Cybersecurity company Index Engines announced the latest release of its CyberSense® software, with version 8.6 delivering a revamped user interface to support smarter recovery from ransomware attacks, new custom Advanced Threshold Alerts to proactively detect unusual activity, and unrivaled AI-powered detection of ransomware-based data corruption to accelerate recovery and minimize business disruption.
CyberSense 8.6 provides an integrated experience for organizations to understand potential data corruption, detect malicious activity by threat actors, assess affected data, and view both clean and suspect backups and snapshots in an intuitive workflow. This update provides all of the information needed to support a curated recovery of clean data quickly and efficiently to resume normal business operations.
“Organizations lack robust cyber liability and data resiliency strategies and face significant obstacles in recovering from a ransomware attack ,” said Jim McGann, vice president of strategic partnerships at Index Engines. “With CyberSense 8.6, organizations gain enhanced insights to mitigate ransomware’s impact and expedite recovery to minimize business interruption. Additionally, new data threshold analysis features enable proactive detection of suspicious file-level activity, averting potential operational impact.”
CyberSense 8.6 ushers in a more proactive approach to ensuring data integrity against insider threats and external bad actors with a variety of customizable data threshold alerts. These alerts are based on metadata and content changes to files and can be created based on the quantity or percentage changes of modified files, altered file type, added/deleted files, or entropy or encryption across any host.
For enhanced proactive monitoring, the introduction of Advanced Threshold Alerts allows for the generation of alerts when specific files exhibit unusual behavior. Common scenarios for leveraging this new feature include defining honeypots or decoy files/folders to monitor for abnormal activity, as well as monitoring sentinel files expected to remain unchanged and alerting on any encryption or alterations.
SOURCE: PRNewswire