Ransomware protection & remediation
Stop ransomware. Prevent data theft. Reduce recovery time.

The ransomware backdrop
Cyber criminals continue to target companies of all sizes with ransomware attacks, due to the potential illegal earnings available from victims who feel they must pay the ransom to continue serving their customers.
A common misconception is that perimeter, device, and data protection tools, will prevent ransomware breaches from taking place. But such tools were neither designed to understand ransomware behaviour, nor to decrypt the data and devices affected by the attack.
Whilst restoring data from backups and paying an Incident Response company to remediate the attack is the most common alternative to paying the ransom, this stressful and costly process can take weeks, or even months to complete.
It’s time for a different approach; anti-ransomware protection
For network-based attacks, we have perimeter defences. For user devices – endpoint detection and response. For email-borne threats – email security filtering tools.
Ransomware is now so widespread and damaging that the UK Government is proposing a payment prevention scheme for all ransomware victims to engage with the authorities and report their intention to pay a ransomware demand.
We think this necessitates a security layer dedicated exclusively to ransomware protection and remediation, so we scoured the security market for solutions to do just that; which led us to becoming Halcyon’s partner for the UK.
Our Halcyon platform sees the ransomware attacks that evade other security tools and takes immediate action to block the ransomware before it encrypts your data and systems. And in the unlikely event that the attack is successful, Halcyon will synchronously decrypt your affected data and devices to keep your company running smoothly.
How is Halcyon different from other security layers?
Halcyon understands, and only looks for the behaviours of ransomware. It blocks known ransomware threats and detects and stops previously unseen strains. And if any encryption does take place, Halcyon has a copy of the encryption keys and is able to build a decryptor for unlocking your data and systems.
This means, even if the attack manages to evade Halcyon’s preventative measures and locks your data and systems, Halcyon already has the keys needed to efficiently decrypt everything – and does so all at the same time.
The Halcyon detection and recovery process:
Protection playbooks are initiated to stop the attack in real-time.
The keys needed for decrypting data and systems are captured and stored.
The recovery process begins. Artifacts are collected for future use.
The collected keys are used to synchronously decrypt any affected data and systems.
All affected data and systems are restored at the same time.
In the unlikely event of the ransomware evading all security measures, Halcyon’s Incident Response team will work tirelessly to restore your data and systems.