Dashboard for streamlined ransomware recovery

Issue 2 2022 Cyber Security

Index Engines has announced a new dashboard for its CyberSense security analytics product, which provides intuitive, easy-to-understand post-attack forensic reports that deliver powerful insights into data corruption due to a ransomware attack.

CyberSense detects signs of the most sophisticated attack vectors by scanning backup and snapshot data utilising over 200 content-based analytics and machine learning to identify corruption and the last good version of files and databases, empowering intelligent and rapid recovery to minimise downtime.

“Ransomware attacks are becoming more sophisticated and more challenging to recover from,” Index Engines vice president Jim McGann explained. “In the ongoing battle against cyber criminals, organisations need to arm themselves with the most powerful and insightful capabilities on the market today.

“This is why CyberSense stands alone in delivering full content analytics which will uncover even the most advanced data corruption along with a new powerful and intuitive post-attack dashboard, which will allow customers to quickly recover from disruption and minimise business downtime.”

CyberSense boasts hundreds of users worldwide and detects signs of ransomware with 99.5% accuracy, based on testing of over 20 million clean and infected backup sets. While the accuracy was unparalleled, the previous interface could be too complex for users in crisis mode. The new CyberSense interface simplifies the user experience, providing detailed insight into the who, what, where, and when of an attack.

Should signs of an attack be identified, analytics are provided to assist cybersecurity specialists in the recovery process, including providing:

• High-level detail on why the machine learning generated an alert and the scope of the attack.

• Pre-programmed and customisable reports needed to investigate the attack in a single dashboard including:

• Who was impacted; what servers.

• How much damage was done.

• Listing corrupted files and the last good version.

• Ability to analyse the corrupted files to determine user account and executable used to corrupt data.

• When the corruption occurred and what backups should be recovered.

• Exportable analytics needed to scope and analyse attacks independently to streamline the recovery process.

This new interface will be available to CyberSense customers in the 3rd quarter of 2022, with the first release focused on post-attack recovery.

For more information go to https://indexengines.com




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Governing cybersecurity from the top as a strategic business enabler
Cyber Security
C-Suite executives still do not take cybersecurity seriously enough, while boards are not nearly as engaged in cybersecurity as they are in other areas of oversight.

Read more...
It is time to take a quantum leap in IoT cybersecurity
Drive Control Corporation Cyber Security
IoT has become integrated everywhere, including enterprises. While it offers many benefits, such as increased productivity and the rollout of mission critical applications, it can also lead to (enterprise) cyber-attack vulnerabilities.

Read more...
What to do in the face of growing ransomware attacks
Technews Publishing Cyber Security Security Services & Risk Management
Ransomware attacks are proliferating, with attackers becoming more sophisticated and aggressive, and often hitting the same victims more than once, in more than one way.

Read more...
Can we reduce cyberattacks in 2023?
Cyber Security
Zero-trust cybersecurity strategy with simplicity and risk reduction at the heart is mandatory to reduce exponential cyberattacks in 2023, says GlobalData.

Read more...
Key success factors that boost security resilience
Cyber Security
Adoption of zero trust, secure access service edge and extended detection and response technologies, all resulted in significant increases in resilient outcomes, as are executive support and cultivating a security culture.

Read more...
Enterprise threats in 2023
News Cyber Security
Large businesses and government structures should prepare for cybercriminals using media to blackmail organisations, reporting alleged data leaks, and purchasing initial access to previously compromised companies on the darknet.

Read more...
CA Southern Africa unmasks container security
Technews Publishing IT infrastructure Cyber Security
Adoption of software containers has risen dramatically as more organisations realise the benefits of this virtualised technology.

Read more...
Shifts in threat landscape to industrial control systems
Cyber Security
Kaspersky’s ICS CERT researchers’ predictions include increased attack surface due to digitisation, activities of volunteer and cybercriminal insiders, ransomware attacks on critical infrastructure as well as the technical, economic and geopolitical effects, and the rise of potential vulnerabilities being exploited by attackers.

Read more...
Advanced persistent cybercrime
Cyber Security
FortiGuard Labs predicts the convergence of advanced persistent threat methods with cybercrime. Advanced persistent cybercrime enables new wave of destructive attacks at scale, fuelled by Cybercrime-as-a-Service.

Read more...
Digital razor wire: sharpening endpoint protection
Cyber Security
Crypto-mining, hacking, vulnerabilities, and threats – protecting the organisation’s endpoints has never been more important than it is today, says Reggie Nkabinde, consultant: modern platform-security at Altron Karabina.

Read more...