RansomDefenderRansomDefenderRansomDefenderRansomDefender
  • Product Overview
  • Security Center
    • Latest Ransomware trend
    • Videos on ransomware defense/block
  • Customer Support
    • News & Notice
    • FAQ
    • Contact
    • Download

A Global Specialized Material/Part Company | COMA Technology Co., Ltd.

The Preventive defense against ransomware with the multi-layered defense system

RansomDefender

Ransomware activity detection technology to block new and variant ransomware
4-steps of multi-level defense to defend against ransomware in advance
Automatic backup/restoration for safe data protection
RansomDefender Download (free)

The Preventive defense against ransomware with the multi-layered defense system RansomDefender

RansomDefender

Ransomware activity detection technology to block new and variant ransomware
4-steps of multi-level defense to defend against ransomware in advance
Automatic backup/restoration for safe data protection
RansomDefender Download (free)

RansomDefender/ is an anti-ransomware solution
that detects and prevents suspicious ransomware activities and cleans up automatically.

RansomDefender detects and prevents ransomware activities with 4-steps of multi-level defense system
against all processes of ransomware penetration, execution and file encryption. When a ransomware activity is detected,
the original files are automatically backed up and restored when needed to protect the data.

Real-time ransomware activity detection

Upon detection, the activities used by ransomware are analyzed to block malicious processes automatically.

Automatic backup/restoration

When a ransomware activity is detected, original files are automatically backed up, the ransomware process is blocked and corrupted files are restored automatically.

Self-protection

The RansomDefender program protects itself and prevents the corruption of automatically backed up files.

4-steps of multi-level defense system

Ransomware is prevented with “4-steps of multi-level defense technology”: Scanning for malicious code – Analysis through a decoy file – Activity-based detection – Folder protection.

Folder protection

Important data in the user-designated folders are protected so that they are neither created, modified, nor deleted by ransomware.

Log function

Users can check the detailed log records of major activities and detection.

Multi-level Defense System

4-steps of multi-level defense technology to detect the threat of ransomware precisely and block it in advance at each step.

Malicious code is scanned using the BitDefender vaccine database.
Modification is detected by generating a decoy file to be searched first among other files.
Suspicious ransomware activities such as repetitive file search, file encryption, etc. are detected and blocked.
Files stored in the designated folders are protected from creation, modification, and deletion by ransomware.
Malicious code is scanned using the BitDefender vaccine database.
Modification is detected by generating a decoy file to be searched first among other files.
Suspicious ransomware activities such as repetitive file search, file encryption, etc. are detected and blocked.
Files stored in the designated folders are protected from creation, modification, and deletion by ransomware.

Step 1 – Scanning for malicious code

  • Malicious code is scanned using the BitDefender vaccine database.
  • When a malicious activity is detected, the vaccine function is activated to move the ransomware to the scanning station automatically.
  • Since the execution of ransomware is immediately detected when the malicious activity is detected with the first-step vaccine function, the original files do not become corrupted.

Step 2 –  Analysis through a decoy file

  • A decoy file is generated to detect modification so that the files in the key data storage locations are searched first.
  • Any program that attempts to encrypt the decoy file or change the filename is judged to be ransomware and is consequently blocked and moved to the scanning station.
  • When a malicious activity is detected, the original files could have been corrupted but they can be successfully restored by files backed up automatically.

Step 3 – Activity-based detection

  • If an executed program repeats behaviors similar to malicious activities such as folder list search and file modification, it is judged to be ransomware and blocked.
  • When a malicious activity is detected, the activity-based detection function gets activated and automatically moves the ransomware to the scanning station.
  • When a malicious activity is detected, the original files could have been corrupted but they can be successfully restored by files backed up automatically.

Setp 4 – Folder protection

  • Users can designate the important folders to protect the files in the folders from being modified or deleted by the ransomware.
  • Users can protect all or designated folders, and only permitted programs can access them.

Automatic Backup/Restoration

The original files are automatically backed up when a suspicious ransomware program is detected and corrupted files are
automatically restoredusing the backup/restoration function to protect the user’s data safely.

Installation Environment

Type Minimum Specification Recommended Specification
OS Microsoft Windows 7(SP1) / 8 / 8.1 / 10 Microsoft Windows 7(SP1) / 8 / 8.1 / 10
CPU Dual Core 1.6 GHz processor or higher Intel Core 2 Duo (2 GHz) or higher
Memory (RAM) 1GB or higher 2GB or higher
HDD Free space of 1GB Free space of 2GB

Pictures on Using the Product

Inquiry on RansomDefender

Please contact us online if you have any question on RansomDefender or for inquiries.

 

Anti-ransomware solution | RansomDefender | Clonix Co., Ltd.


8F, Gyungdong Bldg, 4, Sunae-ro 46beon-gil, Bundang-gu, Seongnam-si, Gyeonggi-do, Republic of Korea T E L 070-7090-8280
F A X 070-7016-2380
Copyright ⓒ 2017 Clonix. All rights reserved.
  • clonix
KOR ENG
CEO Nam Seung Li
Corporate
registration number
220-87-00416
Online registration 2007-GyeonggiSuwon-0099
  • Product Overview
  • Security Center
    • Latest Ransomware trend
    • Videos on ransomware defense/block
  • Customer Support
    • News & Notice
    • FAQ
    • Contact
    • Download
RansomDefender