EFFECTIVE ANTI-RANSOMWARE PROTECTION
There is no secret the malware landscape is very dynamic, and thousands of samples emerge every day. Ranstop is designed to handle any known or unknown ransomware. For this purpose, it uses a very efficient detection engine based on behavior analysis and is continuously tested against new threats.
REAL-TIME FILE PROTECTION
Fighting malware is a cat and mouse game, and Ranstop is prepared to handle both wins and losses. Therefore, apart from the main engine, it also includes a real-time backup component that stores different file versions in secure locations. This way it makes sure users don’t lose their critical data in any circumstances.
LESS OR NO DOWNTIME EVENTS
In the event of an attack, without good anti-ransomware protection, data recovery can be very painful. Even with the help of backup solutions, getting files back and making sure the ransomware is not active anymore on the network can take a lot of time. Ranstop can mitigate this aspect. Besides blocking the threat, it also quarantines its related files to prevent further infections. Moreover, it can automatically isolate the affected machines.
EASY TO DEPLOY IN COMPANY NETWORKS
To efficiently protect a company against ransomware, one needs to protect both servers and endpoints. However, if there are several machines in the network, deploying and configuring products on each system can be challenging. Ranstop makes this task easier for administrators by offering automatic deployment and configuration features based on Active Directory settings.
How Ranstop anti-ransomware works
Ranstop has a special design based on two distinct components that work together to keep systems safe from ransomware:
File recovery engine
The protection engine is responsible for detecting and stopping ransomware. It does not use signatures but monitors all processes to detect any sign of activities that might compromise files. In the event of an attack, the protection engine automatically notifies the user, instructs the recovery engine to restore the affected files, and can isolate the machine.
The recovery engine uses a patent-pending file recovery technology that acts as a safety net to ensure users can get their critical files back, even in the worst scenarios, without paying ransom to the attackers. To benefit from this protection, the application must be installed on a clean machine, before the attack. This module relies on real-time, backup functionality that automatically identifies and saves the contents of the...
The SiteKiosk configuration tool will guide you through every step of the configuration. No programming skills required.
Session reset after idle time
A session will be terminated automatically after a specified idle time. All browser and application windows will be closed, all user traces will be deleted (history, cookies, and cache), and the SiteKiosk browser returns to the Start Page.
Internet Content Filter
The content filter identifies websites that may contain inappropriate content in real time and blocks them accordingly.
Customizable user interface
The browser interface can be customized to meet your individual requirements since it is based on open source web technologies.
SiteKiosk provides a great selection of on-screen keyboards which can also be displayed or hidden for certain URLs or automatically appear when text input is required.
Restricted surfing area
The surfing area allows you to define which URLs the user is allowed to access. You can, for instance, restrict the user's access to only your organization's websites.
Display in fullscreen mode
With the fullscreen mode feature, you can either show all URLs or only the ones you have selected in fullscreen mode.
SiteKiosk allows you to charge for using the computer. A variety of cash acceptors, credit card readers and credit card gateways are supported.
Windows 10 32/64bit, Windows 8.x 32/64bit, Windows 7 32/64bit, Embedded POSReady 7, Embedded Standard 7, Windows Embedded 8 Industry.
Note: Windows RT is not supported.
Internet Explorer 10 or higher
Intel or AMD x86 CPU at > 1 GHz (2.0 GHz or more recommended)
2 GB RAM (4 GB recommended)
New Technology File System (NTFS)
1024 x 768 px or higher at 32 bit color depth