RansomCare (RC) is an agentless solution offering from Fastcom, powered by BullWall. It proactively monitors the activity on file and cloud shares .
Once the solution detects anything suspicious for example file corruption, it automatically triggers a response. Straight away the compromised user device is isolated and disabled, while encrypting your data.
When all other security solutions in your organisations defence strategy fail , we give you that critical layer of protection.
Ransomware can encrypt 25,000 files per minute.
How would you stop it?
How RansomCare (RC) Works?
Monitor And Detect
Data activity on file shares is actively monitored in real time. All activity is displayed on a dashboard , so you have full visibility of the solutions immediate response for any attack that happens in your organisation. Instantly detects ongoing illegitimate encryption.
Isolate And Quarantine
Our solution identifies and isolates the user and client initiating the encryption on your organisations devices. It deploys built-in scripts to isolate the affected user and stop the unexpected file encryption from taking place within seconds.
Recover And Report
After an unexpected file encryption takes place, there will be an exact list of encrypted files automatically complied. The end user device is then shut down.The automated ransomware breach can then be submitted in a timely manner to the regulated compliance entities.
Was your business one of the 71% affected by ransomware in 2022?
What Happens In The Ransomware Assessment?
We assess the risk to your organisation
Does your current security setup allow you to identify the user and device that initiated the outbreak (Patient Zero)?
Do you have the ability to immediately stop illegitimate encryption before significant damage occurs?
Do you have complete visibility over what files have been encrypted and their location?
Fastcom ransomware assessment allows us to provide every organisation with the information and tools they need to defeat ransomware criminals.
Firstly, we offer a free ransomware assessment, which is conducted by a team of cybersecurity experts.
Our goal is to show your organisation how fast our ransomware protection service can react in your system, while also testing your current security defences to see their reaction to the zero-day file encryption and uncommon file changes on your file shares. The assessment is done remotely and just takes two hours!
Breach Reporting And Compliance
We take the stress of compliance and
breach reporting away from your IT Department
Its no easy task to investigate and compile a report after a ransomware breach , as files can be encrypted on multiple shares and folders all across your network.
In some instances , there is often a set time frame to report breaches to regulatory bodies for GDPR, CCPA, HIIPA and PCI-DSS-regulated entities.
Get the peace of mind you deserve! Our RansomCare (RC) service acts immediately in the event of a breach, thus ensuring fewer files are likely to be comprised in the first instance. Our fully automated internal and external incident reporting ensures accuracy and compliance.
What Will The Ransomware Breach Report Include
Recording the exact time of the attack (beginning to end)
Identify the compromised user and device
Listing all affected files and their owner
Detailing how and when the breach was stopped
Generating an incident report to key stakeholders
Generating an incident report for sharing with Data Protection Authorities