Skip to content

Self-healing data neutralizes ransomware

Imagine what it would it be like if your data could fight back. Microshard™ data is self-healing. That means that if your Microshard data is tampered with in any way, shape, or form, including encrypted with ransomware, our internal data integrity management processes reconstruct the affected data restoring it to its original, unaffected state. And this happens in real-time so your users don't notice a thing.


Early detection for early response

Data at rest should not change. Period. We perform data integrity checks on all Microshard data. And a failed data integrity check is an indicator of compromise. Our process can serve as an early detection method to alert your SOC and send events to your SIEM, SOAR, etc., for incident response before a full-scale attack begins.

Make exfiltrated data valueless

Ransomware attackers will sometimes employ a tactic of stealing a victim's data prior to encrypting it. This gives the attacker another means of leverage by threatening to release or sell the victim's sensitive data. Our Microshard data shreds, mixes, and distributes data to multiple storage locations. This helps to ensure an attacker is unable to access any complete data making the compromised data worthless to the attacker.

Automatic data migration

You have the option to configure alternate storage for each of your storage locations to which your Microshard data is being saved. If a specified number of data integrity check failures happen within a certain time frame, all of the Microshard data in the affected storage location is automatically migrated to the alternate location. So in a situation where one of your storage locations is infected with ransomware, all of the Microshard data from that location is moved to the alternate location after the data integrity threshold.

Discover how Microshard Technology works

We shred, mix, and distribute your data.

Files are shredded into microshards too small to contain sensitive data. Microshards are mixed across multiple containers, which are distributed across multiple storage locations.