iSecurity Field EncryptionRaz-Lee Security
|
||||||
Related Products
|
||||||
About
Cyber extortion, the endgame of ransomware attackers, has emerged as the most perilous, destructive, and fastest-growing breed of cybercrime, demanding fundamentally new technical approaches to combat it. Completely new detection technology focused exclusively on ransomware. Real-time deflection of ransomware from critical enterprise assets. Rapid recovery of critical assets to a completely clean recovery environment that mimics yours. Mimic’s solutions are being built in collaboration with major banks, telcos, retailers, and healthcare providers. Our technology has proven effective and scalable in some of the largest and most critical networks in the world. Rapidly identify and subvert cyber extortion attempts with attack-resistant technology that focuses solely on the specific signals of ransomware behavior. Our defenses employ many different techniques, which evolve over time to out-maneuver adversaries' attacks.
|
About
iSecurity Field Encryption protects sensitive data using strong encryption, integrated key management and auditing. Encryption is vital for protecting confidential information and expediting compliance with PCI-DSS, GDPR, HIPAA, SOX, other government regulations and state privacy laws. Ransomware attacks any file it can access including connected devices, mapped network drivers, shared local networks, and cloud storage services that are mapped to the infected computer. Ransomware doesn’t discriminate. It encrypts every data file that it has access to, including the IFS files. Anti-Ransomware quickly detects high volume cyber threats deployed from an external source, isolates the threat, and prevents it from damaging valuable data that is stored on the IBM i while preserving performance.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Enterprises wanting a tool to ensure detection, deflection, and rapid recovery from ransomware attacks
|
Audience
Companies that want to protect sensitive data using strong encryption
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationMimic
United States
mimic.com
|
Company InformationRaz-Lee Security
Founded: 1983
United States
www.razlee.com/field-encryption/
|
|||||
Alternatives |
Alternatives |
|||||
|
|
||||||
|
|
|
|||||
|
|
||||||
|
|
|
|||||
Categories |
Categories |
|||||
Integrations
No info available.
|
Integrations
No info available.
|
|||||
|
|
|