Watch this video to learn about Zero Standing Privilege (2:08)
Watch this video to learn about Zero Standing Privilege (2:08)
Adversaries weaponized administrator credentials
to infect critical servers with ransomware.
Remediant contained a rapidly spreading ransomware attack at a U.S. personnel services firm in under a day.
Hours to scan full environment
Hours to turn on Freeze mode
Endpoints protected
A U.S.-based personnel services firm experienced a ransomware attack in late 2019. The firm engaged an incident response services firm to contain the breach, which then brought in Remediant.
"Mark" Customer
Chief Information Security Officer (CISO)
U.S.-based personnel services firm
When Remediant first arrived, adversaries had spread to 300 servers and were moving rapidly. Remediant took a four step approach to deploying, analyzing, triaging and addressing the incident:
This four step approach limited the intrusion to just those 300 servers out of the 5000 that had points of exposure and used the same default administrator credential. Remediant SecureONE had reduced the impact of the intrusion from a major publicly exposed data breach to a minor incident.
Remediant's agentless, single VM deployment and ability to take control of the compromised accounts across all the infected servers at once made all the difference. In addition, the response team was able to mitigate the breach without disruption to day to day business.