TACHYON Endpoint Security 5.0INCA Internet
|
||||||
Related Products
|
||||||
About
Heimdal Ransomware Encryption Protection is a revolutionary 100% signature-free component, ensuring market-leading detection and remediation of any type of ransomware, whether fileless or file-based. It can detect any encryption attempts without signatures or behavioral patterns. Your ransomware-free experience starts here. This module was engineered to be universally compatible with any antivirus. Ransomware Encryption Protection extends the functionality of your antivirus instead of displacing it. The module’s built-in white- and blacklisting capacities, allows Ransomware Encryption Protection to distinguish between autonomic and routine system-wide processes and malicious attempts, thus decreasing the false-positive rate.
|
About
Advanced anti-virus solution that blocks cyber threats such as malware, spyware, ransomware, etc. Safely protect user system and important information with improved real-time monitoring and protection features.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
IT security teams in need of an anti-ransomware encryption solution that protects devices against malicious encryption attempts
|
Audience |
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
$37/Year/User
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationHeimdal®
Founded: 2014
Denmark
heimdalsecurity.com/enterprise-security/products/ransomware-encryption-protection
|
Company InformationINCA Internet
Korea
tachyonlab.com/en/index.html
|
|||||
Alternatives |
Alternatives |
|||||
|
|
||||||
|
|
|
|||||
|
|
|
|||||
|
|
|
|||||
Categories |
Categories |
|||||
Endpoint Protection Features
Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting
Computer Security Features
Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection
|
||||||
Integrations
No info available.
|
Integrations
No info available.
|
|||||
|
|
|