No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home GRC Vendor News

Industry Experts Enhance CyberSense Software to Stay Ahead of Advancing Ransomware

by Corporate Compliance Insights
October 27, 2020
in GRC Vendor News
hacker hand on laptop computer keyboard with red binary screen of ransomware

Index Engines announces new release of CyberSense with advanced diagnostics and throughputs to detect, diagnose and recover from the most sophisticated cyberattacks

Holmdel, New Jersey (October 27, 2020) – Data integrity experts Index Engines today announced the latest enhancements to its ransomware detection and recovery software, CyberSense, to help organizations win the war against cyberattacks.

CyberSense provides advanced data analysis software that scans backup data to check integrity, monitors files to identify changes indicative of cyberattack, and provides forensic reporting to diagnose and recover from corruption.

“Cyberattacks continue to evolve to be more aggressive and more stealth-like than ever before, so we’ve continued to improve CyberSense to tackle this refinement,” said Jim McGann, Vice President at Index Engines. “By providing upgrades to performance and support for additional workloads, we are able to continue providing organizations with the ability to quickly identify, repair and recover from cybersecurity issues.  Rather than pay a ransom to recover encrypted data or take months to rebuild systems from the ground up after an attack, organizations can deploy CyberSense to detect attacks and support rapid recovery.”

CyberSense uses a combination of full-content-based analytics and machine learning to detect if an attack has occurred.  If attack vectors are identified, CyberSense provides forensic tools to diagnose and recover, including reports on files that were impacted so they can be replaced with the last known good version to ensure business operations return to normal with minimal downtime.

Among the performance enhancements are increased data throughput, new database workloads and aggregation to a central cloud repository.

  • Increased data throughput for the analysis of backup images, including virtual machine backups. The enhancements include increased parallelism to fully utilize the processing power of the CyberSense server including the ability to quickly determine if file within a backup was already analyzed in a previous backup, allowing it to be skipped over for analysis.
  • New database workloads for CyberSense analytics and integrity validation.  These include the SAP HANA database and the Microsoft Extensible Storage Engine (ESE), also known as JET Blue which is a core component of core of Microsoft Exchange Server and Active Directory (DB2, SharePoint, MS-SQL, Oracle, and others also supported).
  • New option that aggregates CyberSense statistics from clients into a central cloud repository.  This repository does not contain any client data only anonymous statistics from CyberSense scans.  The statistics resulting from the CyberSense scan will be analyzed by the latest version of the CyberSense machine learning model for improved results.

“Data integrity and system security are of ever-increasing concern to organizations as digital information has become the lifeblood of their businesses,” said Christophe Bertrand, Senior Analyst, Enterprise Strategy Group (ESG).  “Recent ESG research shows that the threat of data not being available due to criminal activities related to cyberattacks and ransomware instances can leave businesses vulnerable like never before.  A solution like CyberSense that not only monitors changes to a system but provides the means to recovery from malicious changes is one that should be seriously considered by IT professionals.”

While real-time cyber protection solutions are designed to protect from an attack, protection gaps do occur.  Metadata-only solutions can miss more sophisticated attack vectors, providing a false sense of confidence.

CyberSense is the only data analytics product on the market that validates the integrity inside all files and databases on the initial scan.  CyberSense will detect even the most sophisticated corruption that hides inside files, providing 99.5 percent confidence in alerting an attack occurred.

CyberSense begins its attack detection workflow with comprehensive indexing.  Every time CyberSense sees a new backup image, statistics are generated from that scan and compared to previous scans.  These analytics are input into CyberSense’s machine learning model.  The results are deterministic regarding the data’s integrity and if the data has been corrupted by a ransomware attack.

CyberSense also provides various reports and details that assist in the diagnosis and recovery from the attack.  CyberSense provides the attack vector utilized to manipulate the data as well as a complete listing of suspect files that have been manipulated, providing an understanding of the breadth of the attack.

Additionally, using the event logs analysis tools, CyberSense reports on the user account that was breeched and the executable data that was used to corrupt the data in order to eliminate the threat.

And because CyberSense is continually looking at how data has changed, it can provide the intelligence needed to assist in the restore of the last known good copy of the file.

CyberSense is integrated with the Dell EMC Cyber Recovery solution and resold by IBM Resiliency Services and Global System Integrators who offer hardware, software, and professional services. CyberSense pricing is based on the capacity of data processed.  Additional information about how CyberSense adds a layer of protection on real-time ransomware and cyber protection solutions is available at https://indexengines.com.

About Index Engines

Index Engines has been providing organizations with Power Over Information™ since 2004. Its scalable, high-performance indexing engine has been uniquely architected to meet the challenges of today’s data center and deliver a highly scalable and efficient indexing platform across both primary and backup storage data environments.  It provides search, reporting, disposition and preservation of unstructured user data in support of stakeholders ranging from IT to legal and security. Clients, including top financial services, health care organizations and government agencies, turn to Index Engines to support their most mission-critical information management, cyber security and governance challenges.  Additional information about Index Engines is available at https://indexengines.com.


Tags: CybercrimeData AnalyticsRansomware
Previous Post

4 Considerations When Auditing Revenue Recognition

Next Post

Skeletons in the Closet Are Worth Bringing Out

Corporate Compliance Insights

Corporate Compliance Insights

Corporate Compliance Insights

Related Posts

abstract obscured data colorful

NIST’s Differential Privacy Guidelines: 6 Critical Areas for Secure Implementation

by Michelle Drolet
June 16, 2025

Standard de-identification methods remain vulnerable to sophisticated attacks, but differential privacy offers mathematical guarantees that scale with emerging threats

matrix numbers cybersecurity concept

Why Scalable Global Frameworks Like ISO 27001 Matter

by Sam Peters
May 29, 2025

Updated security standard addresses modern threats with expanded digital protections

check engine light

What Gets Measured Gets Managed, but What Actually Matters in Compliance?

by Keshonda Walker
May 16, 2025

Looking beyond standard measurements to identify the quiet signals that help compliance teams address issues before they become crises

hidden value abstract

CCO Insights: How to Articulate the True Value of Your Compliance Program

by Kenneth Koch and Phillip Ostwalt
May 14, 2025

Benefits of robust programs aren’t always obvious, but buy-in remains critical

Next Post
skeleton among clothes in dark closet

Skeletons in the Closet Are Worth Bringing Out

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights