X
Can’t Protect Your Data from Ransomware? Think Again.
At the end of the day, the mission of CrowdStrike is to stop breaches, whether they're e-crime motivated breaches, target attackers, hactivists, terrorist groups that are out there, we want to stop the attackers from getting to your environment using malware or non-malware based attacks to try to steal data, destroy data, wreak havoc on your network. Well, when we look at all the types of threats that are out, you've got the targeted attacks. Obviously we're very much focused on prevented theft of data from our customers.
But you also got the e-crime threats, where there are financial motivated attacks, threats like ransomware and banking trojans and others, that want to steal financial data from your company. Ransomware is one of the most insidious threats that companies out there face today. Aside from targeted attacks, it's really the number one concern that we keep hearing from customers over and over again.
And the reason is that all their data can get encrypted by this malware that is polymorphic-- very, very hard to detect through traditional signature based approaches. And as a result of that, you may lose all your files that may be encrypted. Unless you pay a ransom to a bad guy, and you don't even know if you're going to get your files back as a result of it, you're going to lose it.
In our current release, we're releasing new capabilities with regards to the I-ways that can do both detection and prevention of ransomware. So now it's as easy as turning on the toggle in the UI, and you can be fully protected against threats like CryptoWall. One of the beauties of our solution is because we're looking at the effects of what the malware has to do to actually succeed. When we originally wrote this I-way, new malware has come out since then, new upgrades, new versions.
And we've been able to detect and prevent all those versions without any changes to the original I-way, because the effects of what the malware is doing are still the same. It still needs to destroy your backups. It still needs to encrypt your files and ultimately delete them. So as we're looking for those types of activities, we're able to detect and prevent them before that damage takes place. And as a result, those techniques are extremely resilient against new variants of malware.