Better Together:
Halcyon + Backup Tools

Backups are a critical component of your IT and security strategy, but when it comes to ransomware, they're not always enough. Not only do attackers consistently target backups during ransomware attacks, but recovery from an attack using immutable backups can take weeks. Halcyon supplements backup and recovery tools to detect, defend, and defeat ransomware.

Backups Alone Aren’t Recovery. Halcyon Makes Sure You Get There.

Ransomware Recovery at the Speed of Business

Volume Shadow Service  

Ransomware often goes after the Volume Shadow Copy Service (VSS) on Windows to remove local backups and prevent recovery. Halcyon protects VSS in real time, stopping these threats before ransomware can run.

Backup-free Recovery  

Halcyon captures the symmetric encryption keys ransomware uses to lock files and rapidly decrypts and restores files, even if ransomware bypasses your security controls.

24x7 Ransomware SOC  

Our Ransomware Detection & Recovery (RDR) team provides around-the-clock monitoring and real-time threat response, acting as an extension of your security team. RDR allows you to recover from ransomware without having to hire or train a single headcount.

Close The Ransomware Protection Gap

We know you can't afford downtime. That is why Halcyon stops ransomware before it starts, keeps your backups safe, and helps you recover encrypted files in hours, instead of days or weeks.
The Ransomware Gap
ANTI-RANSOMWARE
HALCYON: RANSOMWARE RESILIENCE + RECOVERY LAYER

How it Works Across the Attack Chain

INITIAL
ACCESS
REMOTE
ACCESS
PRIVIlege
escalation
ENVIRONMENT
enumeration
credential
Harvesting
Lateral
Movement
Security
Bypass
DATA
EXFILTRATION
Backup
DESTRUCTION
DATA
ENCRYPTION
INITIAL ACCESS
Halcyon detects when attackers use malicious executables, brute force attempts, or command and control (C2) infrastructure to access your environment.
PREVENTION
DXP
After gaining initial access, attackers typically use remote access tools to carry out their attacks more effectively. Halcyon detects this activity, creating alerts for immediate investigations.
PREVENTION
DXP
Halcyon alerts and interrupts an attacker's attempt to escalate user privileges using malicious executables or vulnerable kernel drivers. 
PREVENTION
KERNEL GUARD
Halcyon identifies when an attacker attempts to enumerate your environment for recon and intel gathering, to make their attack ultimately more effective. 
PREVENTION
Halcyon understands attackers' methods to harvest valid user credentials, detecting and preventing their actions automatically. 
PREVENTION
Halcyon detects and prevents when attackers attempt to move laterally across your environment. For example, when using an RMM tool to try and connect to machines in environment, Halcyon can halt their progression. 
PREVENTION
Halcyon employs unique features like EDR Last Gasp and Tamper Guard to protect against attackers' attempts to bypass and disable security products in real-time. 
LAST GASP
TAMPER GUARD
Halcyon Data Exfiltration Protection (DXP) acts as an early warning system alerting you of an attacker's attempt to steal your data, yet to be caught by other security tools.
DXP
Halcyon can detect and disrupt an attacker attempting to gain initial access into your environment using malicious executables, brute force attacks, or command and control (C2) infrastructure.
BEHAVIORAL
DXP
Halcyon's ability to decrypt data using captured key material allows for an alternative recovery path if data is encrypted during a ransomware event. 
BEHAVIORAL
KEY CAPTURE

The Halcyon Difference

Dedicated to defeating ransomware

Security solutions claim they protect you from ransomware, yet ransomware attacks continue to succeed at an unprecedented pace. Why? Because most solutions are made for a wide range of threats. Halcyon is different. We are purpose-built to focus exclusively on detecting and disrupting ransomware before damage occurs.

Wherever Ransomware Goes, We're Waiting.

Halcyon protects across every stage of ransomware
— from pre-execution to data exfiltration to encryption.

Learn More
Learn More

Ransomware SOC Included

Our team of experts battle ransomware for you,
at no additional cost.

Learn More
Learn More

Business Continuity, Guaranteed

Reduce risk with our included ransomware recovery and services-based warranty.

See How
See How

Halcyon Closes the Ransomware Gap

Counter ever evolving ransomware risks while boosting the effectiveness of your EPP, EDR and XDR solutions. Halcyon frees your team to focus on what matters most by fortifying your security against risk. Ransomware protection that powers progress.

Prevent Ransomware Execution with Our AI-Driven Engine

Trained with a hyper focus on recognizing ransomware, our AI engine detects and prevents malicious files, apps, and processes, even if it's a brand-new or zero-day threat.

Thwart Vulnerable Driver Exploitation

Kernel Guard Protection blocks attackers from exploiting trusted but vulnerable drivers, stopping BYOVD attacks in their tracks and keeping your system secure from outside threats

Protect Against EDR Tampering and Sabotage

Quickly identify any tampering or sabotage of key security services like Microsoft® Defender, CrowdStrike®, SentinelOne®, and Palo Alto Networks® Cortex®, so attackers can’t slip in undetected.

Deter Living off the Land Attacks

Detect and stop ransomware attacks launched through PowerShell®, WMIC, and other tools neutralizing their efforts, and automatically protect your volume shadow services (VSS) from being corrupted.

Uncover Data Exfiltration Efforts

Spot and identify data theft attempts by monitoring suspicious IPS, DNS activity, and data volumes protecting you from ransomware’s now common ‘double-extortion’ tactics.

Detect and Disrupt Encryption Attempts

Automatically capture encryption keys and data attackers use during a ransomware attack so you can rapidly recover your files and skip paying the ransom.

Ready to take ransomware off your worry list?

Stop attacks, respond faster, leverage industry leading threat intel with Halcyon RDR and shut down extortion before it starts. Talk to a Halcyon expert today.

Get a 20-minute LIVE ransomware prevention demonstration.
Learn how Halcyon eliminates the business downtime risks from an attack.
See how Halcyon stops data extortion attacks and data exfiltration.
Discover why ransomware protection goes beyond traditional endpoint controls.