iSecurity Anti-Ransomware protects against ransomware attacks that infect and encrypt Integrated File System (IFS) files via mapped/shared drives.
Anti-Ransomware helps to detect high-volume cyber threats deployed from external sources, helping to isolate the threat and prevent further damage to your environment.
iSecurity Anti-Ransomware is a proactive solution, designed to recognize and protect your IBM i servers quickly and efficiently from known and unknown (zero-day) threats, as soon as malicious activity is diagnosed.
Identifies, delays, stops and reports on ransomware attacks in real-time
Uses multiple ransomware behavioral characteristics to detect suspicious activity
Detects only mode alerts you to possible suspicious activity while live mode alerts and counters attacks
Detects and disconnects remote devices performing suspicious activity, limiting damage inflicted in an attack
Provides real-time alerts and activity logging
Classifies incidents and determines the appropriate way to quarantine & neutralize ransomware attacks, based on customer configuration & system setup. Suspends the attack by quarantining offending files/systems, while alerting the relevant administrators in real-time, via QSYSOPR message queue, email or syslog. iSecurity Anti-Ransomware can identify the device originating the attack and disconnect it from the network, preventing it from further damaging IFS files.
iSecurity Anti-ransomware includes a database of inappropriate or suspicious activities such an excessive renaming of objects or new objects creation considered beyond the scope of normal activity. Ransomware signature files are updated from the web using a proprietary signature file.