Cyber security is one of the most important subjects at the moment especially with GDPR having just come in to force. We offer a product that has the power to rollback maliciously encrypted data with multiple protection capabilities.
A New Approach To Cyber Security
Custodian360 is a unified endpoint offering with multiple protection capabilities. With a next-generation malware protection engine powered by SentinelOne, Custodian360 applies advanced threat protection techniques, such as machine learning and system rollback. Custodian360 also leverages the deep inspection of encrypted TLS traffic allowing full visibility with no infrastructure adds or changes. Custodian360 can be managed from a single cloud-based management console and can be easily added to any client deployed either through Microsoft Active Directory group policies or any other third-party software deployment techniques. Custodian360 delivers a zero-touch silent experience for deployment on unprotected clients.
Continuous behavioural monitoring
Continuous behavioural monitoring of the client helps create a complete profile of file activity, application and process activity, and network activity. This allows for protection against both file-based and file-less malware and delivers a 360-degree attack view with actionable intelligence relevant for investigations.
Multiple layered, heuristic-based techniques
Multiple layered, heuristic-based techniques for protection include cloud intelligence, advanced static analysis and dynamic behavioural protection. These helps protect against and remediate known and unknown malware.
No need for regular scans or periodic updates
No need for regular scans or periodic updates enables the highest level of protection at all times without hampering user productivity.
Unique rollback capabilities
Unique rollback capabilities also support policies that not only remove the threat completely but also restore a targeted client to the state before the malware activityinitiated . This eliminates the need for manual restoration in the case of ransomware and similar attacks.