Consultant reviewing data with customers

Safeguard your business:
ransomware prevention by containment and isolation

Prevent ransomware outbreaks

Cybersecurity experts now agree – with ransomware, it’s not a matter of if, it’s when. Traditional protection practices work. But do they provide 100% prevention, 100% of the time? Of course not. And that’s where our Ransomware Containment Solution, RansomCare, steps in to protect your organization. 
 

Limits operational impact

Outbreaks are identified and stopped at the source, limiting the impact on company-wide productivity.

Protects against financial loss

Immediate response and endpoint isolation stops system-wide data encryption reducing the risk of expensive recovery efforts, legal costs, and ransoms.

Reduces recovery time

An event report details the exact files infected that need restoration, saving valuable time. 

Implements quickly

This agentless, cloud service does NOT install on endpoints or servers for a hassle-free implementation.

Works invisibly

Without local agents or server applications, you experience no impact on network, device, or application performance. 

Gives peace of mind

Protection against ransomware events that bypass perimeter defenses enable you to be more agile, and confident your business data remains safe.
 
 

How it works

 

Active Detection


Artificial intelligence (AI) and machine learning establish a baseline of file activity on your network. RC monitors file changes constantly using heuristics and metadata to detect ransomware encryption the moment it starts. By monitoring file behavior, RC detects both known and unknown ransomware variants.

Immediate Response


An automated containment protocol shuts down the infected endpoint the moment ransomware’s illegitimate encryption begins. Isolation methods used include disable VPN, disable NAC, disable AD-user, and forced shutdown. Alerts are sent to designated security administrators.

Informed Recovery


Your security and recovery team can pull reporting that shows the exact files infected prior to the forced shutdown. This makes restoration from backup simple. And all attack details are captured in a history log for insight into affected files.
 
Image of ransomware dashboard on a projector monitor

A comprehensive last line of protection from ransomware

RC doesn’t compete with your current security, it complements. It also features advanced, integrated tools for comprehensive data protection.

Built-in multi-alerting services

Your team will stay informed with a variety of alert options, including Email, SMS, and even an API into other systems for unified network management.

Seamless integrations

The REST API enables you to integrate into current security applications quickly, with pre-configured scripts that speed implementation. The SharePoint Integrator creates seamless integrations with Office 365 and other cloud applications.

Simple Monitoring

RC creates no network overhead and is OS-agnostic. It works seamlessly alongside virtual environments such as Citrix servers/sessions, Terminal servers/sessions, Hyper-V, VMware, and the cloud, including Azure and Amazon AWS/EC2, SharePoint, Office 365 and Google Drive.

See more about ransomware and cybersecurity

digital transformation technology employee partnership

Get RansomCare for your organization

You can visit our RansomCare product page to purchase and gain added protection against ransomware. Or, you can speak with us to discuss how it would work for your business. 
 

Recommended for you

New World of Work Cyber Security Best Practices Webinar: Cyber Security Best Practices for the New World of Work. Watch now. AMETEK ESP outsources customer service to Ricoh See how Ricoh improved customer service for AMETEK ESP by assuming responsibility for its call center, tech support and warranty fulfillment program. 5 reasons business needs business continuity plan You never notice that you need a business continuity plan until disaster strikes. Here are 5 reasons you should start planning yours today. Best disaster recovery solutions Download our whitepaper "Business Continuity in the Cloud Era" and see how disaster recovery as a service (DRaaS) can help your business thrive.
Cookie Policy

Ricoh uses data collection tools such as cookies to provide you with a better experience when using this site.
You can learn how to change these settings and get more information about cookies here.

Close Chat
HelpChoose A Topic