Can we disable ransomware launched as a SYSTEM on thousands of machines at the same time? Cybercriminals Don’t Take a Break As everyone knows, there is currently a resurgence of attacks with ransomware all over the world. Cyber criminals have not made a truce despite the Covid-19 pandemic, and some
For about thirty years, security was limited to a few elementary axes, relatively simple but effective in the fight against standard everyday threats. After the summer of 2003 and the MSBlast worm that contaminated millions of Microsoft operating systems, three new Windows security options became essential: system updates, firewalls and a running antivirus.
This model emerged as the “dominant design” of cybersecurity: a firewall and a few tools for the periphery, an antivirus and some options for inside the infrastructure. The Internet has become populated with “crunchy” networks, i.e. with a “hard” shell (perimeter security) and “soft” inside, not to mention the interconnection of all systems: telephones, connected objects, etc. The Internet itself has also become a “crunchy” network. A technological debt of cybersecurity exists, and all TEHTRIS solutions are precisely there to be able to fight and help protecting assets efficiently.
TEHTRIS EDR is one of the pioneers and creators of the EDR wave of the future. That wave aims to install thousands of EDR agents in less than 24 hours, can detect stealthy espionage operations without weapons or malware, knows the techniques used by hackers and builds the answers in advance.
TEHTRIS EDR is a solution delivered in SaaS mode, through the cloud, with a desire to anticipate, prevent, detect and react at the cybersecurity level. We believe in the convergence of the EDR and EPP technologies, for a common and calculated mission of endpoint protection, with combined technical functions. TEHTRIS EDR is also part of a logical transformation, by proposing a TEHTRIS EPP agent as well, in order to streamline the technological layers: installation, configuration, maintenance, consistency in the logs and so on.