Zum Hauptinhalt wechseln

BullWall RANSOMCARE

BullWall A/S

STOP RANSOMWARE BEFORE IT STOPS YOU - HOW DO YOU KNOW THAT YOU ARE UNDER ATTACK!

In a scenario where a ransomware has already bypassed your existing security solutions, it is now effectively “whitelisted” to attack your business, causing as much disruption as possible by encrypting as many of your files as it can in the shortest possible time.

Why is RC different? RC is a new and innovative technology that from a central server installation (Agentless), detects ransomware attacks by looking into the heuristics of your actual data files from i.e. word, excel, pdf. etc., stored on your entire storage platform and in the cloud.

IMPORTANT CONSIDERATIONS WHEN YOU ARE ATTACKED BY RANSOMWARE

  • How do you see which files are encrypted and where they reside?
  • How do you identify which user and which device initiated the attack?
  • How do you stop the ongoing encryption immediately before significant damage occurs and how long will it take to restore files at what cost?
  • Can you accurately report GDPR if thousands of files has been lost to illegitimate encryption?

 

RC will detect and stop ransomware attacks, even when the malware has bypassed all your existing security tools. It provides critical security defence for a small portion of your available security budget.

It’s critical that organisations don’t rely solely on a reactive response. On a daily basis we hear reports on how this strategy has proven to fail. The future defence strategy needs to include disaster recovery with a Last Line of Defence solution.

RC provides a revolutionary Last Line of Defence against the threat from ransomware and delivers a 24/7 automated response. It does not matter which user, or which device triggered the attack. Nor does it matter if it is a known or unknown ransomware attack, or if the attack started on an endpoint, a mobile phone, an IOT device, via email, website drive-by-attack, USB key, or were deployed by someone inside your organisation.

An alert is raised instantly and a response can be triggered to shutdown the endpoint under attack (Windows, Mac and Linux) so encryption stops instantly. RC also handles virtual environments like Citrix servers/sessions, Terminal servers/sessions, Hyper-V, VMware and the Cloud including Azure and Amazon AWS/EC2, Sharepoint, Google Drive and Office 365. RC disables and stops the device encrypting your data including mobile devices.

RC is NOT installed on endpoints or any of the existing servers or file servers. There is no impact on network performance issues. Agentless file behaviour monitoring, and machine learning techniques are deployed with ease in 4hours, with automatic configuration. Full integration to other security solutions like MS ATP, Cisco ISE and SIEM systems via RESTful API allows your security teams to unify management across all endpoints.

http://store-images.s-microsoft.com/image/apps.30677.4dc915ec-1456-49b1-af8e-fbf6182081c0.24217877-5f26-4874-9008-36471be42b6d.5d5c519a-38ba-4e27-8841-bd53bd2f56e2
/images/videoOverlay.png
http://store-images.s-microsoft.com/image/apps.30677.4dc915ec-1456-49b1-af8e-fbf6182081c0.24217877-5f26-4874-9008-36471be42b6d.5d5c519a-38ba-4e27-8841-bd53bd2f56e2
/images/videoOverlay.png
http://store-images.s-microsoft.com/image/apps.64094.4dc915ec-1456-49b1-af8e-fbf6182081c0.24217877-5f26-4874-9008-36471be42b6d.aa1ca561-fb19-45ca-a021-ab418c89ba17
/images/videoOverlay.png
http://store-images.s-microsoft.com/image/apps.46524.4dc915ec-1456-49b1-af8e-fbf6182081c0.24217877-5f26-4874-9008-36471be42b6d.8ac34cb1-5fd2-4832-a8f1-c05a326c620a
/images/videoOverlay.png
http://store-images.s-microsoft.com/image/apps.35463.4dc915ec-1456-49b1-af8e-fbf6182081c0.24217877-5f26-4874-9008-36471be42b6d.b1107d0b-ee47-4842-ad24-6292e63b9f36