Cyemptive Updates its Preemptive Cyber Threat Scanner

Cyemptive Technologies, Inc., a provider of preemptive cybersecurity products and technology, has unveiled Version 2 of Cyemptive Enterprise Scanner (CES V2). It preemptively scans for infected files such as ransomware, malware, and other cyberthreats before they infect a system.

CES V2 takes a “state-based” file scanning approach that identifies and eliminates threats in files before a problem is actually initiated. Cyemptive says current technology only reacts and attempts to correct once compromise has already occurred.

“Today’s scanning technology is broken because it is waiting for API calls or execution of files before it can detect most file issues,” said Rob Pike, founder and CEO of Cyemptive Technologies. “Because of this, it cannot preemptively detect cyberthreat encryption and malware that causes issues within operating systems regardless of detection after discovery.”

CES V2 is designed to detect and prevent ransomware before it encrypts files within the operating system or network; detect and prevent hidden files before they harm the operating system or network; and detect and prevent unwanted encrypted files as well as other forms of malware before they enter the system.

Additional new features in CES V2 over CES V1, which was released in September 2019 include the ability to detect additional forms of malware, improved file identification accuracy, ability to “stub out” bad files, expanded reporting, additional forms of non-standard file detections, and the incorporation of cluster scalability for scanning massive datasets including any level of backup file systems.

Read more at Cyemptive

(Visited 65 times, 1 visits today)

The Government Technology & Services Coalition's Homeland Security Today (HSToday) is the premier news and information resource for the homeland security community, dedicated to elevating the discussions and insights that can support a safe and secure nation. A non-profit magazine and media platform, HSToday provides readers with the whole story, placing facts and comments in context to inform debate and drive realistic solutions to some of the nation’s most vexing security challenges.

Leave a Reply

Latest from Cybersecurity

Go to Top
X
X