
CryptoSpike uses a multi-pronged approach to detect ransomware.It begins with a Block List that includes thousands of ransomware file endings or names. Updates are made every day and downloaded to the CryptoSpike server.
Vendor
Catalogic Software
Company Website
CryptoSpike - NetApp Ransomware Protection
Most ransomware attacks happen when files get compromised and your NetApp file shares are among the most vulnerable parts of your organization. File shares are where end users meet the data center most directly, and most ransomware comes through the front door via interaction with end users. CryptoSpike was designed to work with NetApp ONTAP file systems, monitoring every action your users take to protect you from vulnerability to ransomware. As part of the ransomware monitoring, CryptoSpike also provides a user and file audit trail.
Features
- Behavior-Based Detection: Learns normal user activity and blocks anomalies in real time.
- File Extension Filtering: Uses block and pass lists to detect and stop ransomware file types.
- Granular Recovery: Enables targeted file restoration without full system rollback.
- Audit Trails: Tracks user actions for forensic analysis and compliance.
- Policy Flexibility: Apply different security rules across clusters, SVMs, or file shares.