CryptoStopper™ Features

[vc_row color_scheme=”primary” us_bg_image_source=”media” us_bg_image=”97″ us_bg_pos=”top right” us_bg_parallax=”still”][vc_column][us_separator size=”large”][vc_column_text]

CryptoStopper™  Features

Software to detect and stop ransomware

[/vc_column_text][us_separator size=”small” show_line=”1″ line_width=”30″ css=”%7B%22default%22%3A%7B%22color%22%3A%22%23ffffff%22%7D%7D”][vc_column_text]

Stop ransomware in milliseconds.

[/vc_column_text][us_btn label=”Find out how” link=”url:%23product-tour|||” style=”10″ align=”center” icon=”fas|long-arrow-alt-down” iconpos=”right”][us_separator size=”large”][/vc_column][/vc_row][vc_row el_id=”product-tour”][vc_column][vc_column_text]

CryptoStopper™ Product Tour

[/vc_column_text][vc_column_text]

Stop actively running ransomware with our detection software

[/vc_column_text][vc_column_text]

CryptoStopper™ is proven ransomware detection software to stop actively running ransomware infections on Windows workstations and servers. Want to try it for yourself? Check out our free ransomware simulator to see how CryptoStopper™ works!

[/vc_column_text][us_separator][vc_tta_tour][vc_tta_section active=”1″ icon=”far|copy” tab_id=”1495218462147-7e267cd3-c7d7″ title=”Watcher files”][vc_row_inner][vc_column_inner width=”2/3″][vc_column_text]

Watcher files

[/vc_column_text][vc_column_text]CryptoStopper™ uses deception technology to detect ransomware. During the installation process, decoy files are strategically deployed. We call these Watcher Files. When ransomware begins the encryption process, CryptoStopper™ detects it in real-time and takes action.[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/3″][us_image image=”103″ size=”medium”][/vc_column_inner][/vc_row_inner][/vc_tta_section][vc_tta_section icon=”far|clock” tab_id=”1495218462220-0ca8dd38-d5ea” title=”Quick setup”][vc_row_inner][vc_column_inner width=”1/3″][us_image image=”104″ size=”medium” align=”center”][/vc_column_inner][vc_column_inner width=”2/3″][vc_column_text]

Quick setup

[/vc_column_text][vc_column_text]Cyber security tools don’t need to be over burdensome. CryptoStopper™ doesn’t require additional hardware for you to maintain. Our ransomware detection software will have you protected in a matter of minutes.[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_tta_section][vc_tta_section icon=”fas|fighter-jet” tab_id=”1495218790016-0586812d-58d3″ title=”Fast acting”][vc_row_inner][vc_column_inner width=”2/3″][vc_column_text]

Fast acting

[/vc_column_text][vc_column_text]When ransomware attacks, CryptoStopper™ takes swift action. An administrative alert is sent to your security team with critical details about the attack. The infected workstation is automatically shutdown to prevent further network damage.[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/3″][us_image image=”105″ size=”medium” align=”center”][/vc_column_inner][/vc_row_inner][/vc_tta_section][vc_tta_section icon=”fas|eye” tab_id=”1495218829334-07b82967-5558″ title=”Always watching”][vc_row_inner][vc_column_inner width=”1/3″][us_image image=”106″ size=”medium” align=”center”][/vc_column_inner][vc_column_inner width=”2/3″][vc_column_text]

Always watching

[/vc_column_text][vc_column_text]With the Watcher Files deployed, CryptoStopper™ is continually monitoring for nefarious encryption activity. Even if the Watcher Files are deleted they self-heal and are protecting you again in milliseconds.[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_tta_section][vc_tta_section icon=”fas|user-secret” tab_id=”1495218875549-7c12df0e-11f3″ title=”Signature-less”][vc_row_inner][vc_column_inner width=”2/3″][vc_column_text]

Signature-less

[/vc_column_text][vc_column_text]Unlike Anti-Malware, CryptoStopper™ is signature-less. Because CryptoStopper™ is watching for the encryption action itself, it will always detect the activity of encryption rather than detecting the specific variant of ransomware running.[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/3″][us_image image=”226″ size=”medium”][/vc_column_inner][/vc_row_inner][/vc_tta_section][vc_tta_section icon=”fas|ban” tab_id=”1495218946944-3522805f-c12e” title=”Unavoidable”][vc_row_inner][vc_column_inner width=”2/3″][vc_column_text]

Unavoidable

[/vc_column_text][vc_column_text]Ransomware can’t avoid tripping over the Watcher Files. The Watcher Files are randomly generated to avoid detection. We are continually researching the latest ransomware variants to ensure CryptoStopper™ remains unavoidable.[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/3″][us_image image=”228″ size=”medium”][/vc_column_inner][/vc_row_inner][/vc_tta_section][/vc_tta_tour][us_separator][/vc_column][/vc_row][vc_row color_scheme=”alternate”][vc_column width=”1/6″][us_separator size=”small”][/vc_column][vc_column width=”2/3″][vc_column_text]

See WannaCry and CryptoStopper™ work in real time

[/vc_column_text][vc_column_text]

Watch CryptoStopper™ detect and respond to a WannaCry ransomware attack.

[/vc_column_text][vc_video link=”https://www.youtube.com/watch?v=AkLqg_prTxw” video_title=”1″][us_separator][us_btn label=”Watch other YouTube videos” link=”url:https%3A%2F%2Fwww.youtube.com%2Fchannel%2FUCxkSicDFU4Z3x0R7T-SVLCw||target:%20_blank|” style=”7″ align=”center” icon=”fas|external-link-alt” iconpos=”right” css=”%7B%22default%22%3A%7B%22font-size%22%3A%2214px%22%7D%7D” custom_width=”200px”][/vc_column][vc_column width=”1/6″][/vc_column][/vc_row][vc_row height=”medium” content_placement=”middle” disable_element=”yes”][vc_column width=”2/3″][vc_row_inner][vc_column_inner width=”1/2″][us_separator size=”custom” height=”20px”][ultimate_pricing design_style=”design03″ color_scheme=”custom” color_bg_main=”#e2e2e2″ color_txt_main=”#424242″ color_bg_highlight=”#666d70″ color_txt_highlight=”#ffffff” package_heading=”CryptoStopper™ DESKTOP” package_sub_heading=”For most desktop and laptop computers” package_price=”$1.30/mo” package_unit=”per machine” package_btn_text=”Download Now!” package_link=”url:https%3A%2F%2Fgo.watchpointdata.com%2Fcryptostopper-desktop-download|||” price_unit_font_color=”#eeeeee” package_name_font_style=”font-weight:bold;” css_price_box=”.vc_custom_1519052344685{padding-bottom: 20px !important;}”]Protect and STOP malicious
ransomware processes

Fast-acting

Auto-terminates processes

File-less detection

Compatible with:[/ultimate_pricing][/vc_column_inner][vc_column_inner width=”1/2″][ultimate_pricing design_style=”design03″ color_scheme=”custom” color_bg_main=”#e2e2e2″ color_txt_main=”#424242″ color_bg_highlight=”#2c313b” color_txt_highlight=”#ffffff” package_heading=”CryptoStopper™ SERVER” package_sub_heading=”For enterprise or server-side applications” package_price=”$25/mo” package_unit=”per server” package_btn_text=”Schedule Your Installation” package_link=”url:https%3A%2F%2Fgo.watchpointdata.com%2Fcryptostopper-server-installation|||” package_featured=”enable” package_name_font_style=”font-weight:bold;” el_class=”featured”]Detect and STOP ransomware attacks that traverse the network

Continuous monitoring

Auto-response

Host blocking

Email alerts

Compatible with:[/ultimate_pricing][/vc_column_inner][/vc_row_inner][/vc_column][vc_column width=”1/3″][vc_column_text]

Try it FREE for 14 days!

[/vc_column_text][vc_column_text]

Give it a try to see if it fits your needs.

[/vc_column_text][us_btn label=”Start your FREE trial” link=”url:https%3A%2F%2Fgo.watchpointdata.com%2Fcryptostopper-trial||target:%20_blank|” style=”7″ align=”center” css=”%7B%22default%22%3A%7B%22font-size%22%3A%2215px%22%7D%7D” custom_width=”200px”][us_separator show_line=”1″][vc_column_text]

Buy with confidence

[/vc_column_text][us_image image=”36″ size=”us_150_150″ align=”center”][vc_column_text]

All our products come with a 60 day money-back guarantee. If within the first 60 days you are not satisfied with our software, we will issue a full refund of the purchase price.

[/vc_column_text][/vc_column][/vc_row][vc_row height=”auto”][vc_column][vc_tta_tabs layout=”trendy”][vc_tta_section tab_id=”1517603177699-bc569d96-f038″ title=”Feature Comparison”][vc_row_inner][vc_column_inner width=”1/4″][us_separator size=”small”][/vc_column_inner][vc_column_inner width=”1/2″][vc_column_text]

Feature Comparison

[/vc_column_text][vc_column_text][table id=1 /][/vc_column_text][/vc_column_inner][vc_column_inner width=”1/4″][/vc_column_inner][/vc_row_inner][/vc_tta_section][vc_tta_section tab_id=”system-requirements” title=”System Requirements”][vc_column_text]

CryptoStopper™ System Requirements

[/vc_column_text][vc_row_inner columns_type=”boxes”][vc_column_inner width=”1/2″][vc_column_text]

CryptoStopper Workstation

Windows 7

  • Service Pack 1
  • WMF 3.0
  • 64-bit versions, Windows6.1-KB2506143-x64.msu
  • 32-bit versions: Windows6.1-KB2506143-x86.msu

Windows 8, Windows 8.1 & Windows 10

  • No Prerequisites

[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/2″][vc_column_text]CryptoStopper Server

Windows Server 2008 R2

  • Service Pack 1
  • WMF 3.0 (KB2506143-x64.msu)
  • SBS not supported

Windows Server 2012, 2016 & 2020

  • No minimum requirements, its ready to go.

 

Network Requirements – Domain Environment[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_tta_section][/vc_tta_tabs][us_separator][/vc_column][/vc_row][vc_row height=”auto” color_scheme=”alternate” el_id=”faq”][vc_column][us_separator][vc_column_text]

Frequently Asked Questions

[/vc_column_text][/vc_column][/vc_row][vc_row height=”auto” color_scheme=”alternate” columns_type=”boxes”][vc_column width=”1/2″][vc_tta_accordion c_icon=”triangle”][vc_tta_section tab_id=”1494781709255-0755dfe3-f3e50c75-739b” title=”Why do I need additional protection?”][vc_column_text]Signature based products like anti-virus are not able to detect zero-day threats and AV is only about 43% effective. Ransomware gets past your traditional defenses by using social engineering attacks against the company employees whom are not consistently able to distinguish a phishing email from a valid email. To make matters worse fileless ransomware attacks only require an employee to visit a site to start a ransomware attack that runs solely in memory. No files touch the disk so AV never detects it.[/vc_column_text][/vc_tta_section][vc_tta_section tab_id=”1494781709727-bd389031-d80d0c75-739b” title=”Do you guarantee protection?”][vc_column_text]We offer a 60 day money back guarantee. No other guarantee.[/vc_column_text][/vc_tta_section][vc_tta_section tab_id=”1495158286756-59814c86-60690c75-739b” title=”Will CryptoStopper™ isolate the offending workstation automatically?”][vc_column_text]Yes. CryptoStopper™ uses an algorithm to monitor specially crafted WatcherFiles™. When Ransomware attacks your server, CryptoStopper™ correlates the offending user and immediately isolates that user. It simultaneously notifies the admin via email.[/vc_column_text][/vc_tta_section][vc_tta_section tab_id=”1495158469670-e8454757-bf8e0c75-739b” title=”Do you offer a guarantee on CryptoStopper™?”][vc_column_text]Yes, we offer a 60 day money back guarantee.[/vc_column_text][/vc_tta_section][vc_tta_section tab_id=”1495158538990-0d3f46c4-2d270c75-739b” title=”How quickly will CryptoStopper™ work to stop a ransomware attack?”][vc_column_text]The average time to detection is :09 seconds.[/vc_column_text][/vc_tta_section][vc_tta_section tab_id=”1495158595854-f2143b59-97400c75-739b” title=”How does CryptoStopper™ continuously monitor a system for ransomware?”][vc_column_text]Instead of monitoring each endpoint with CryptoStopper™, we monitor the data that sits on the file server, and again once a threshold is met, we flag that as ransomware.[/vc_column_text][/vc_tta_section][vc_tta_section tab_id=”1495158673129-21ff415e-931f0c75-739b” title=”What if the archive bit is set?”][vc_column_text]Setting the archive bit will not activate CryptoStopper™ since setting the archive bit doesn’t modify the file. The archive bit is simply an attribute of the file.[/vc_column_text][/vc_tta_section][vc_tta_section tab_id=”1495158716136-d8ba455e-c6cc0c75-739b” title=”What is the Performance Impact?”][vc_column_text]CryptoStopper™ is extremely lightweight. The software only monitors the files that it creates so it’s not burdened by watching thousands of files.[/vc_column_text][/vc_tta_section][/vc_tta_accordion][/vc_column][vc_column width=”1/2″][vc_tta_accordion c_icon=”triangle”][vc_tta_section tab_id=”1494781916780-ae40db38-67e10c75-739b” title=”Will CryptoStopper™ automatically update?”][vc_column_text]Yes. WatchPoint provides automatic updates to CryptoStopper.[/vc_column_text][/vc_tta_section][vc_tta_section tab_id=”1494781917155-2960c853-1b410c75-739b” title=”How long does it take to install CryptoStopper™?”][vc_column_text]A typical install will take 15 minutes or less.[/vc_column_text][/vc_tta_section][vc_tta_section tab_id=”1495158314064-9fdd66a2-3bf90c75-739b” title=”Do you have a PC version of CryptoStopper™?”][vc_column_text]Yes, we have a beta version available now. Click here to download.[/vc_column_text][/vc_tta_section][vc_tta_section tab_id=”1495158506578-b09a2175-14340c75-739b” title=”Will my backup trigger CryptoStopper™?”][vc_column_text]No, your backup only updates the archive bit and doesn’t modify the file.[/vc_column_text][/vc_tta_section][vc_tta_section tab_id=”1495158556447-e5756856-74700c75-739b” title=”Does this software detect only CryptoLocker or will it find the other ransom problems as well?”][vc_column_text]CryptoStopper™ will detect all ransomware.[/vc_column_text][/vc_tta_section][vc_tta_section tab_id=”1495158626937-c2e3e48c-c3c00c75-739b” title=”Is CryptoStopper™ similar to a Host-based Intrusion Protection System?”][vc_column_text]No. The software is not a HIPs. We monitor the data to look for an excessive amount of changes. Once that threshold is met, we know it’s ransomware or possibly an anomaly that should be investigated immediately.[/vc_column_text][/vc_tta_section][vc_tta_section tab_id=”1495158695579-72cc40a8-ecfe0c75-739b” title=”What if the infection happens directly on the server?”][vc_column_text]CryptoStopper™ should be installed on your server to monitor for infections.[/vc_column_text][/vc_tta_section][vc_tta_section tab_id=”1495158738177-2a130e84-c32b0c75-739b” title=”Will I receive false positives from CryptoStopper™?”][vc_column_text]Potentially, although the false positives should be minimal we have found instances where a program folder is located in the same path as a protected shared folder. If the software is reinstalled you will get a false positive.[/vc_column_text][/vc_tta_section][/vc_tta_accordion][/vc_column][/vc_row][vc_row height=”small” color_scheme=”alternate”][vc_column][/vc_column][/vc_row][vc_row color_scheme=”primary”][vc_column][us_cta title=”Still not sure?” controls=”bottom” btn_label=”Check out the Ransomware Simulator” btn_link=”url:%2Fransomware-simulator|||” btn_style=”9″ btn_size=”15px” second_button=”1″ btn2_label=”Learn about Stopping Ransomware” btn2_link=”url:https%3A%2F%2Fblog.getcryptostopper.com%2Fdeception-technology-in-action-cryptostopper-bait-files-deceive-ransomware|||” btn2_style=”10″ btn2_size=”15px”]If you’re not quite ready to buy, you can learn more about ransomware and what CryptoStopper™ does to protect you.[/us_cta][/vc_column][/vc_row]