Deploying Military-Grade Network Security to Stop Ransomware
Watch the full recording below or read on to learn more about this webinar.
Every security vendor has a different approach to ransomware. We’re no exception, but there’s an important twist – our automated microsegmentation with multi-factor authentication (MFA) everywhere approach actually works. Using similar techniques to ones used by the NSA, Mossad, and other government organizations, MFA-based cyber defense holds the potential to truly stop ransomware in its tracks.
Recently, Zero Networks hosted a webinar where we simulated infamous ransomware attacks from the past year against two nearly identical environments – the only difference being that one environment had Zero Networks deployed while the other did not.
Some of the key takeaways:
- After running a quick scan of each environment using TrustMeter, our free network visibility tool, we found that the environment without Zero Networks had 85% of their assets accessible to attackers while the environment with Zero Networks fully deployed had only 16% of assets accessible to attackers.
- Without Zero Networks, the first environment was easily penetrated. Using free open-source tools like Armitage (the original version of Cobalt Strike), Mimikatz, and ShinoLocker, the simulated attacker gained credentials and spread throughout the network in a matter of seconds. Simulating the same attack against the environment protected by Zero Networks, the attacker could not access any machine.
- Even after giving the attacker domain admin credentials, they still could not exploit the machine because all assets and protocols were protected by MFA.
Want to download the webinar?
Tell us a bit about yourself, and we’ll redirect you to the full recording.