Anti-Ransomware Protection

Cybersecurity and Compliance

iSecurity Anti-Ransomware protects against ransomware attacks that infect and encrypt Integrated File System (IFS) files via mapped/shared drives.

Anti-Ransomware helps to detect high-volume cyber threats deployed from external sources, helping to isolate the threat and prevent further damage to your environment.

iSecurity Anti-Ransomware is a proactive solution, designed to recognize and protect your IBM i servers quickly and efficiently from known and unknown (zero-day) threats, as soon as malicious activity is diagnosed.

image

Identifies, delays, stops and reports on ransomware attacks in real-time

image

Uses multiple ransomware behavioral characteristics to detect suspicious activity

image

Detects only mode alerts you to possible suspicious activity while live mode alerts and counters attacks

image

Detects and disconnects remote devices performing suspicious activity, limiting damage inflicted in an attack

image

Provides real-time alerts and activity logging

Features of iSecurity Ransomware

image

Complete Ransomware Protection

Classifies incidents and determines the appropriate way to quarantine & neutralize ransomware attacks, based on customer configuration & system setup. Suspends the attack by quarantining offending files/systems, while alerting the relevant administrators in real-time, via QSYSOPR message queue, email or syslog. iSecurity Anti-Ransomware can identify the device originating the attack and disconnect it from the network, preventing it from further damaging IFS files.

Ransomware Signature file

iSecurity Anti-ransomware includes a database of inappropriate or suspicious activities such an excessive renaming of objects or new objects creation considered beyond the scope of normal activity. Ransomware signature files are updated from the web using a proprietary signature file.

image
image

Audit trails & reporting

Provides a full audit trail, complete with logs and a robust query generator. Ransomware activity reports can be exported in spool files, PDF, HTML & Zip formats.

Latest Blogs

image
IBM i
February 21, 2024
How to Create IBM i Password Security Policies
image
IBM i
January 30, 2024
Five Steps to Eliminate Default IBM i User Passwords
image
IBM i
January 17, 2024
What is Phishing-Resistant Multi-Factor Authentication?

LET’S GET IN TOUCH

We’re happy to answer any questions about our software and what we do.

CONTACT US NOW