Sophos Intercept X EndpointSophos
|
iSecurity Anti-RansomwareRaz-Lee Security
|
|||||
Related Products
|
||||||
About
Take threat hunting and IT security operations to the next level with powerful querying and remote response capabilities. Ransomware file protection, automatic file recovery, and behavioral analysis to stop ransomware and boot record attacks. Deep Learning Technology Artificial intelligence built into Intercept X that detects both known and unknown malware without relying on signatures. Deny attackers by blocking the exploits and techniques used to distribute malware, steal credentials, and escape detection. Elite team of threat hunters and response experts who take targeted actions on your behalf to neutralize even the most sophisticated threats. Active adversary mitigation prevents persistence on machines, credential theft protection, and malicious traffic detection.
|
About
Advanced Ransomware Threat Protection for IFS. Anti-Ransomware iSecurity Anti-Ransomware protects against ransomware attacks and other kinds of malware that may access and change IBM i data on the IFS. It prevents ransomware from damaging valuable data while preserving performance. Today’s IBM i is no longer an isolated system. It is connected to other databases through networked systems and connectivity. Businesses are encouraged to open up their IBM i servers and to use APIs, microservices, and modern user interfaces to leverage the data and business processes they contain. The data stored on the IFS is like any other file that the mapped PC can access. Ransomware attacks any file it can access including connected devices, mapped network drivers, shared local networks, and cloud storage services that are mapped to the infected computer. Ransomware doesn’t discriminate. It encrypts every data file that it has access to, including the IFS files.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
IT security professionals
|
Audience
Businesses to users looking for a software that protects against ransomware attacks and other kinds of malware that may access and change IBM i data on the IFS.
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
$28 per user per year
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationSophos
Founded: 1985
United States
www.sophos.com/en-us/products/endpoint-antivirus.aspx
|
Company InformationRaz-Lee Security
United States
www.razlee.com
|
|||||
Alternatives |
Alternatives |
|||||
|
|
||||||
|
|
|
|||||
|
|
|
|||||
|
|
|
|||||
Categories |
Categories |
|||||
Endpoint Protection Features
Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting
|
||||||
Integrations
Azure Marketplace
Blackpoint Cyber
BrightGauge
Forcepoint Trusted Gateway System
Genian NAC
Google Digital Risk Protection
IBM i
Jellyfish
OctoXLabs
OpenText Core MDR
|
Integrations
Azure Marketplace
Blackpoint Cyber
BrightGauge
Forcepoint Trusted Gateway System
Genian NAC
Google Digital Risk Protection
IBM i
Jellyfish
OctoXLabs
OpenText Core MDR
|
|||||
|
|
|