Products
Create a product by applying key technology specific to Endpoint
for individuals and businesses enjoying the widgetNuri.
Ransom Defense
It is a security solution that protects the user’s PC by blocking against the newly developed Ransomware
and the newly developed new / variant Ransomware based on the intelligent whitelist.
Software Authentication
- Verifying Unknown Software Reliability
- Verifying data integrity and information reliability
- Proactive blocking of new/variant Ransomware
- Normal Software Automatic Authentication
Intelligent Whitelist
- Whitelist through software authentication.
- Auto update whitelist
- Convenient whitelist management
- Unknown Ransomware Diffusion Prevention
Software Authentication
- Verifying Unknown Software Reliability
- Verifying data integrity and information reliability
- Proactive blocking of new/variant Ransomware
- Normal Software Automatic Authentication
Intelligent Whitelist
- Whitelist through software authentication
- Auto update whitelist
- Convenient whitelist management
- Unknown Ransomware Diffusion Prevention
Introduction
Effect
Existing security measures limit the protection of critical documents from the risk of ever-evolving Ransomware.
RansomDefense, based on an intelligent whitelist based on software authentication rather than traditional blacklist-based security,
can be safe from the threat of Ransomware.
Main
Function
Software Authentication
Software Reliability Check
White / Gray / Blacklist Auto Registration
List Management
Easy management of white / gray / black list
Behavioral Monitoring
Ransomware of behavior monitoring
Abnormal process file access blocking
Process I/O Threshold Control
DLL injection and script blocking
Block abnormal process file access
thresholds Complementing the limits
of behavior-based
Back-UP
Automated backup of critical data
Recoverable when critical data is damaged
Folder protection
Custom Folder Strong Protection
Not all software can be accessed
Ability to manage designated folder
Features
Software Authentication
Only authorized software can access critical data.
Reliability verification through various software analysis.
Protect important
documents
Behavioral Monitoring
and blocking.
Detect and block file
tampering monitoring.
Whitelist-based
New/Variable Ransomware
Available for Initial Response.
Sharing and managing
authenticated software.
System
Requirements
Policy Server
OS | Linux CentOS 7 |
---|---|
CPU | Intel ® Xeon 5600 higher |
Memory | 8GB higher |
HDD | 500GB higher |
Administrator Console |
Web Browser |
Agent
OS | Windows 7 (32/64bit) higher |
---|---|
CPU | Intel ® Core i3 3.1GHz higher |
Memory | 4GB higher |
HDD | 100GB higher |
Brochure