Menu

eScan Technologies


Proactive Behavioral Analysis Engine (PBAE) Technology


We had predicted in our threat predictions that Ransomware will be a major threat in the year 2016. This year has seen an unprecedented growth of more than 172% rise in ransomware attacks and many corporate and government organizations have fallen prey to ransomware attacks. Though widely not reported, it has cost millions of dollars to many organizations across the world. If you want to know what is Ransomware, here are some resources that will help you to safeguard against this type of attack

Know More

GDPR: The changing dynamics of Data Security Compliance & its impact on Implementation


General Data Protection Regulation (GDPR) takes effect in the European Union (EU) on May 25, 2018. Since GDPR expands the privacy rights granted to EU individuals and it places many new obligations on organizations that serve customers and individuals in the European Union, irrespective of their geographical location. Such organizations around the world will be required to put in place security policies to address different risks and effectively enforce these policies with technical controls or potentially face fines of up to 20 Million USD or 4% of Global turnover whichever higher.

Furthermore, in event of data breaches, it is imperative for the organization to follow a schedule and provide comprehensive information regarding the breach to the Data Protection Officer as mandated by GDPR. In light of the tough timelines for reporting a breach – in addition to securing the IT infrastructure, it is also important to have robust breach detection, investigation and internal reporting procedures in place.

Know More

eScan Launches new TSPM Technology to block RDP hacking attacks


With the growing complexity of cyber-attacks, enterprises are spending millions to avoid cyber-crime. However, due to bad security practices such as usage of elementary passwords for system access creates most vulnerable opportunity for cyber criminals. In such scenarios cyber criminals use brute force attack to take control of network. Based on “National Exposure Index” report by Rapid7, 73% of Indian RDP servers are exposed to bruteforce attacks, and ranks 18th on the Global Index.

Know More

MicroWorld Winsock Layer (MWL) Technology


The MicroWorld Winsock Layer technology is a revolutionary technology that resides on the Winsock Layer of the operating system and scans all the incoming and outgoing traffic from the Internet and checks for any security violating content. If the data packet is clean it is passed or else it is removed before it reaches the application layer.

Know More

Host Intrusion Prevention System (HIPS)


The Host Intrusion Prevention System (HIPS) monitors all the network activities on the system. This technology helps in detecting when a rootkit, keylogger, spyware or Trojan is installed on the system. HIPS technology not only warns the user about any intrusion, but, also blocks it.

HIPS technology uses both signature based detection as well as advanced heuristics antivirus algorithm. You can also set policies specifying the behavior of operating systems or applications. The attacks that HIPS protect against include viruses, spam, spyware, worms, Trojans, keyloggers, bots, rootkits, and Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks.

Domain & IP Reputation Check


The Domain & IP Reputation Check technology verifies the credibility of Web domains by tracking any indication of suspicious activities on the web page. This technology also verifies the integrity of the IP address by comparing it with a list of known email senders and by using a dynamic service that assesses email senders reputation in real-time. Emails received from domains with malicious activities are not accepted.

Non Intrusive Learning Pattern (NILP) Technology


NILP works on the basis of Artificial Intelligence where in, it learns user's behavior and then takes an informed decision in the background and help identify and classify mails on behalf of the users whether the mails are spam or ham.

Live Chat
Top