CyberSense

Validate the integrity of backup data, detect corruption due to ransomware and support streamlined recovery to minimize business interruption.

Learn More >>

Detect and Recover from Ransomware Attacks

Real-time cyber protection solutions are designed to protect from an attack.  However, these solutions are not 100% effective and corporate data is corrupted daily.  CyberSense adds a layer of protection to these real time solutions and finds corruption that occurs when an attack has successfully penetrated the data center.  CyberSense also enables recovery to occur quickly so business interruption is avoided.

CyberSense works with data protection software including Dell EMC's Cyber Recovery Vault and IBM's Cyber Resiliancy and analyzes data in backups to identify files and databases that have been unknowingly corrupted by ransomware. CyberSense utilizes a combination of full-content-based analytics and machine learning to detect if an attack has occurred. CyberSense analytics are indicative of all common attack vectors including entropy changes, known ransomware extensions, data corruption and deletion, and over 100 other statistics.  Machine learning analyzes CyberSense’s statistics and to determine if data corruption has already occurred.

Post attack, CyberSense provides forensic tools to diagnose and recover.  This includes reports on files that were impacted so they can be replaced with the last know good version, the type of attack vector, and with analysis of event logs the specific users accounts and executables or malware that performed the attack. CyberSense analytics, machine learning and forensic tools deliver the knowledge you need to quickly detect and recover from cyberattacks. Read a third party, lab-verified review of CyberSense.

 

Detect Corruption with 99.5% Accuracy

CyberSense finds data corruption with a single-pass, full-content, on-premise scan of data. No moving data to the cloud. This ensures more advanced ransomware hiding inside a file doesn't go undetected. Uncover:

  • Known Ransomware Ext, Change in File Size, etc.

  • File Type Mismatch, Corrupt File Structure

  • Partial Encryption, Corrupted Content, etc.

Learn More

 Detect image

 

 

 

Diagnose with Forensic Reporting

   
Dignose CS Mock

Who was impacted? How much damage was done?What was attacked? Where is the source? What user account and ransomware was used?When did it happen? What backup sets contain the last good version of data?

An attack can leave you with more questions than answers. When CyberSense detects signs of an attack, an  email alert is sent stating that an infected backup set was detected and a full listing of all the statistics generated by CyberSense analytics. Also included is information on the specific attack vector that was detected.

The attack vector is determined using the analytics, knowledge of how these analytics change over time, and then by processing the data with machine-learning algorithms. The email includes a number that corresponds to the specific attack vector.

Learn More

 

 

 

Recover Quickly and Get Back to Business

CyberSense helps you avoid business interuption by minimizing downtime. Search previous “non-corrupted” backup set​ and create a list of backup sets for restoration, knowing the data you will be restoring has integrity.

These backup sets can exist on several different incremental backups that were run over a period of time. CyberSense identifies the last good backup set based on analytics and machine learning. This good backup set will have no signs of data corruption.

Learn More

 recover cs mock  

 

 

Detect527 Detect

Analytics and machine learning detect corruption with 99.5% confidence.

diagnose527 Diagnose

Forensic reports identify the impact of the attack and the vector utilized.

recover527 Recover

Detailed listing of backup sets with most recent pre-attack version of files.

 Power Over Information™

Index Engines has been providing organizations with power over information since 2004. Our scalable, high performance indexing engine has been uniquely architected to support both primary and backup data and is unmatched in the industry.

CyberSense is the latest offering that combines analytics and machine learning to detect corruption due to a cyberattack with 99.5% accuracy. Beyond CyberSense, Index Engines delivers an extensive information management product family that supports management and governance of content with petabyte-class scalability and performance.

Contact Us            Our Technology

Manage thin small

Management Edition

Understand what data exists on your network and manage it more effectively. The Management Edition gives you an affordable, quick and intuitive way to execute your data policies.

Analysis sma

Analysis Edition

The Analysis Edition combines the indexing, reporting and tiering of the Management Edition and adds advanced capabilities including pattern and sensitive data search.

Governance small

Governance Edition

The Governance Edition provides comprehensive indexing, search and management of sensitive and personal data across primary storage and backup data to support critical initiatives.