RANSOMCARE brings an immediate safeguard and easy GDPR compliance

RANSOMCARE is an agentless technology which is implemented on existing infrastructure making implementation safe and hassle-free, by applying automatic configuration of settings with Machine Learning using security-based Artificial Intelligence.

Defend against ransomware that gets through your first line of defence before it spreads across the network and encrypts your file servers. Ransomware encryption is becoming more and more severe and challenging, and now that you need to report any data breach to the Supervisory Authority in connection with GDPR this adds another dimension.

RANSOMCARE provides a revolutionary Last Line of Defence, detecting attacks on any endpoint by known or unknown ransomware, whether they entered via email, website drive-by-attack, Skype, USB key, or false attachments, or were deployed by someone inside your organisation. It monitors the traffic on network shares going to and from your network file servers, using multiple detection strategies, including heuristics and metadata, to swiftly detect tell-tale signs that ransomware is at work.

When RANSOMCARE detects suspicious traffic, it raises an alert instantly and responds by shutting down the endpoint under attack, including laptops, desktops and servers (Windows, Mac and Linux), and also handles virtual environments like Citrix servers/sessions, Terminal servers/sessions, Hyper-V, VMware, Azure and Amazon AWS/EC2.

DETECT
Detailed live visibility with playback
RANSOMCARE creates a baseline of all the activity on your systems and in your environment and simply monitors the network traffic going to and from your network file servers, using heuristics and metadata to discover ransomware swiftly.

Artificial Intelligence and Machine Learning automates the initial alert settings making it ever more sensitive based on your real network activity.

RANSOMCARE provides you within milliseconds full visibility for any live file changes on your entire network. It gives you visibility on the WEB Dashboard which displays the recording log of any file creation, change, rename or deletion – so in case of an attack – you know exactly which files have been compromised. You will be astonished about the detailed overview of the file changes that takes place within your company/enterprise inhouse as well as your premises abroad. In case of an outbreak you have an advanced playback feature of the history log – so you can easily study all details related.

No other security solution provides you with such detailed and structured overview.

REACT
RANSOMCARE stops the attack dead in its tracks
RANSOMCARE will react within seconds of an unexpected file encryption taking place, alerting the Security Operations Centre (SOC) team, the attacked user, any other key stakeholders and finally notify the local GDPR Supervisory Authority (SA) if required.

Alerting is done via email, SMS, IOS/Android app and via integration with most SIEM solutions. The alerting and communication also works if you are hosting in the cloud or having an MSP taking care of your IT solution and infrastructure.

All product names, trademarks and registered trademarks are property of their respective owners.
All company, product and service names used in this website are for identification purposes only.
RESPOND
Keep your organisation running smoothly
RANSOMCARE will respond within seconds of any detected Ransomware attack, shutting down the infected User/Client and stopping any Ransomware from spreading into the organisation. RANSOMCARE will inform you as soon as the attack has been stopped, and the alert level has subsided to normal.

Integration via RESTful API to other security solutions like Cisco ISE and Windows Defender ATP means your security teams can unify security management across an increasingly complex sea of endpoints. RANSOMCARE provides a full damage report listing all files or folders you need to recover from backup, for speedy recovery of the few infected files that were compromised. With immediate response and a minimum number of files encrypted it substantially removes the risk of a data breach according to the GDPR.

All product names, trademarks and registered trademarks are property of their respective owners.
All company, product and service names used in this website are for identification purposes only.
RECOVER
Remove the pressure from the operational team
RANSOMCARE provides a speedy data-recovery concept. It gives you an exact list of the few files infected before the forced shutdown that needs to be restored from your backup. It will reduce any potential downtime by identifying the exact files that need to be recovered, saving you valuable time with minimal cost of recovery.

Some of the latest tactics from the cyber criminals is encrypting files without even changing the file name as well as encrypting files in different folders across your infrastructure. This makes recovery difficult and ultimately forces you restore a full backup and putting additional pressure on the entire organisation with operational loss and potentially another GDPR headache.

With RANSOMCARE your organisation will safely and quickly be operational without having to pay the ransom.

SETTINGS
Agentless NO endpoint installation
RANSOMCARE is an agentless solution which means:

– No endpoint installation anywhere

– No file server overhead

– No network performance issues.

Agentless file behavior monitoring, and machine learning techniques are deployed with ease and RANSOMCARE is configured automatically via artificial intelligence.

The integration via RESTful API to other security solutions like Cisco ISE and Windows Defender ATP means your security teams can unify security management across an increasingly complex set of endpoints. Your IT team can get back to the business of supporting your core business goals.

GDPR
Automate your GDPR response when hit by Ransomware
According to the GDPR regulations: “If it’s likely that there will be a risk, then you must notify the local GDPR Supervisory Authority (SA); if it’s unlikely then you don’t have to report it. However, if you decide you don’t need to report the breach, you need to be able to justify this decision so you should document it!”

Ransomware is an obvious tool of choice for cyber criminals, encrypting files on different shares and folders spread across the network making the GDPR reporting a challenge. Time pressure is now a serious issue not only from the cyber criminals but now you only have 72 hours to comply with GDPR.

Automate your GDPR response when hit by Ransomware
According to the authorities what could be considered a breach?

“A personal data breach can be broadly defined as a security incident that has affected the confidentiality, integrity or availability of personal data. In short, there will be a personal data breach whenever any personal data is lost, destroyed, corrupted or disclosed; if someone accesses the data or passes it on without proper authorisation; or if the data is made unavailable, for example, when it has been encrypted by ransomware, or accidentally lost or destroyed.”

With RANSOMCARE’s immediate response, most incidents will be considered minor as only a few files will be compromised before a forced shut down. And customized GDPR reporting ensures you are compliant.

With GDPR it’s either a minor incident or a major breach

If you have a breach and have RANSOMCARE in place it will mostly be a minor incident, but you still need to document your findings. RANSOMCARE provides a fully automated process for internal audit and also for a major breach:

– Records of the exact time of the attack (beginning to end)
-Where the attack was initiated (which endpoint)
– Exactly which files have been affected
– Who the file owner is
– Details of how and when the breach was stopped
– Generates an Incident report to key stakeholders

RANSOMCARE brings an immediate safeguard and easy GDPR compliance
RANSOMCARE is an agentless technology which is implemented on existing infrastructure making implementation safe and hassle-free, by applying automatic configuration of settings with Machine Learning using security-based Artificial Intelligence.

Defend against ransomware that gets through your first line of defence before it spreads across the network and encrypts your file servers. Ransomware encryption is becoming more and more severe and challenging, and now that you need to report any data breach to the Supervisory Authority in connection with GDPR this adds another dimension.

RANSOMCARE provides a revolutionary Last Line of Defence, detecting attacks on any endpoint by known or unknown ransomware, whether they entered via email, website drive-by-attack, Skype, USB key, or false attachments, or were deployed by someone inside your organisation. It monitors the traffic on network shares going to and from your network file servers, using multiple detection strategies, including heuristics and metadata, to swiftly detect tell-tale signs that ransomware is at work.

When RANSOMCARE detects suspicious traffic, it raises an alert instantly and responds by shutting down the endpoint under attack, including laptops, desktops and servers (Windows, Mac and Linux), and also handles virtual environments like Citrix servers/sessions, Terminal servers/sessions, Hyper-V, VMware, Azure and Amazon AWS/EC2.

DETECT
Detailed live visibility with playback
RANSOMCARE creates a baseline of all the activity on your systems and in your environment and simply monitors the network traffic going to and from your network file servers, using heuristics and metadata to discover ransomware swiftly.

Artificial Intelligence and Machine Learning automates the initial alert settings making it ever more sensitive based on your real network activity.

RANSOMCARE provides you within milliseconds full visibility for any live file changes on your entire network. It gives you visibility on the WEB Dashboard which displays the recording log of any file creation, change, rename or deletion – so in case of an attack – you know exactly which files have been compromised. You will be astonished about the detailed overview of the file changes that takes place within your company/enterprise inhouse as well as your premises abroad. In case of an outbreak you have an advanced playback feature of the history log – so you can easily study all details related.

No other security solution provides you with such detailed and structured overview.

REACT
RANSOMCARE stops the attack dead in its tracks
RANSOMCARE will react within seconds of an unexpected file encryption taking place, alerting the Security Operations Centre (SOC) team, the attacked user, any other key stakeholders and finally notify the local GDPR Supervisory Authority (SA) if required.

Alerting is done via email, SMS, IOS/Android app and via integration with most SIEM solutions. The alerting and communication also works if you are hosting in the cloud or having an MSP taking care of your IT solution and infrastructure.

All product names, trademarks and registered trademarks are property of their respective owners.
All company, product and service names used in this website are for identification purposes only.
RESPOND
Keep your organisation running smoothly
RANSOMCARE will respond within seconds of any detected Ransomware attack, shutting down the infected User/Client and stopping any Ransomware from spreading into the organisation. RANSOMCARE will inform you as soon as the attack has been stopped, and the alert level has subsided to normal.

Integration via RESTful API to other security solutions like Cisco ISE and Windows Defender ATP means your security teams can unify security management across an increasingly complex sea of endpoints. RANSOMCARE provides a full damage report listing all files or folders you need to recover from backup, for speedy recovery of the few infected files that were compromised. With immediate response and a minimum number of files encrypted it substantially removes the risk of a data breach according to the GDPR.

All product names, trademarks and registered trademarks are property of their respective owners.
All company, product and service names used in this website are for identification purposes only.
RECOVER
Remove the pressure from the operational team
RANSOMCARE provides a speedy data-recovery concept. It gives you an exact list of the few files infected before the forced shutdown that needs to be restored from your backup. It will reduce any potential downtime by identifying the exact files that need to be recovered, saving you valuable time with minimal cost of recovery.

Some of the latest tactics from the cyber criminals is encrypting files without even changing the file name as well as encrypting files in different folders across your infrastructure. This makes recovery difficult and ultimately forces you restore a full backup and putting additional pressure on the entire organisation with operational loss and potentially another GDPR headache.

With RANSOMCARE your organisation will safely and quickly be operational without having to pay the ransom.

SETTINGS
Agentless NO endpoint installation
RANSOMCARE is an agentless solution which means:

– No endpoint installation anywhere

– No file server overhead

– No network performance issues.

Agentless file behavior monitoring, and machine learning techniques are deployed with ease and RANSOMCARE is configured automatically via artificial intelligence.

The integration via RESTful API to other security solutions like Cisco ISE and Windows Defender ATP means your security teams can unify security management across an increasingly complex set of endpoints. Your IT team can get back to the business of supporting your core business goals.

GDPR
Automate your GDPR response when hit by Ransomware
According to the GDPR regulations: “If it’s likely that there will be a risk, then you must notify the local GDPR Supervisory Authority (SA); if it’s unlikely then you don’t have to report it. However, if you decide you don’t need to report the breach, you need to be able to justify this decision so you should document it!”

Ransomware is an obvious tool of choice for cyber criminals, encrypting files on different shares and folders spread across the network making the GDPR reporting a challenge. Time pressure is now a serious issue not only from the cyber criminals but now you only have 72 hours to comply with GDPR.

Automate your GDPR response when hit by Ransomware
“A personal data breach can be broadly defined as a security incident that has affected the confidentiality, integrity or availability of personal data. In short, there will be a personal data breach whenever any personal data is lost, destroyed, corrupted or disclosed; if someone accesses the data or passes it on without proper authorisation; or if the data is made unavailable, for example, when it has been encrypted by ransomware, or accidentally lost or destroyed.”

With RANSOMCARE’s immediate response, most incidents will be considered minor as only a few files will be compromised before a forced shut down. And customized GDPR reporting ensures you are compliant.

With GDPR it’s either a minor incident or a major breach

If you have a breach and have RANSOMCARE in place it will mostly be a minor incident, but you still need to document your findings. RANSOMCARE provides a fully automated process for internal audit and also for a major breach:

– Records of the exact time of the attack (beginning to end)
– Where the attack was initiated (which endpoint)
– Exactly which files have been affected
– Who the file owner is
– Details of how and when the breach was stopped
– Generates an Incident report to key stakeholders