By now you've probably heard about new ransomware threats like CryptoWall, which encrypts your data and demands payment to unlock it. These threats are delivered via malicious email attachments or websites, and once they execute and connect to an external command and control server, they start to encrypt files throughout your network. Therefore, spotting infections quickly can limit the damage.
AlienVault USM uses several built-in security controls working in unison to detect ransomware like CryptoWall, usually as soon as it attempts to connect to the hackers’ command and control server. How does it all work? Join us for a live demo that will show how AlienVault USM detects these threats quickly, saving you valuable clean up time by limiting the damage from the attack.
- How AlienVault USM detects communications with the command and control server
- How the behavior is correlated with other signs of trouble to alert you of the threat
- Immediate steps you need to take to stop the threat and limit the damage
Watch It Now!
VP, Product Management
Jim Hansen is the VP of Product Management for AlienVault. He is responsible for leading AlienVault security technology and product strategy, innovation, research, and development. With more than 15 years in the technology and security space, Jim brings a deep passion for creating great products that deliver compelling value for customers. Prior to joining AlienVault in May 2012, Jim led the strategy and delivery to market of products for Splunk, BigFix (now IBM), and others.