2017-02-13T10:00:00Z

What is the best solution for ransomware attack?

What is the best for ransomware infection? 

MM
System Administrator at Suez Canal Insurance
  • 6
  • 182
7
PeerSpot user
7 Answers
KS
Head of Global IT Security at Hansen Corporation Pty Ltd
Real User
2021-08-30T12:39:32Z
Aug 30, 2021

Look at the ACSC Essential Eight. If you can implement all of these then you will be highly unlikely to get hit by ransomware.

Search for a product comparison in EPP (Endpoint Protection for Business)
Jairo Willian Pereira - PeerSpot reviewer
Information Security Manager at a retailer with 10,001+ employees
Real User
Top 5Leaderboard
2021-05-11T18:35:54Z
May 11, 2021

Proactive: Patch Mgmt Program, Continuos Vulnerability Scanner (search and fix), Monitoring by SOC/NOC or others secutiry tools (like a HIDS or NIDS components).
Reactive: Incident Mgmt Plans categorized and specific by typication, BCP (complete Business Continuity Plan not only Disaster Recover Plans) and, mainly, verified backups tapes/medias (if possible, stored out of company, with continuous restore tests).

VM
User at Personal Use
User
2021-08-28T08:00:05Z
Aug 28, 2021

First - Use Trend Micro


Second - Apply a Backup System similar to TIME MACHINE Apple.

AV
Editor at a tech company with 11-50 employees
Real User
Top 20
2021-04-24T08:13:30Z
Apr 24, 2021

Install all security updates, create an incident response plan, use whitelisting to the maximum.

Nadeem Syed - PeerSpot reviewer
CEO at Haniya Technologies
Reseller
Top 5Leaderboard
2020-03-11T12:10:08Z
Mar 11, 2020

there are different solutions for ransomware these days. Best i have found is trendmicro end point protection for end users since it has a feature of stopping the attack or as soon as it says changes in files , it starts making a back up copy of it , so even if you get infected by ransomware, you still have a good chance to recover your data.

SN
Specialist at XYZ
Consultant
2017-03-01T13:55:11Z
Mar 1, 2017

IPS & Blocking unwanted extensions at gateway level.

Learn what your peers think about Microsoft Defender for Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: May 2023.
708,830 professionals have used our research since 2012.
SN
Chief Executive Officer at Vincacyber
Real User
2020-03-22T17:44:26Z
Mar 22, 2020

www.cynet.com

Related Questions
Avigayil Henderson - PeerSpot reviewer
Content Development Manager at PeerSpot
Mar 15, 2023
Hello community,  Please share with the community what your thoughts are based on your personal experience. Thank you.
See 2 answers
LW
Content Editor at PeerSpot
Mar 14, 2023
Endpoint protection platforms (EPPs) have evolved beyond traditional antivirus software to offer advanced threat detection and response capabilities. Many EPPs also offer threat-hunting or SOC services to provide organizations with real-time visibility into security incidents and remediation recommendations. Among the EPP providers that offer these services are the following, and, obviously, this is just a sample but, hopefully, also a good start: CrowdStrike Falcon Complete Kaspersky Endpoint Security has an Endpoint Detection and Response McAfee (Trellix) Endpoint Security Managed Detection and Response (MDR) Palo Alto Networks Unit 42 MDR Service for Cortex XDR SentinelOneVigilance Respond Sophos MDR Symantec (Broadcom) Endpoint Protection Managed Endpoint Detection and Response Trend Micro Apex One Managed XDR VMware Carbon Black MRDR Sophos MDR is interesting in that it leverages other providers' cybersecurity technologies including telemetry from AWS, Check Point, CrowdStrike, Darktrace, Fortinet, PAN, and others.
Nikki Webb - PeerSpot reviewer
Global Channel Manager at Custodian360
Mar 15, 2023
Yes, there are endpoint protection platforms that offer threat-hunting or SOC (Security Operations Center) services, and Custodian360 is one of them. Endpoint protection platforms (EPPs) are security solutions that are installed on endpoint devices to detect, prevent, and respond to cyber threats. Threat-hunting is a proactive approach to cybersecurity that involves actively searching for threats and vulnerabilities that might have evaded traditional security measures. SOC services involve monitoring and analysing security events to identify and respond to security incidents. Custodian360 is a comprehensive endpoint protection platform that offers both threat-hunting and SOC services. It uses a combination of signature-based and behavior-based detection to detect and respond to cyber threats in real-time. The platform has a built-in threat-hunting engine that continuously scans endpoints for signs of compromise, and it also has a team of expert analysts who perform manual threat-hunting to identify and respond to advanced threats. Custodian360's SOC services include 24/7 monitoring and analysis of security events, incident response, and forensic investigation. The platform also provides detailed reporting and analytics to help organisations understand their security posture and identify areas for improvement. In summary, Custodian360 is an endpoint protection platform that offers threat-hunting and SOC services, making it an ideal solution for organisations that want comprehensive protection against cyber threats.
Avigayil Henderson - PeerSpot reviewer
Content Development Manager at PeerSpot
Mar 13, 2023
Hello peers,  Please share your input and help out fellow peers. Thank you.
See 2 answers
Disha Shah - PeerSpot reviewer
Technical Associate at HTH Global Network
Mar 3, 2023
Cortex XDR from Paloalto have solution for all three and talking about legacy infrastructure can you name some of them??
LW
Content Editor at PeerSpot
Mar 13, 2023
There are several endpoint protection solutions available that can provide protection for endpoints running on Linux, Windows, and MacOS. Among them are Symantec (Broadcom) Endpoint Protection, Trend Micro Apex One, McAfee (Trellix) Endpoint Security, Kaspersky Endpoint Security for Business, ESET Endpoint Security, Palo Alto Networks Cortex XDR and, perhaps surprisingly (but then again, not) Microsoft Defender for Endpoint. (This is not an exhaustive list). However, the devil is in the details regarding which versions of an OS and what kind of hardware requirements a given solution supports. You need to closely check the specifics of the range of devices you have with what a given vendor covers. It's also important to note that for agent-based solutions, the minimum processor requirements may allow you to install the product, but if you're just getting by in that regard, there could be issues with computer performance. Symantec supports a fairly broad range of Linux and Windows Embedded versions, but does not support application control on Mac, Windows Servers, Windows Embedded, Linux, or mobile devices. Trend Micro Apex One's agents support support from macOS High Sierra 10.13 to macOS Monterey 12, on Apple M1, Apple M2, or Intel® Core processors. To protect Linux file, web, and application servers with Trend Micro, you'll need its ServerProtect product. McAfee handles Windows 8.1, 10, and 11, and offers limited customer service if you try running it on Windows 8.0 and 7.x. For macOS it goes as far back as Mac OS X 10.10 and through to macOS 12 (Monterey). For Linux it offers limited coverage: Ubuntu 16.04, Ubuntu 18.04, and Ubuntu 20.4. With Kaspersky Endpoint Security for Business you get Windows, of course, and pretty extensive Linux coverage, with nine 32-bit OSs covered, and literally dozens of 64-bit Linux flavors. Mac coverage is included in the Advanced and Select versions of Kaspersky ESB (and you also get Android and iOS). ESET Endpoint Security will work with Windows 7 - 11 (although some features are not supported on ARM processors) macOS 10.12 and up, and a couple of 64-bit Linux systems: Ubuntu Desktop 18.04 LTS and RHEL Desktop 7. PAN Cortex XDR supports Windows 8 - 11 as well as macOS as far back as 10.13 with its 7.5-CE release. Subsequent 7.x releases cover later macOS versions (with 7.7.3 and later handling macOS 13.x). Cortex XDR only supports 64-bit Linux and you have to install a supported kernel module version, but it does cover a good selection of the main Linux offerings including CentOS, Debian, Oracle, RHEL, openSUSE, and Ubuntu. Microsoft Defender for Endpoint has coverage for macOS 11 (Big Sur), 12 (Monterey), and 13 (Ventura), although Big Sur requires some additional configuration. It also protects more recent versions of RHEL, CentOS, Ubuntu, Debian, and Oracle Linux. Android (6.0 and higher) and iOS (11.0 and higher) are also available. As for legacy systems, it's best to explicitly ask the vendor if they cover the particular hardware/OSs you have. For example, older versions of Symantec Endpoint Protection 14 cover Windows as far back as Vista, and Windows Server as far back as Windows Server 2008 (RTM, SP1, SP2).
Related Articles
Ariel Lindenfeld - PeerSpot reviewer
Director of Community at PeerSpot
Aug 21, 2022
We’re launching an annual User’s Choice Award to showcase the most popular B2B enterprise technology products and we want your vote! If there’s a technology solution that’s really impressed you, here’s an opportunity to recognize that. It’s easy: go to the PeerSpot voting site, complete the brief voter registration form, review the list of nominees and vote. Get your colleagues to vote, too! ...
Shibu Babuchandran - PeerSpot reviewer
Regional Manager/ Service Delivery Manager at a tech services company with 201-500 employees
Aug 9, 2022
If you’re weighing your options for endpoint security solutions, there are many options out there. However, solutions vary greatly in terms of how effectively they can protect your network. I want to help you make the best decision possible, so here are some questions to ask before buying an endpoint security solution, and why they are important. 1) Does the solution employ Foundational Tech...
EB
Director of Community at PeerSpot (formerly IT Central Station)
Feb 4, 2022
Hi dear community members, This is our latest community digest. It helps you catch up on recent contributions by community members. Comment below with your feedback and suggestions! Trending What are the Top 5 cybersecurity trends in 2022? What are the main benefits of modern IT Asset Discovery tools? Tip Post an educational article from your Home feed and receive 20 point...
See 1 comment
reviewer1577907 - PeerSpot reviewer
Manager at PeerSpot
Feb 4, 2022
Thank you, these community Spotlights are very handy!
EB
Director of Community at PeerSpot (formerly IT Central Station)
Nov 19, 2021
Hi community members, Spotlight #2 is our fresh bi-weekly community digest for you. It covers cybersecurity, IT and DevOps topics. Check it out and comment below with your feedback! Trending What are the pros and cons of internal SOC vs SOC-as-a-Service? Join The Moderator Team at IT Central Station (soon to be PeerSpot)! Questions Share your experience with other peers by ans...
Related Articles
Ariel Lindenfeld - PeerSpot reviewer
Director of Community at PeerSpot
Aug 21, 2022
PeerSpot User's Choice Award 2022
We’re launching an annual User’s Choice Award to showcase the most popular B2B enterprise technol...
Shibu Babuchandran - PeerSpot reviewer
Regional Manager/ Service Delivery Manager at a tech services company with 201-500 employees
Aug 9, 2022
8 Questions to Ask While Selecting an Endpoint Security Solution for Your Business
If you’re weighing your options for endpoint security solutions, there are many options out there...
Download Free Report
Download our free Microsoft Defender for Endpoint Report and get advice and tips from experienced pros sharing their opinions. Updated: May 2023.
DOWNLOAD NOW
708,830 professionals have used our research since 2012.