CTERA has added a decoy file and attack detection facility to its Ransom Protect offering.
The enterprise developer provides geo-distributed global cloud file and object data services, enabling distributed users to access shared and synchronized unstructured data. Its Ransom Protect feature uses machine learning (ML) models to detect anomalous user or app behavior – such as a spike in encrypted writes – and apply preventative measures at once. CTERA has added a decoy files facility to this, so that data exfiltration attempts by insiders or external malware attackers can be detected in real time and thus begin reactive measures.