allow apps with an XTD low-risk score to connect, adding an independent second factor of security. U.S. STATE-LEVEL DATA PRIVACY REGULATIONS There is no national data privacy law in the United States. However, several individual states have passed their own regulations imposing privacy obligations on entities handling the data of each state’s residents. Below is a list of existing state regulations: * California Consumer Privacy Act * California Privacy Rights Act * Colorado Privacy Act * Connecticut Data Privacy Act * Indiana Consumer Data Protection Act (effective 2026) * Iowa Consumer Data Protection Act (effective 2025) * Montana Consumer Data Protection Act (effective 2024) * Oregon Consumer Privacy Act (effective 2024) * Tennessee Information Protection Act (effective 2025) * Texas Data Privacy and Security Act (effective 2024) * Utah Consumer Privacy Act * Virginia Consumer Data Protection Act Given the risks associated with the widespread use of mobile applications that are now an integral part of financial institutions’ service delivery and business models, these organizations need trustworthy, military-strength yet simple-to-adopt solutions that ease the burden of compliance so they can focus on priority business concerns. PROTECTION AGAINST MAN-IN-THE-MIDDLE (MITM) ATTACKS Verimatrix application shielding technologies and continuous monitoring service help safeguard information and reduce the risk of a breach, particularly man-in-the-middle (MITM) attacks. Devices are a vulnerable attack vector because they communicate with backend servers, potentially leaving the operation exposed to “man-in-the-middle” attacks. Protecting client-device communication is key to safeguarding valuable data. Man-in-the-middle attacks occur when hackers insert themselves in the middle of the communication. With these attacks, a customer assumes that he/she is interacting directly with the intended component/service, but the attacker “in the middle” is eavesdropping or changing the information to their benefit. For a mobile banking application, communication encryption is a combination of industry-standard Transport Layer Security (TLS) and bespoke application layer security. By analyzing the app, an attacker can reverse engineer the protocol and find the cryptographic keys used to secure it. The communication protocol is fundamental for any MFS. If an attacker understands how the communication protocol works, they can discover and exploit its vulnerabilities. Verimatrix shielding and monitoring service as well as its anti-debug, anti-tamper, and anti-hook technologies, significantly reduce the chance of these types of attacks. Verimatrix provides comprehensive security via multi-layered solutions that offer: * Code obfuscation, anti-tamper and anti-reverse engineering shields to make it difficult and unappealing to hack an application * Runtime app behavior analytics to detect abnormal activities * Machine learning models to identify known and zero-day threat patterns Additionally, continuous application threat monitoring is a vital component of protection, enabling a financial institution to gain important intelligence and effectively deploy countermeasures. Verimatrix threat monitoring includes: * Real-time analysis of app stores to identify repackaged or trojanized apps * Monitoring developer accounts for unauthorized modifications * Tracking dark web forums for emerging attack tools and methods * Maintaining databases of known malicious IP addresses, domains and device IDs * Identifying anomaly patterns indicative of a breach This enables security teams to recognize threatening activities, compromised devices, and high-risk users early before major damage occurs. Analytics from threat monitoring also strengthen machine learning models to better anticipate future attacks. Click here to schedule a demo with Verimatrix. STAY AHEAD OF CYBER THREATS WITH EXPERT INSIGHTS Sign up for our newsletter to receive exclusive tips and stay one step ahead in the fight against app vulnerabilities. Email* gclid By submitting this form, I agree to the processing of my personal data for the purpose of receiving the Verimatrix newsletter, in compliance with Verimatrix’s Privacy Notice. WRITTEN BY DR. KLAUS SCHENK Dr. Klaus Schenk is senior vice president of security and threat research at Verimatrix and serves as head of its VMX Labs. SHARE THIS CYBERSECURITY INSIGHT OTHER ARTICLES Application Security BUILDING THE SHIELD: EMBRACING SOURCE CODE PROTECTION FOR HYBRID MOBILE APPS Mobile apps have effectively transformed whole industries like transportation, media, retail, and accommodation. December 15, 2020 3 Mins Application Security THE HIDDEN THREAT: UNMASKING REPACKAGING ATTACKS FOR DEVELOPERS Are you aware of mobile app repackaging attacks? Stay informed with this article and take preventative measures to secure your business and customers. May 19, 2021 4 Mins Application Security MINDS IN MOTION: MOBILE APP SECURITY INSIGHTS FROM THINK TANKS Join Verimatrix's executives in a think tank with top security experts from European banks, payment schemes, and governments. Learn what was discussed. August 19, 2021 3 Mins Healthcare FORTRESS FOR FITNESS: PROTECTING SENSITIVE USER DATA WITH FITNESS APP SECURITY In a whirlwind of wearables, smart fitness equipment, and AI driving digital health applications, one must wonder: Who’s protecting all of the user data? January 29, 2021 3 Mins Follow us JOIN OUR NEWSLETTER Get the latest cybersecurity insights delivered straight to your inbox. Email* gclid By submitting this form, I agree to the processing of my personal data for the purpose of receiving the Verimatrix newsletter, in compliance with Verimatrix’s Privacy Notice. Products * Verimatrix XTD * XTD Prevent (formerly App Shield) * XTD Detect & Respond * XTD Predict * Verimatrix XTD * XTD Prevent (formerly App Shield) * XTD Detect & Respond * XTD Predict Industries * Financial Services * E-commerce * Healthcare * Gaming * Banking * Financial Services * E-commerce * Healthcare * Gaming * Banking Personas * CISO * Security Operations Center * R&D and Engineering * Fraud Prevention Department * CISO * Security Operations Center * R&D and Engineering * Fraud Prevention Department Learn * The XTD Difference * Agentless Telemetry * Shift Left – CI/CD Integration * Human & Machine * Zero Trust * SIEM Integration * The XTD Difference * Agentless Telemetry * Shift Left – CI/CD Integration * Human & Machine * Zero Trust * SIEM Integration Resources * VMX Labs * Cybersecurity Manifesto * Cybersecurity Insights * White Papers * Knowledge-Base * Ebooks * VMX Labs * Cybersecurity Manifesto * Cybersecurity Insights * White Papers * Knowledge-Base * Ebooks Verimatrix * Pricing * Partners * Partners Portal * About * Verimatrix.com * Contact * Talk to a Specialist * Pricing * Partners * Partners Portal * About * Verimatrix.com * Contact * Talk to a Specialist Our Offices United States 6059 Cornerstone Ct W, San Diego, CA 92121 united.states@verimatrix.com France Impasse des carrés de l’Arc Rond-point du Canet, 13590 Meyreuil france@verimatrix.com Cookies preferences | Terms of Use | Privacy Notice © 2024 Verimatrix. All Rights Reserved Clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts Reject all cookies Accept all cookies Cookies preferences COOKIES PREFERENCES When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. Accept all cookies COOKIES PREFERENCES STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. View Vendor Details FUNCTIONAL COOKIES Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. View Vendor Details PERFORMANCE COOKIES Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. View Vendor Details TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. View Vendor Details Back Button VENDORS LIST Search Icon Filter Icon Clear checkbox label label Apply Cancel Consent Leg.Interest checkbox label label checkbox label label checkbox label label Reject All Confirm my choices × ×