Audience

Enterprises requiring a solution to protect storage systems from ransomware

About CryptoSpike

Based on full access transparency, CryptoSpike detects unusual activities in your file system and blocks attacks in real-time. In the event of a ransomware attack, the granular restore function makes it possible to restore affected files immediately. By analyzing all data access to the storage system, CryptoSpike detects ransomware attacks and unusual behavior, stops them in their tracks, and immediately gives you the chance to react and restore the exact data you need. Detect data access patterns and file extensions that are typical of ransomware. Targeted recovery of damaged data directly from the snapshot. Immediately and automatically prevent attacks and alert those responsible. Adjust monitoring policies at the volume or share level in real time. Complete data transparency with access traceability at the file or user level. If required for data protection reasons, user-specific data is only available via dual verification.

Integrations

No integrations listed.

Ratings/Reviews - 1 User Review

Overall 1.0 / 5
ease 1.0 / 5
features 1.0 / 5
design 1.0 / 5
support 1.0 / 5

Company Information

ProLion
Austria
prolion.com/cryptospike/

Videos and Screen Captures

Other Useful Business Software
Stop Storing Third-Party Tokens in Your Database Icon
Stop Storing Third-Party Tokens in Your Database

Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.

Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
Try Auth0 for Free

Product Details

Platforms Supported
Cloud
Training
Documentation
Live Online
Webinars
In Person
Videos
Support
Phone Support
Online

CryptoSpike Frequently Asked Questions

Q: What kinds of users and organization types does CryptoSpike work with?
Q: What languages does CryptoSpike support in their product?
Q: What kind of support options does CryptoSpike offer?
Q: What type of training does CryptoSpike provide?

CryptoSpike Product Features

CryptoSpike Verified User Reviews

Write a Review
  • A CryptoSpike User
    Sr. Data Engineer
    Used the software for: Less than 6 months
    Frequency of Use: Daily
    User Role: User
    Company Size: 10,000 - 19,999
    Design
    Ease
    Features
    Pricing
    Support
    Probability You Would Recommend?
    1 2 3 4 5 6 7 8 9 10

    "Excellent at blocking valid usage of files"

    Posted 2024-12-30

    Pros: None that I know of I am only a victim of this poorly designed product being implemented, by our IT department.

    Cons: Kept me from being able to develop and debug SSIS packages that read and write from network drives.

    Overall: This was implemented on our systems without notice. I ended up being locked out of the ability to open, read and write files where I was an admin on the folders. I had no idea of why I was blocked, the message returned was very worthless. It could be improved, if the message told you that this app was responsible for the blocking and maybe a contact that could resolve the problem. Until then, this product is garbage and you should probably look for something else.

    Read More...
  • Previous
  • You're on page 1
  • Next