Businesses traditionally enclose all of their data and devices within a perimeter, comprised of a combination of firewall, email scanners and web filtering solutions.
This screens everything that comes into the network, then blocks or removes anything that is flagged as malicious. The business should then be able to trust that it will keep out invaders and that all activity within it is safe. But this is no longer the case.
Today’s business consists of multiple endpoints, often managed by public cloud providers, and employees accessing their organisation off site. This means that malicious activity has more chances than ever to break in.
If your system is infiltrated, you need a proactive solution to defend it.
Our human immune system is a great metaphor for this: if we’re unlucky enough to fall ill, our white blood cells rush to the rescue and fight off the infection. This, broadly speaking, is how a containment-based defence system works for your business. It supplements your firewall by quickly identifying and containing ransomware attacks, stopping it from spreading and highlighting affected files for easy recovery.
Containment solutions are designed to put you on the front foot.
By attacking any viruses that manage to break through your perimeter defence, containment will ensure they don't take hold in your system.
They use built-in scripts to hunt down and contain any intrusion, locking down any files and devices that have been infected.
The most effective products currently on the market are military graded – such as Ricoh’s Ransomware Cyber Security Practice, currently used by both the US and UK governments – which offer both managers and IT teams the very highest level of confidence against ransomware and cybercrime.