Ransomware Attack Containment and Isolation
Contain ransomware outbreaks
Cybersecurity experts now agree – with ransomware, it’s not a matter of if, it’s when. Traditional protection practices work. But do they provide 100% prevention, 100% of the time? Of course not. And that’s where our Ransomware Containment Solution, RansomCare, steps in to protect your organization.
Protect your business with multi-layered security
RansomCare doesn’t replace your endpoint protection platforms (EPP) and endpoint detection and response (EDR) tools. It complements them. Rather than preventing ransomware from getting in, it stops any active attacks that do get through.
Limits operational impact
Outbreaks are identified and stopped at the source, limiting the impact on company-wide productivity.
This agentless, cloud service does NOT install on endpoints or servers making for a hassle-free implementation.
Protects against financial loss
Immediate response and endpoint isolation stops system-wide data encryption reducing the risk of expensive recovery efforts, legal costs, and ransoms.
With no local agents or server applications, you experience no impact on network, device, or application performance.
Reduces recovery time
An event report details the exact files infected that need restoration, saving valuable time.
Gives peace of mind
Protection against ransomware events that bypass perimeter defenses enable you to be more agile, and confident your business data remains safe.
How RansomCare works
Artificial intelligence (AI) and machine learning establish a baseline of file activity on your network. RC monitors file changes constantly using heuristics and metadata to detect ransomware encryption the moment it starts. By monitoring file behavior, RC detects both known and unknown ransomware variants.
An automated containment protocol shuts down the infected endpoint the moment ransomware’s illegitimate encryption begins. Isolation methods used include disabling VPN, disabling NAC, disabling AD-user, and forced shutdown. Alerts are sent to designated security administrators.
Your security and recovery team can pull reporting that shows the exact files infected prior to the forced shutdown. This makes restoration from backup simple. And all attack details are captured in a history log for insight into affected files.