Autonomous Hardware

  • Anti-Ransomware

    ransomware attack can be divided into three stages: "before, during and after". From the point of view of attack means, it is not difficult to find that the unrepaired vulnerability is like an open door, which becomes an important breakthrough for ransomware to infiltrate the enterprise defense system. Finding unknown vulnerabilities is a challenge. Effectively blocking the use of unknown vulnerabilities and cutting off the blackmail virus in its infancy is the basis for preventing blackmail attacks. Combined with the transmission mode and attack process of ransomware attacks, targeted anti-ransomware is introduced. For ransomware attacks, kernel-level comprehensive monitoring is carried out from two dimensions of system vulnerability repair and blocking vulnerability exploitation, from multiple dimensions of network, file, process and registry, and abnormal behaviors and calls are intercepted, thus preventing the occurrence of vulnerability exploitation attacks including 0day. In addition, the industrial anti-ransomware system detects the network packets and behaviors flowing into the machine, and can intercept vulnerability attacks at the network layer according to policies to block external attacks. Anti-ransomware products have four functions: evaluation, reinforcement, protection, backup and recovery, which can accurately block blackmail attacks and improve the security of IT infrastructure.

  • Customer Value

    1.Data protection:anti-ransomware software can effectively prevent critical enterprise data from being maliciously encrypted and protect business operations from being affected.

    2.Financial Savings:By preventing ransomware attacks, businesses avoid paying high ransoms and reduce potential financial losses.

    3.reputation maintenance:anti-ransomware helps businesses protect customer information and avoid reputational damage due to data breaches.

    4.Business Continuity:with effective anti-ransomware software, enterprises can respond quickly when attacks occur, ensuring uninterrupted business

    Product Characteristics

    1.Assess risks and reduce network exposurechecks the security baseline of the host, evaluates whether the terminal has risks such as exploitable vulnerabilities, weak passwords, and open unsafe ports, discovers security risks in time before security incidents occur, evaluates regularly, and determines the security risk level of the host according to the evaluation results.

    2.system reinforcement, blocking propagation entranceEffective protection for disk boot area, system registry, key configuration items, etc., prevents ransomware from using host system risks to penetrate and spread, and regularly reinforces the system according to the risk assessment results to continuously reduce system security risks.

    3.Built-in antivirus engine, found known ransomwarevirus feature matching is one of the most common ransomware killing technology, through the sample feature matching, for known viruses, this method is the simplest and most direct method. The heuristic scanning technique is actually a dynamic height or decompiler implemented in a specific way to gradually understand and determine the real motivation of the relevant instruction sequence by decompilating it. For virus samples with shells, regular anti-virus methods cannot be effectively found and processed, and the problem of shells is usually handled by dynamic unshelling of virtual machines.

    4.blackmail behavior detection, blocking unknown blackmail attacksransomware software has typical behaviors such as disk/file system traversal, ending process, clearing service, encrypting files, encrypting disks, volume shadow deletion, backup deletion, etc. By detecting typical behaviors of ransomware, ransomware intrusion and destruction can be effectively found, blackmail process can be blocked or terminated in time, and system security can be protected.

    5.blackmail virus trapping, active lure ransomware appearedransomware typically traverses the disk, reading and writing files. Some files are randomly generated on the disk. These files have no meaning for normal applications and system processes and are generally not accessed. Monitoring the access of bait files, if there is a program to operate on these trap files, it is very likely to be a ransomware attack.

    6.regular data backup to ensure uninterrupted business operationAnti-Ransomware supports local data backup and external professional backup recovery system, local data backup, protection of core data, data stored in the local designated disk, no additional cost.

  • Specifications

    Product Model ARS-W
    boot time Anti-Ransomware startup causes a delay in system boot time of less than 10 seconds
    memory footprint occupies less than 20M of system memory during normal operation.
    CPUoccupied operating system startup and large application startup, the CPU usage does not increase by more than 5%
    Operating System Impact has no effect on operating system functions
    memory leak The software runs without memory leaks, can run stably for a long time, and will not affect the normal functions of the host
    Support windows System Operating System Support Win XP, Win7, Win8, Win10, Win11, Windows2003 Server, Windows2008 Server, Windows2012 Server, Windows2016 Server, Windows2019 Server, including 32-bit and 64-bit systems
    disc size (width/height/depth) 140mm * 190mm * 20mm
    Weight 20g

  • industrial control host guard

    Industrial control host guard is a protective product tailored for industrial control host. It can monitor the process status of the host, USB port status, the use of file load execution control, mandatory access control, integrity protection and other technical means to enhance the security function of the operating system, to make up for the general operating system security is not high defects, improve the security protection ability of the operating system, to build a strictly controlled host security environment.

  • Customer Value

    1.Whitelist protection for trusted applicationsis based on a trusted whitelist mechanism, application signature, certificate and other inspection mechanisms, any program is checked for features before loading, and only programs that meet the whitelist features can enter the running state, thus terminating malicious programs before they are started..

    2.Whitelist control of removable storage mediarestrict unauthorized USB peripherals to run on a specific host, allowing only authorized trusted USB devices to be used on the host, defending against attacks using removable storage media types. Mobile storage media security policy, can be subdivided into read and write, prohibit, etc..

    3.Integrity protection of specific objectsapplication integrity protection and operating system integrity protection to protect the operating environment and process space running security, to prevent the operating environment from being tampered with and backdoor use, buffer overflow.

    4.attack protection of industrial control environmentcan effectively prevent earthquake net, Havex, sand worm and other industrial control viruses and their variants, the use of mobile storage media on the industrial control host can also be prevented.

    1) System reinforcementIntegrity protection of files in the specified directory to prevent malicious programs from tampering or misoperation to inject, modify or delete target files; can specify registry information to protect its integrity to prevent tampering; one-click to block various blackmail viruses and their variants.

    2) Application Protectionthe application whitelist and prohibit the loading and execution of programs other than the whitelist. Program integrity check: confirm the integrity of the program through fingerprint data such as certificate, version, check value, etc., so as to prevent the program from being infected by virus or tampered with from running.

    3) White list managementwhite list generation, through the automatic scanning function, the establishment of white list; import and export white list, provide the import and export function of white list.

    4) Whitelist Updateyou need to run new programs, add new network services and USB devices, you can easily update these new settings to the whitelist.

    5) security U diskMobile storage devices based on encryption chips need to be used with industrial control host guards. Security U disk has two partitions: public area and encryption area. The data in the public area is stored in plaintext and can be read and written by all machines. The area is used to exchange data with the external network. The data in the encryption area can only be read and written by machines equipped with host guards to realize the exclusive use of the area.

    6) Mobile storage media controlmobile storage media connections can generate security events; mobile storage media can be whitelisted, read, write, and disable authorization management; mobile storage media connections and data copies produce audit records.

    Product Characteristics

  • Specifications

    Product Model ISG-200
    Normal Operation Resource Usage normal operation state CPU consumption is not more than 1%, memory consumption is not more than 20MB
    Curing Process Resource Occupancy CPUusage does not exceed 50%, memory usage does not exceed 40MB
    Compatibility

    supports 32-bit and 64-bit Windows/Linux operating systems and can run on the following operating systems:

    Windows:Windows XP/7/8/10/11,Windows Server 2003/2008/2012/2016 in Chinese and English

    supports Centos, Redhat, Ubuntu and other Linux operating systems

    supports domestic operating systems such as Concination, Winning Kirin, Galaxy Kirin, Kirin Principal, and New Start.
    disc size (width/height/depth) 140mm * 190mm * 20mm
    Weight 20g