• News
  • Security
  • Products
  • About Seqrite
Seqrite Blog Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Products • Ransomware • Security  /  EPS Enterprise Suite earns AVLab Award for real-time ransomware protection
22 November 2016

EPS Enterprise Suite earns AVLab Award for real-time ransomware protection

Written by Suhita Mazumdar
Suhita Mazumdar
Products, Ransomware, Security
Estimated reading time: 3 minutes

In October 2016, AVLab protection test against ransomware threats gave a 100% effectiveness score to Seqrite Endpoint Security (EPS) Enterprise Suite Edition. 28 malicious software files of crypto-ransomware were used to test the effectiveness of the solution in terms of behavioral detection rate and comprehensive real-time protection against ransomware infections.

Crypto-ransomware is considered to be one of the nastiest threats that is spreading like wildfire from offices to homes and has recently shifted its focus to small and medium businesses targeting more Windows file types than ever.

The history of ransomware and the rise of crypto-ransomware

Ransomware has a surprisingly long history and has been the most potent cyber threat since 2005. It belongs to a type of malicious software that prevents or restricts users from accessing an operating system. Over the years, two distinct varieties of ransomware have remained consistent: crypto and locker based.

Crypto-ransomware is ransomware variants that encrypts files and folders, hard drives etc. on the victim’s machine using strong cryptography. The user is then notified that their files were encrypted and demands ransom to decrypt them. Attempts to recover files or declining to pay have often resulted in complete loss of information. The Windows-only ransomware has held rapt the attention of organizations worldwide since its formal appearance in September 2013. The other ransomware variant Locker-ransomware only locks users out of their devices and targets Android devices.

Why crypto-ransomware causes problem to SOHOs and SMEs?

crypto-ransomware-facts

Unlike traditional malware threats, crypto-ransomware is particularly nasty because users are in danger of losing their personal files forever. Cybercriminals have recently shifted their focus on small and medium enterprises. The objective is obvious-Money. Confidential and sensitive company information is too valuable to be written off and most organizations do not have a well-defined security infrastructure in place to prevent the loss and theft of company data. SMEs are unprepared for advanced attacks and that makes the task of cybercriminals easy as some percent of the victims will pay a ransom anyway.

AVLab protection test against ransomware threats

The objective of AVLab test was to indicate the best solution for the real-time protection against crypto-ransomware to home users and small and medium businesses. More than 28 malicious software files of crypto- ransomware were collected in order to test the protection effectiveness of most popular antivirus applications. The Lab prepared an image of Windows 10 Professional x64 with the latest updates dated the day before the test. This way, all products were tested in the identical test environment and had access to the Internet.

Seqrite EPS Enterprise Suite Edition was amongst the 17 security software applications tested under the category of small and medium businesses. The results of tested applications is given below:

ransomware-blog-picture

Seqrite EPS Enterprise Suite Edition was 100% effective in detecting and blocking malicious files of crypto-ransomware thus earning AVLab BEST+++ Award. Download the full AVLab report here.

About Seqrite EPS Enterprise Suite:

Enterprise Suite provides advanced endpoint security and data protection bundled in one solution. A combination of Enterprise Total and Data Loss Prevention (DLP), the solution comes with new and enhanced features such as Patch Management, Advanced Device Control and more. Enterprise Suite not only delivers and fixes security vulnerabilities but also combines malware, device, browsing, phishing and data protection-all in one solution.

For more information on Enterprise Suite Edition and anti-ransomware features visit http://bit.ly/2bH0VEh

 Previous Post5 Tips for Preventing Ransomware
Next Post  5 Biggest Cyberattacks of 2016
Suhita Mazumdar
About Suhita Mazumdar

A mind that always searches for some purpose to enlighten others through the power of words defines Suhita Mazumdar. Suhita loves to read and write on IT Security,...

Articles by Suhita Mazumdar »

Related Posts

  • Thanos Ransomware adopts hyper-weaponized RIPlace tactics — collects huge pay-offs.

    Thanos Ransomware Evading Anti-ransomware Protection With RIPlace Tactic

    November 18, 2020
  • Hackers ransack businesses by riding on the modern-day Trojan Horse.

    PonyFinal Ransomware dubbed by many as the modern-day Trojan horse.

    August 26, 2020
  • Is your Router exposed to cyber threats

    Is your router exposed to cyber threats? Here is how to safeguard it.

    July 30, 2020

No Comments

Leave a Reply.Your email address will not be published.

Cancel reply

CAPTCHA Image
Refresh Image

Popular Posts

  • RAT used by Chinese cyberspies infiltrating Indian businesses RAT used by Chinese cyberspies infiltrating Indian businesses December 18, 2020
  • How can EdTech companies deal with rising security challenges? How can EdTech companies deal with rising security challenges? December 24, 2020
  • Benefits of having Intrusion Prevention/Detection System in your enterprise Benefits of having Intrusion Prevention/Detection System in your enterprise February 15, 2018

Featured Authors

  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Viraj Talikotkar
    Viraj Talikotkar

    Viraj is a Lead Technical Writer at Quick Heal Technologies. He is always on...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..

Latest Posts

  • Are we prepared against risks generating from the IoT revolution?

    Are we prepared against risks generating from the IoT revolution?

    January 15, 2021
  • Proactiveness is the key to resolving hybrid cloud’s security challenges

    Proactiveness is the key to resolving hybrid cloud’s security challenges

    January 6, 2021
  • How can EdTech companies deal with rising security challenges?

    How can EdTech companies deal with rising security challenges?

    December 24, 2020

Stay Updated!

Topics

Antivirus For Linux (10) Antivirus For Server (9) BYOD (9) Cyber-attack (31) cyber-attacks (56) cyberattacks (12) Cybersecurity (274) cyber security (25) Cyber threat (29) cyber threats (44) Data (10) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (102) Enterprise security (14) EPS (9) Exploit (12) firewall (11) hackers (9) incident response plan (9) IoT (10) malware (58) malware attack (22) malware attacks (12) MDM (25) mobile device management (9) Network security (18) Patch Management (12) phishing (16) Ransomware (54) ransomware attack (29) ransomware attacks (30) ransomware protection (12) Seqrite (24) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (10)

Products

  • Endpoint Security (EPS)
  • Seqrite Encryption Manager
  • Seqrite Endpoint Security Cloud
  • Cloud Security
  • Seqrite mSuite
  • Seqrite MobiSMART
  • Unified Threat Management
  • Seqrite Secure Web Gateway
  • Antivirus for Server
  • Antivirus for Linux

Resources

  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies

About Us

  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom

Archives

  • By Date
  • By Category

© 2020 Quick Heal Technologies Ltd. (Formerly Known as Quick Heal Technologies Pvt. Ltd.) Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.