eScan Technologies

eScan Launches new TSPM Technology to block RDP hacking attacks

With the growing complexity of cyber-attacks, enterprises are spending millions to avoid cyber-crime. However, due to bad security practices such as usage of elementary passwords for system access creates most vulnerable opportunity for cyber criminals. In such scenarios cyber criminals use brute force attack to take control of network. Based on “National Exposure Index” report by Rapid7, 73% of Indian RDP servers are exposed to bruteforce attacks, and ranks 18th on the Global Index.

Know More

Proactive Behavioral Analysis Engine (PBAE) Technology

Proactive Behavioral Analysis Engine monitors the activity of all processes on Local Machine and when it encounters any activity or behavior that matches to a ransomware, a red flag is raised and the process is blocked. In case if an infected system tries to access network share of a protected system and encrypt/ modify files residing on that system, PBAE will immediately invalidate the network session.

PBAE is successfully blocking ransomware attacks such as Locky, Zepto, Crysis and many more. Additionally, by analyzing the data collected through our Cloud (ESN) we are able to successfully detect and mitigate thousands of ransomware attacks on every system that is protected with eScan Worldwide.

MicroWorld Winsock Layer (MWL) Technology

The MicroWorld Winsock Layer technology is a revolutionary technology that resides on the Winsock Layer of the operating system and scans all the incoming and outgoing traffic from the Internet and checks for any security violating content. If the data packet is clean it is passed or else it is removed before it reaches the application layer.

Know More

Host Intrusion Prevention System (HIPS)

The Host Intrusion Prevention System (HIPS) monitors all the network activities on the system. This technology helps in detecting when a rootkit, keylogger, spyware or Trojan is installed on the system. HIPS technology not only warns the user about any intrusion, but, also blocks it.

HIPS technology uses both signature based detection as well as advanced heuristics antivirus algorithm. You can also set policies specifying the behavior of operating systems or applications. The attacks that HIPS protect against include viruses, spam, spyware, worms, Trojans, keyloggers, bots, rootkits, and Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks.

Domain & IP Reputation Check

The Domain & IP Reputation Check technology verifies the credibility of Web domains by tracking any indication of suspicious activities on the web page. This technology also verifies the integrity of the IP address by comparing it with a list of known email senders and by using a dynamic service that assesses email senders reputation in real-time. Emails received from domains with malicious activities are not accepted.

Non Intrusive Learning Pattern (NILP) Technology

NILP works on the basis of Artificial Intelligence where in, it learns user's behavior and then takes an informed decision in the background and help identify and classify mails on behalf of the users whether the mails are spam or ham.

Live Chat