Anti-Ransomware does not replace anti-virus software; rather, it coexists with it to provide an additional layer of protection against ransomware and helps with instant file recovery.
Anti-Ransomware is a lightweight application that consumes negligible system resources. The CPU usage is less than 1% , and the RAM utilization is less than 100MB.
No, Anti-Ransomware does not need tuning or baselining before being deployed to a production environment. Focusing on the user's Out-Of-Box experience, Anti-Ransomware is incredibly simple to set up and use right after installation.
Anti-ransomware offers offline native protection, allowing devices to be continuously monitored even when they are not connected to the network. This is possible since Anti-Ransomware is not cloud dependent, and unlike traditional antivirus solutions, there is no need to update signature files on a regular basis.
No, Anti-Ransomware does not scan your systems periodically. Rather, it conducts a real-time analysis of the systems, continuously monitoring them in order to detect and report a ransomware attack as quickly as possible.
Currently, Anti-Ransomware solution is designed to specifically detect ransomware attacks only.
Anti-Ransomware currently supports only Windows operating system.
Microsoft's Volume Shadow Copy Service (VSS) is utilized to obtain shadow copies of the data stored on your device, every three hours. As a rest, the recovered file is from the most recent backup cycle which could be 3 hours old.
Anti-Ransomware's VSS recovery is protected by a patented tamper-proof technique ensuring that ransomware does not encrypt or delete the backup data when an attack occurs. This also prevents any accidental or intentional deletion of backups by the user.
The shadow copies of all the files on an endpoint are stored on the endpoint itself. These shadow copies are further tamper-protected and take up negligible system resources for storage.
Anti-Ransomware is built to work alongside other programs in your network without interfering with their functionality.
Anti-Ransomware starts functioning nearly immediately after being deployed onto the network.
No, the system need not be restarted after deploying the Anti-Ransomware tool.
The network bandwidth consumption of Anti-Ransomware is nil. This distinguishes Anti-Ransomware from other cloud-based EDR and Anti-Virus solutions because there is no need to often fetch signature database files, which cuts network traffic.
File-less attacks are particularly difficult to detect since they leave little or no trace on the system. However, Anti-Ransomware's patented ML-assisted behavior detection technique makes it possible to detect file-less attacks on the network.
The files encrypted by ransomware can be restored as long as backup is available even if the incident was not raised as an alert.
Anti-Ransomware employs anti-hook and anti-kill methods to keep users from killing the agent.
The admin can stop the Anti-Ransomware agent by terminating the commands.