• Call Us : (02) 8005 6562

Ranstop

By Ozgur S-November 19, 2019 -No Comments

Ranstop

RANSTOP – ANTI-RANSOMWARE THAT WORKS

TEMASOFT Ranstop stops Ransomware, protects files and ensures files are recoverable, plain and simple.  Using behaviour based analysis, it protects networks and computers from known and unknown ransomware of any type.  It doesn’t use signatures (black list technology), so it doesn’t become “out of date”.  The solution also protects user files in an unlikely event ransomware evades detection, allowing simple and easy recovery.

BENEFITS

ANTI-RANSOMWARE PROTECTION

The malware landscape is constantly changing. Thousands of samples are uncovered every day. Ranstop has been designed to detect ransomware, regardless of known or unknown. It uses an extremely efficient detection engine based on behaviour analysis and is continuously tested against new and emerging threats. When ransomware is detected, it shuts it down.

AIM FOR ZERO DOWNTIME

When ransomware strikes, companies either spend time and resource to recover data OR pay the ransom. Either way, it is a costly exercise. Even paying a ransom does not guarantee you’ll get your data back, and this can lead to disastrous consequences for business. This anti-ransomware solution helps mitigate this risk, by blocking ransomware, quarantining the related files to prevent further infection AND is able to isolate affected machines in seconds.

REAL-TIME FILE PROTECTION

What happens if ransomware evades protection? Ranstop includes a real-time backup engine that stores file versions in secure locations. Highly configurable, business can choose what files are included and how many versions are kept. You can ensures your users don’t lose their critical data in any circumstance.

EASY TO DEPLOY

Ranstop is simple to deploy to individual machines or entire networks and easy to configure. Administrators are able to deploy and configure Ranstop via Active Directory and Group Policy. As Ranstop does not require signature based updates, there is little to know impact on network traffic or bandwidth. Ranstop is lightweight, low touch and extremely effective in its fight against ransomware. Request More Information

FEATURES AT A GLANCE

DETECT AND BLOCK RANSOMWARE

When Ranstop detects ransomware activity, it blocks the malicious process, triggers notifications and initiates automatic file recovery process – within seconds. This includes script based or fileless ransomware!

AUTOMATIC AND MANUAL FILE RECOVERY

Ranstop’s recovery module automatically restores users’ files in the event they have been impacted by blocked ransomware. Beyond ransomware, if users inadvertently lose or delete files, they can be manually recovered.

ISOLATION OF INFECTED MACHINES

When ransomware is detected, it is able to automatically disable all network interfaces or shut the impacted machine down. This prevents the possibility of further damage to other systems or files in network mapped storage, including cloud stored files.

CRYPTO/SCREEN LOCKER DETECTION

Ranstop is able to detect ransomware executing on systems in lightening speed. This includes crypto-lockers and screen-lockers. Apart from quarantining the malicious files, the solution also alerts on and triggers proactive measures in response to the attack.

MBR PROTECTION

Master Boot Record protection protects against change attempts by malware which encrypts data at disk level.

INCIDENT ALERTING

When any new threat is detected, users receive visual notification and email alerts with detailed information about the incident.

How is it licenced?

Licencing is based on:

  • Quantity of machines
  • Yearly subscription
  • Multiple year subscriptions available
  • Quantity discounts apply
  • Minimum 5 machine license

Temasoft FileMonitor

By Ozgur S-November 19, 2019 -No Comments

Temasoft FileMonitor

Temasoft FileMonitor

Electronic documents and data have become the life blood of most companies today.  Many of these documents are highly sensitive, fall under compliance and regulatory controls or are confidential to the business.  Protection from accidental disclosure, theft, loss or malicious attacks such as Ransomware is critical.  Temasoft FileMonitor aids business with advanced File Monitoring, Integrity Monitoring, File Security Analysis, Alerting and integration with SIEM solutions.

REAL-TIME FILE MONITORING FOR WINDOWS AND LINUX

Track file access in real-time, with unrivaled accuracy, based on unique technology able to go beyond auditing basic file operations, like file read, write and attribute changed. This technology is able to audit complex file operations like file copy (locally, over the network or on USB devices), file archived, file uploaded by a browser or file attached to Outlook and deliver the entire context around these operations.

SECURITY INCIDENTS ANALYZER

The built-in data viewer, through its powerful filtering capabilities, is an invaluable tool for investigating suspicious activities or security incidents.

EASY INTEGRATION WITH LOG MANAGEMENT PRODUCTS

TEMASOFT FileMonitor logs events that can be easily scanned by log monitoring solutions or other products that collect and process system information, leveraging your existing software infrastructure investment.

FILE MOVEMENT TRACKING TO SPOT POTENTIAL DATA BREACHES

Based on unique in-memory correlation of data and process activity, combined with the accuracy of a file system driver, TEMASOFT FileMonitor delivers insight into how files move within a company, identifying details that are vital to data loss prevention and investigation: suspicious activity, impersonated access to files, files copied to unsafe locations or by unsafe processes, activity of privileged users, and changes to critical system files.

DESIGNED FOR REGULATORY COMPLIANCE

File monitoring is a major requirement included in many different regulatory and compliance acts like PCI-DSS, SOX, HIPAA, GLBA, and others. However, to be really useful for compliance, file monitoring solutions cannot afford to miss changes on important files. TEMASOFT FileMonitor has the right detection and reporting features to help companies prove compliance in a detailed, consistent and straightforward manner.

ALERTING ON IMPORTANT EVENTS

TEMASOFT FileMonitor not only incorporates mission critical reporting capabilities, but it also alerts users when important file operations occur, allowing fast response and significantly reducing exposure to risk.

File Monitoring

File Monitoring is more than just looking at standard file access and file access audits from logs.

Through low-level file tracking technology, FileMonitor can monitor file activity in real-time and can alert you if files have been changed. FileMonitor also provides details about the file size and file content hash for each file, for most of the monitored operations, so you can quickly check if information inside files have been altered. As a bonus, TEMASOFT FileMonitor can also detect if your critical files have been subject to more complex activities:

– File copy operations: locally, to the network, to removable devices – know if your files are being leaked;
– File archiving activity ;
– Impersonated access to files – is someone accessing files under the guise of another user or process;
– File activity of users with administrative privileges – elevated privileges allow far greater access;

Last, but not least, the product can detect and report on suspicious file activity such as impersonated access to files or file access outside regular work hours, which clues you in about potential activities that might eventually compromise the integrity of your files and business.

TEMASOFT FileMonitor can track file operations on Windows and Linux machines.