• 1
     
    View ransomware alerts

    Use ransomware Alert Profiles to trigger alerts and view in-depth details of the attack that can be used for investigation.

    View ransomware alerts
  • 1
     
    Automate responses using scripts

    Use default scripts to shut down servers and disable user accounts. Tailor-make scripts as per your organization's requirements to restrict the spread of ransomware.

    Automate responses using scripts
  • 1
     
    Ransomware file type library

    Use our extensive list of known ransomware file types to locate corrupted files. You can also add new file types as required.

    Ransomware file type library
  • Spot ransomware attacks

    Identify potential ransomware infections by tracking anomalous file activities that indicate the infiltration of harmful malware into the network.

  • Locate infected files

    Detect corrupted files using our library of known ransomware file types and purge them using the automated ransomware response mechanism.

  • Launch automatic responses

    Contain and curb further spread of malware by instantly quarantining and shutting down infected systems.

  • Create an incident response plan

    Use reports to spot the source of a malware attack. Analyze audit trails to refine the ransomware response plan and minimize damage in the future.

Detect, stop, and prevent ransomware attacks using our ransomware protection software