New York – July 14, 2020 – Raz-Lee Security has added a ransomware attack simulator to its iSecurity Anti-Ransomware. With this feature, customers can test how their systems would behave during ransomware attacks. Administrators can verify and fine-tune the protection that the product provides.
Ransomware usually runs from a PC. It attacks any data file it can access, including IBM i IFS files.
A few weeks ago, Sapiens, a software developer for insurance, with software for IBM i, was forced to pay a $250,000 ransom in Bitcoin. A published known Ransomware attack on an IBM i made 250,000 IFS files unusable, stopped normal work for a month and cost the organization $200,000 to get the decryption key.
"During this COVID-19 pandemic, ransomware and other cyber-attacks have increased, targeting healthcare, financial, and government organizations.
Cybercriminals are looking to take advantage of this global crisis. Now more than ever, it is important to ensure that IT systems are safe," says Shmuel Zailer, CEO,
The new Anti-Ransomware attack simulator simulates known ransomware such as Sodinokibi, Ryuk, CryptoLocker, WannaCry etc., or even unknown zero-day ransomware that criminals on the darknet are offering as "ransomware as a service".
The attack simulator runs from a PC. It installs quickly and can be activated repeatedly to test various conditions on the IBM i. The ransomware simulator is ABSOLUTELY and only access to one predefined folder. The iSecurity Anti Ransomware software kicks it as configured, considering the simulated attacks to be real ones. This way, users can review, test and modify the software configuration to suit. With this added functionality, organizations can have the confidence the software is properly set to protect them.
iSecurity Anti-Ransomware run on the IBM I and hardly consumes any CPU resources. As an IPS (intrusion Prevention Solution) it continuously monitors for ransomware attacks, whilst consuming hardly any CPU resources. When detecting an attack, it immediately stops it in its tracks by executing your plan of defence - it can shut down the attacking PC. disconnect your IBM i from the network and escalate notifications via email, messages and / or SIEM alerts. Find out more – information about iSecurity Anti-Ransomware or request a presentation or a POC.
Anti-Ransomware can run stand-alone or seamless interface with other iSecurit products. It is part of the iSecurity Advanced Threat Protection (ATP) suite, which also includes Anti-Virus, an ICAP client for the Anti-Virus, and Object Integrity Validation.
For more information contract AH Technology (Aust) on +61 3 9572 5869, email [email protected] or visit www.ahtechnology.com.au