SlideShare a Scribd company logo
1 of 2
Download to read offline
enSilo’s Central Management
provides an alert on the blocked
exfiltration attempt.
By focusing on exfiltration, only
a single alert appears per one
active threat.
Real-time, exfiltration
prevention platform
Ongoing uptimeRansomware prevention
enSilo guarantees ongoing
access to files by preventing
ransomware from locking data.
For example, preventing the
encryption by cryptoware
such as CryptoWall,
CryptoLocker, and TeslaCrypt.
enSilo secures your data
and allows working even in a
compromised environment.
Prevent productivity inhibitors
by allowing users to continue
working as usual during
investigation and remediation of
advanced threats.
Still unplugging devices on any attack
indicator?
Carry on business-as-usual and keep working securely even on a
compromised device by preventing the consequences of a cyber-attack.
 
 
no exit
Internet Internet
Internet Internet
The company’s platform prevents data exfiltration and the other major consequences of
targeted attacks, including ransomware attacks, and allows users to continue working safely in
compromised environments.
enSilo offers a real-time, exfiltration prevention platform against advanced attacks.
Step 1:
An enSilo Collector on
the computing device
collects OS metadata.
1 2 3 4
STOP
Internet
On connection establishment
Step 2:
Upon connection
establishment, the
Collector sends a
snapshot of the OS
connection establishment
to the enSilo Core,
enriched with the OS
metadata.
How enSilo works:
Prevents exfiltration - already on communication establishment
Enables employees to continue working even when their device is infected
Generates a single alert per an exfiltration attempt
Blocks the encryption of cryptoware, including CryptoWall and CryptoLocker
Application and protocol-agnostic
Agnostic to encryption or content
Negligible network and processing footprint
Flexible deployment modes – on-premises, Cloud or hybrid
Integrates with other security and SIEM solutions
Step 3:
Using enSilo’s patented
technology, the Core
analyzes the collected
OS metadata and
enforces the anti-
exfiltration policies.
Step 4:
Only legitimate
connections are able
to communicate
outbound.
Advantages
company/enSilo
@enSiloSec
www.ensilo.com
contact@ensilo.comSILO Your Data From Threat Actors










More Related Content

What's hot

Group G-week14
Group G-week14Group G-week14
Group G-week14s1160093
 
Network security 22.1.18
Network security 22.1.18Network security 22.1.18
Network security 22.1.18Philip_
 
Intel McAfee DeepSAFE Technology
Intel McAfee DeepSAFE TechnologyIntel McAfee DeepSAFE Technology
Intel McAfee DeepSAFE TechnologyCan Your Security
 
Top 10 Tips to Protect Your Data When Working From Home
Top 10 Tips to Protect Your Data When Working From HomeTop 10 Tips to Protect Your Data When Working From Home
Top 10 Tips to Protect Your Data When Working From HomeAmar Kanagaraj
 
ME Information Security
ME Information SecurityME Information Security
ME Information SecurityMohamed Monsef
 
Detection of running backdoors
Detection of running backdoorsDetection of running backdoors
Detection of running backdoorsmridulahuja
 
How To Secure Your Print Management
How To Secure Your Print ManagementHow To Secure Your Print Management
How To Secure Your Print ManagementUniPrint.net
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Ferellica
 
Managing i.t security
Managing i.t securityManaging i.t security
Managing i.t securityOriginalGSM
 
3.2.2 security measures
3.2.2 security measures3.2.2 security measures
3.2.2 security measureshazirma
 
Security Measures
Security MeasuresSecurity Measures
Security Measureshanna91
 
GroupJweek14
GroupJweek14GroupJweek14
GroupJweek14s1130145
 
Metasploit
MetasploitMetasploit
Metasploithenelpj
 
Impact of ict on society
Impact of ict on societyImpact of ict on society
Impact of ict on societyRizwan Razman
 

What's hot (20)

Stuxnet
StuxnetStuxnet
Stuxnet
 
Group G-week14
Group G-week14Group G-week14
Group G-week14
 
Network security 22.1.18
Network security 22.1.18Network security 22.1.18
Network security 22.1.18
 
Stuxnet flame
Stuxnet flameStuxnet flame
Stuxnet flame
 
Intel McAfee DeepSAFE Technology
Intel McAfee DeepSAFE TechnologyIntel McAfee DeepSAFE Technology
Intel McAfee DeepSAFE Technology
 
Top 10 Tips to Protect Your Data When Working From Home
Top 10 Tips to Protect Your Data When Working From HomeTop 10 Tips to Protect Your Data When Working From Home
Top 10 Tips to Protect Your Data When Working From Home
 
ME Information Security
ME Information SecurityME Information Security
ME Information Security
 
Detection of running backdoors
Detection of running backdoorsDetection of running backdoors
Detection of running backdoors
 
How To Secure Your Print Management
How To Secure Your Print ManagementHow To Secure Your Print Management
How To Secure Your Print Management
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)
 
Computer security
Computer securityComputer security
Computer security
 
Managing i.t security
Managing i.t securityManaging i.t security
Managing i.t security
 
3.2.2 security measures
3.2.2 security measures3.2.2 security measures
3.2.2 security measures
 
I Heart Stuxnet
I Heart StuxnetI Heart Stuxnet
I Heart Stuxnet
 
Taylor 1
Taylor 1Taylor 1
Taylor 1
 
Security Measures
Security MeasuresSecurity Measures
Security Measures
 
GroupJ_week14
GroupJ_week14GroupJ_week14
GroupJ_week14
 
GroupJweek14
GroupJweek14GroupJweek14
GroupJweek14
 
Metasploit
MetasploitMetasploit
Metasploit
 
Impact of ict on society
Impact of ict on societyImpact of ict on society
Impact of ict on society
 

Similar to enSilo-in-a-Nutshell

Cscu module 01 foundations of security
Cscu module 01 foundations of securityCscu module 01 foundations of security
Cscu module 01 foundations of securitySejahtera Affif
 
Computer Safety and Ethics.pptx
Computer Safety and Ethics.pptxComputer Safety and Ethics.pptx
Computer Safety and Ethics.pptxKhristine Botin
 
Open Threat Management Platform in USA.pptx
Open Threat Management Platform in USA.pptxOpen Threat Management Platform in USA.pptx
Open Threat Management Platform in USA.pptxCompanySeceon
 
Cisco amp for networks
Cisco amp for networksCisco amp for networks
Cisco amp for networksCisco Canada
 
Edu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfEdu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfANJUMOHANANU
 
Advanced Business Endpoint Protection
Advanced Business Endpoint ProtectionAdvanced Business Endpoint Protection
Advanced Business Endpoint ProtectionDan Buckley
 
Advanced Business Endpoint Protection
Advanced Business Endpoint ProtectionAdvanced Business Endpoint Protection
Advanced Business Endpoint ProtectionDan Buckley
 
Advanced business endpoint protection (1)
Advanced business endpoint protection (1)Advanced business endpoint protection (1)
Advanced business endpoint protection (1)Dan Buckley
 
Network and Security-2.pptx
Network and Security-2.pptxNetwork and Security-2.pptx
Network and Security-2.pptxDhanvanthkesavan
 
Endpoint Protection as a Service (EPaaS)
Endpoint Protection as a Service (EPaaS)Endpoint Protection as a Service (EPaaS)
Endpoint Protection as a Service (EPaaS)PT Datacomm Diangraha
 
The next generation of IT security
The next generation of IT securityThe next generation of IT security
The next generation of IT securitySophos Benelux
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsAaron ND Sawmadal
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsAaron ND Sawmadal
 
The Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day RealityThe Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day RealityLumension
 
Top Cyber Threat Intelligence Tools in 2021.pdf
Top Cyber Threat Intelligence Tools in 2021.pdfTop Cyber Threat Intelligence Tools in 2021.pdf
Top Cyber Threat Intelligence Tools in 2021.pdfinfosec train
 
Product overview-eset-file-security
Product overview-eset-file-securityProduct overview-eset-file-security
Product overview-eset-file-securityÜstün Koruma
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture NotesFellowBuddy.com
 

Similar to enSilo-in-a-Nutshell (20)

Cscu module 01 foundations of security
Cscu module 01 foundations of securityCscu module 01 foundations of security
Cscu module 01 foundations of security
 
Computer Safety and Ethics.pptx
Computer Safety and Ethics.pptxComputer Safety and Ethics.pptx
Computer Safety and Ethics.pptx
 
Open Threat Management Platform in USA.pptx
Open Threat Management Platform in USA.pptxOpen Threat Management Platform in USA.pptx
Open Threat Management Platform in USA.pptx
 
Sophos intercept-x
Sophos intercept-xSophos intercept-x
Sophos intercept-x
 
Cisco amp for networks
Cisco amp for networksCisco amp for networks
Cisco amp for networks
 
Ransomware
RansomwareRansomware
Ransomware
 
Edu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfEdu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdf
 
Advanced Business Endpoint Protection
Advanced Business Endpoint ProtectionAdvanced Business Endpoint Protection
Advanced Business Endpoint Protection
 
Advanced Business Endpoint Protection
Advanced Business Endpoint ProtectionAdvanced Business Endpoint Protection
Advanced Business Endpoint Protection
 
Advanced business endpoint protection (1)
Advanced business endpoint protection (1)Advanced business endpoint protection (1)
Advanced business endpoint protection (1)
 
Network and Security-2.pptx
Network and Security-2.pptxNetwork and Security-2.pptx
Network and Security-2.pptx
 
Endpoint Protection as a Service (EPaaS)
Endpoint Protection as a Service (EPaaS)Endpoint Protection as a Service (EPaaS)
Endpoint Protection as a Service (EPaaS)
 
The next generation of IT security
The next generation of IT securityThe next generation of IT security
The next generation of IT security
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
 
The Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day RealityThe Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day Reality
 
Top Cyber Threat Intelligence Tools in 2021.pdf
Top Cyber Threat Intelligence Tools in 2021.pdfTop Cyber Threat Intelligence Tools in 2021.pdf
Top Cyber Threat Intelligence Tools in 2021.pdf
 
Insecurity vssut
Insecurity vssutInsecurity vssut
Insecurity vssut
 
Product overview-eset-file-security
Product overview-eset-file-securityProduct overview-eset-file-security
Product overview-eset-file-security
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
 

enSilo-in-a-Nutshell

  • 1. enSilo’s Central Management provides an alert on the blocked exfiltration attempt. By focusing on exfiltration, only a single alert appears per one active threat. Real-time, exfiltration prevention platform Ongoing uptimeRansomware prevention enSilo guarantees ongoing access to files by preventing ransomware from locking data. For example, preventing the encryption by cryptoware such as CryptoWall, CryptoLocker, and TeslaCrypt. enSilo secures your data and allows working even in a compromised environment. Prevent productivity inhibitors by allowing users to continue working as usual during investigation and remediation of advanced threats. Still unplugging devices on any attack indicator? Carry on business-as-usual and keep working securely even on a compromised device by preventing the consequences of a cyber-attack.     no exit Internet Internet Internet Internet The company’s platform prevents data exfiltration and the other major consequences of targeted attacks, including ransomware attacks, and allows users to continue working safely in compromised environments. enSilo offers a real-time, exfiltration prevention platform against advanced attacks.
  • 2. Step 1: An enSilo Collector on the computing device collects OS metadata. 1 2 3 4 STOP Internet On connection establishment Step 2: Upon connection establishment, the Collector sends a snapshot of the OS connection establishment to the enSilo Core, enriched with the OS metadata. How enSilo works: Prevents exfiltration - already on communication establishment Enables employees to continue working even when their device is infected Generates a single alert per an exfiltration attempt Blocks the encryption of cryptoware, including CryptoWall and CryptoLocker Application and protocol-agnostic Agnostic to encryption or content Negligible network and processing footprint Flexible deployment modes – on-premises, Cloud or hybrid Integrates with other security and SIEM solutions Step 3: Using enSilo’s patented technology, the Core analyzes the collected OS metadata and enforces the anti- exfiltration policies. Step 4: Only legitimate connections are able to communicate outbound. Advantages company/enSilo @enSiloSec www.ensilo.com contact@ensilo.comSILO Your Data From Threat Actors         