The ransomware backdrop 

Cyber criminals continue to target companies of all sizes with ransomware attacks. A common misconception is that perimeter, device, and data protection tools will prevent ransomware breaches from taking place. But such tools were neither designed to understand ransomware behaviour, nor decrypt the data and devices affected by the attack. Whilst restoring data from backups and paying an Incident Response company to remediate the attack is one alternative to paying the ransom, this stressful and costly process can take weeks, or even months to complete. 

It’s time for a different approach; anti-ransomware protection 

For network-based attacks, we have perimeter defences. For user devices – endpoint detection & response. For email-borne threats – email security tools. 

Ransomware is now so widespread and damaging that the UK Government is proposing a payment prevention scheme for all ransomware victims to engage with the authorities and report their intention to pay a ransomware demand. 

We think this necessitates a security layer dedicated exclusively to ransomware protection and remediation. The Halcyon platform, available from Red Helix, sees the ransomware attacks that evade other security tools and takes immediate action to block the ransomware before it encrypts your data and systems. And in the unlikely event that the attack is successful, Halcyon will simultaneously decrypt your affected data and devices to keep your company running smoothly. 

How is Halycon different from other security layers? 

Halcyon understands, and only looks for the behaviours of ransomware. It blocks known ransomware threats and detects and stops previously unseen strains. And if any encryption does take place, Halcyon has a copy of the encryption keys and is able to build a decryptor for unlocking your data and systems. 

This means, even if the attack manages to evade Halcyon’s preventative measures and locks your data and systems, Halcyon already has the keys needed to efficiently decrypt everything. 

Row of read padlocks

The Halcyon detection and recovery process

Protection playbooks are initiated to stop the attack in real-time.

The keys needed for decrypting data and systems are captured and stored.

The recovery process begins. Artifacts are collected for future use.

The collected keys are used to simultaneously decrypt any affected data and systems. 

All affected data and systems are restored at the same time.

In the unlikely event of the ransomware evading all security measures, Halcyon’s Incident Response team will work tirelessly to restore your data and systems.

Affordable, Seamless, and Proven Ransomware Protection

Square halcyon logo

Deployed to over 1 million systems without any compatibility issues with other security tools, Halcyon protects:  

  • Windows Server 2012 R2, 2016, 2019 & 2020 environments 
  • Windows Desktop 10 & 11 versions 
  • Linux RHEL 8 & 9, Ubuntu 22.04, 24.04 LTS, Oracle 8 & 9, Alma 8 & 9, Debian 11 & 12, AWS 2023, and Rocky 8 & 9 

To date, no Halcyon customers have paid a ransomware demand. 

Whether you want a self-managed solution or a service wrap to help with the onboarding and running of your Halycon system, contact us today to discuss your needs and hear how we’re helping other companies to robustly respond to ransomware threats – thanks to Halcyon’s unique technology.