Managing ransomware attacks

SES Evolution protects your organization’s workstations from ransomware attacks. It can detect operations that ransomware applications usually perform on a system, such as file modification or encryption, and quickly stop them. If a workstation is under attack, SES Evolution logs allow you to find out whether files have been encrypted, and which ones. The procedure below explains how to retrieve lost data.

SES Evolution‘s creation of shadow copies cannot replace regular backups. You must have a dedicated parallel backup solution.