iSecurity Anti-Ransomware

iSecurity Anti-Ransomware

Raz-Lee Security
+
+

Related Products

  • ESET PROTECT Advanced
    2,263 Ratings
    Visit Website
  • ThreatLocker
    681 Ratings
    Visit Website
  • SOCRadar Extended Threat Intelligence
    104 Ratings
    Visit Website
  • Guardz
    117 Ratings
    Visit Website
  • Blumira
    150 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,699 Ratings
    Visit Website
  • Iru
    1,278 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website
  • Criminal IP
    17 Ratings
    Visit Website
  • Safetica
    409 Ratings
    Visit Website

About

Take threat hunting and IT security operations to the next level with powerful querying and remote response capabilities. Ransomware file protection, automatic file recovery, and behavioral analysis to stop ransomware and boot record attacks. Deep Learning Technology Artificial intelligence built into Intercept X that detects both known and unknown malware without relying on signatures. Deny attackers by blocking the exploits and techniques used to distribute malware, steal credentials, and escape detection. Elite team of threat hunters and response experts who take targeted actions on your behalf to neutralize even the most sophisticated threats. Active adversary mitigation prevents persistence on machines, credential theft protection, and malicious traffic detection.

About

Advanced Ransomware Threat Protection for IFS. Anti-Ransomware iSecurity Anti-Ransomware protects against ransomware attacks and other kinds of malware that may access and change IBM i data on the IFS. It prevents ransomware from damaging valuable data while preserving performance. Today’s IBM i is no longer an isolated system. It is connected to other databases through networked systems and connectivity. Businesses are encouraged to open up their IBM i servers and to use APIs, microservices, and modern user interfaces to leverage the data and business processes they contain. The data stored on the IFS is like any other file that the mapped PC can access. Ransomware attacks any file it can access including connected devices, mapped network drivers, shared local networks, and cloud storage services that are mapped to the infected computer. Ransomware doesn’t discriminate. It encrypts every data file that it has access to, including the IFS files.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

IT security professionals

Audience

Businesses to users looking for a software that protects against ransomware attacks and other kinds of malware that may access and change IBM i data on the IFS.

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

$28 per user per year
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Sophos
Founded: 1985
United States
www.sophos.com/en-us/products/endpoint-antivirus.aspx

Company Information

Raz-Lee Security
United States
www.razlee.com

Alternatives

Alternatives

iSecurity Field Encryption

iSecurity Field Encryption

Raz-Lee Security
CrowdStrike Falcon

CrowdStrike Falcon

CrowdStrike

Categories

Categories

Endpoint Protection Features

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

Integrations

Azure Marketplace
Blackpoint Cyber
BrightGauge
Forcepoint Trusted Gateway System
Genian NAC
Google Digital Risk Protection
IBM i
Jellyfish
OctoXLabs
OpenText Core MDR
Panaseer
Portnox Security
Sophos Central Device Encryption
Sophos Cloud Optix
Swimlane

Integrations

Azure Marketplace
Blackpoint Cyber
BrightGauge
Forcepoint Trusted Gateway System
Genian NAC
Google Digital Risk Protection
IBM i
Jellyfish
OctoXLabs
OpenText Core MDR
Panaseer
Portnox Security
Sophos Central Device Encryption
Sophos Cloud Optix
Swimlane
Claim Sophos Intercept X Endpoint and update features and information
Claim Sophos Intercept X Endpoint and update features and information
Claim iSecurity Anti-Ransomware and update features and information
Claim iSecurity Anti-Ransomware and update features and information