LAW SHARE RANSOMWARE PROTECTION

Law Share introduces industry-first heuristic engine to detect ransomware. Additionally, Law Share offers features to help enterprises develop effective strategies to counter ransomware.

DETECTION & PROACTIVE ALERT

Users can search for files/folders by Law Share’s heuristic engine uses rules to detect any suspicious activity. For example, if ransomware were uploaded disguised as a Word document, Law Share cloud would detect the threat by checking the file content signature vs. its mime type. If Law Share detects that the file isn’t really a Word document then Law Share stops the upload and sends an alert to the administrator.

GRANULAR PERMISSIONS

Law Share supports granular permissions for folders that enable custom permissions. Using granular permissions, organizations can build permission trees to protect any sensitive data. Even if a folder is exposed to ransomware via Drive or Sync clients, the client apps cannot spread the infection to the folder with sensitive data.

RECOVERY

Backing up and versioning of files can be an effective mechanism to recover from a ransomware attack. In the event of a ransomware attack on a client computer, if the data had been versioned in Law Share server, then the client computer data can be restored using older versions from the server. Law Share offers unlimited versioning and endpoint backup to help companies develop effective anti-ransomware strategies.