Cryptolocker

Cryptolocker
The right tools to use to be truly protected
At least once in the last few years, we have encountered this unpleasant situation and if we were lucky, even to get our data back. This is precisely the characteristic of the virus, it infects the PC, seizes the documents and asks for a ransom.

Cryptolocker, CTB-Locker, Locky ransomware, Teslacrypt with all their variants, are able to infect all Microsoft operating systems. They usually appear as a ZIP, PDF, CAB attachment but can also be transmitted remotely by exploiting network vulnerabilities.

The security features available in the MAX Remote Management Dashboard allow you to provide your customers with multi-layered protection. Each layer is integrated into a single, centralized and easily configurable console.

LOGICnow Security:

Email Protection
Centralized Antivirus
Web Protection
Patch and vulnerability management
Managed Online Backup
LOGICcards

Discover the tools to protect yourself.

Infoset Srl