Select Page

STOP RANSOMWARE BEFORE IT STOPS YOU

Important considerations when you are attacked by ransomware:

N

How do you see which files are encrypted and where they reside?

N

How do you identify which user and which device initiated the attack?

N

How do you stop the ongoing encryption immediately before significant damage occurs and how long will it take to restore files and at what cost?

N

Can you accurately report GDPR if thousands of files have been lost to illegitimate encryption?

N

How do you know that you are under attack?

How do you know that you are under attack?

In a scenario where a ransomware has already bypassed your existing security solutions, it is now effectively “whitelisted” to attack your business, causing as much disruption as possible by encrypting as many of your files as it can in the shortest possible time.

Why is RC different? RC is a new and innovative technology that, from a central server installation (agentless), detects ransomware attacks by looking into the heuristics of your actual data files from i.e., Word, Excel, PDF. etc., stored on your entire storage platform and in the cloud.

RC will detect and stop ransomware attacks even when the malware has bypassed all your existing security tools. It provides critical security defence for a small portion of your available security budget.

It’s critical that organizations don’t rely solely on a reactive response. On a daily basis, we hear reports on how this strategy has proven to fail. The future defence strategy needs to include disaster recovery with a Last Line of Defence solution.

RC provides a revolutionary Last Line of Defence against the threat from ransomware and delivers a 24/7 automated response. It does not matter which user, or which device triggered the attack. Nor does it matter if it is a known or unknown ransomware attack, or if the attack started on an endpoint, a mobile phone, an IOT device, by email, website drive-by-attack, USB key, or were deployed by someone inside your organization.

An alert is raised immeadiately and a response can be generated to shutdown the endpoint under attack (Windows, Mac and Linux), so encryption stops instantly. RC also handles virtual environments such as Citrix servers/sessions, Terminal servers/sessions, Hyper-V, VMware and the cloud, including Azure and Amazon AWS/EC2, Sharepoint, Google Drive and Office 365. RC disables and stops the device encrypting your data, including mobile devices.

RC is not installed on endpoints or any of the existing servers or file servers. There is no impact on network performance issues. Agentless file behaviour monitoring, and Machine Learning techniques are deployed with ease in 4 hours with automatic configuration. Full integration to other security solutions such as MS ATP, Cisco ISE and SIEM systems via RESTful API, allows your security teams to unify management across all endpoints.