Ransom Defense2018-12-06T17:07:23+00:00

Products

Create a product by applying key technology specific to Endpoint
for individuals and businesses enjoying the widgetNuri.

Ransom Defense

It is a security solution that protects the user’s PC by blocking against the newly developed Ransomware
and the newly developed new / variant Ransomware based on the intelligent whitelist.

Software Authentication

  • Verifying Unknown Software Reliability
  • Verifying data integrity and information reliability
  • Proactive blocking of new/variant Ransomware
  • Normal Software Automatic Authentication

Intelligent Whitelist

  • Whitelist through software authentication.
  • Auto update whitelist
  • Convenient whitelist management
  • Unknown Ransomware Diffusion Prevention

Software Authentication

  • Verifying Unknown Software Reliability
  • Verifying data integrity and information reliability
  • Proactive blocking of new/variant Ransomware
  • Normal Software Automatic Authentication

Intelligent Whitelist

  • Whitelist through software authentication
  • Auto update whitelist
  • Convenient whitelist management
  • Unknown Ransomware Diffusion Prevention

Introduction
Effect

Existing security measures limit the protection of critical documents from the risk of ever-evolving Ransomware.
RansomDefence, based on an intelligent whitelist based on software authentication rather than traditional blacklist-based security,
can be safe from the threat of Ransomware.

Main
Function

Software Authentication

Software Reliability Check
White / Gray / Blacklist Auto Registration

List Management

Easy management of white / gray / black list

Behavioral Monitoring

Ransomware of behavior monitoring
Abnormal process file access blocking

Process I/O Threshold Control

DLL injection and script blocking
Block abnormal process file access
thresholds Complementing the limits
of behavior-based

Back-UP

Automated backup of critical data
Recoverable when critical data is damaged

Folder protection

Custom Folder Strong Protection
Not all software can be accessed
Ability to manage designated folder

Features

Software Authentication

Only authorized software can access critical data.
Reliability verification through various software analysis.

Protect important
documents

Behavioral Monitoring
and blocking.
Detect and block file
tampering monitoring.

Whitelist-based

New/Variable Ransomware
Available for Initial Response.
Sharing and managing
authenticated software.

System
Requirements

Policy Server

OS Linux CentOS 7
CPU Intel ® Xeon 5600 higher
Memory 8GB higher
HDD 500GB higher
Administrator Web Browser

Agent

OS Windows 7 (32/64bit) higher
CPU Intel ® Core i3 3.1GHz higher
Memory 4GB higher
HDD 100GB higher

Brochure

Download Brochure

Protect your memories and assets with the WidgetNuri solution.

DOWNLOAD+