Listing Thumbnail

    Unisys Ransomware Protection

     Info
    The Unisys Ransomware Protection solution seamlessly integrates with your IT operations and existing endpoint protection for 24/7 ransomware prevention. Part of Unisys' comprehensive, secure business portfolio, it secures your enterprise and works with Mac, Linux and modern/legacy Windows systems, with or without Internet access.
    Listing Thumbnail

    Unisys Ransomware Protection

     Info

    Overview

    Approximately 32% of all enterprise breaches in 2023 involved extortion or ransomware, the malicious encryption of files that forces victims to pay to access their data, with an average cost of $5.23M USD. The attack vectors are constantly changing, and threat actors rigorously test their ransomware’s detectability to increase the likelihood of evading market-leading endpoint detection and response(EDR) technologies. In fact, the top eleven endpoint detection and response tools failed to prevent ransomware execution 65% of the time, according to academic research published in the Journal of Cybersecurity and Privacy.

    The Solution The Unisys Ransomware Protection solution stops ransomware attacks by tackling the one thing all forms of ransomware have in common: file encryption. The solution terminates the process that attempts to maliciously encrypt data while allowing encryption that is part of normal business operations.

    Deployed alongside your existing EDR solution, the ransomware protection solution works immediately and defends your assets whether you are online or offline. The platform is not signature-based and requires no updates. The same core technology has stopped ransomware over the last seven years without needing changes to the detection logic.

    Service Overview Unisys experts will work with your IT administrators to strategize simple and reliable deployment for new and existing Windows, MacOS and Linux hosts. The solution even supports older, unsupported endpoints and operational technology with backward capability to Windows XP and Windows Server 2008 R2.

    Once deployed, the Unisys team finetunes detections for any unique applications or processes in your enterprise and begins monitoring alerts 24/7. When threats are detected and prevented, Unisys’ security operations team begins incident response to assess residual threats and prescribe remediation activities. This means there is no need to recover from backups, engage lawyers or forensics firms, or pay a ransom.

    Highlights

    • Operates alongside existing endpoint detection and response technologies - stopping ransomware when they fail
    • Protects endpoints and servers, whether online or offline, including current/legacy Windows, MacOS and Linux operating systems
    • 24x7 prevention, alert monitoring and response

    Details

    Delivery method

    Pricing

    Custom pricing options

    Pricing is based on your specific requirements and eligibility. To get a custom quote for your needs, request a private offer.

    Legal

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Support

    Vendor support

    Pre-engagement support through email and conference calls to determine scope, implementation, kick off and go live timelines. Once the service is active, email (mdr@unisys.com ) and phone support will be provided by designated engagement resources during the service term.

    Software associated with this service