Free Audit To Test AV/NGAV Detection Level Against Process Doppelganging Evasion. Request It Now.
800-413-1782

RESOURCES

  • Media Type:
  • All
  • Brochures
  • Case Studies
  • Company Reviews
  • Videos
  • Webinars
  • Whitepapers


Lost in Transaction: Process Doppelganging

Lost in Transaction: Process Doppelganging

enSilo’s researchers discovered an evasion technique dubbed Process Doppelgänging that was first presented at BlackHat Europe 2017. Watch the on-demand webinar to learn how it works and how to protect against it.


Media Industry

Media Industry

enSilo succeeded in destroying the RAT (remote access trojan) control by blocking command and control communication out-of-the-box.


Anatomy of WannaCry

Anatomy of WannaCry

Watch the on demand webinar Anatomy of WannaCry - Learning from the Ransomware that Paralyzed Systems Globally


Sports Industry

Sports Industry

Shows how enSilo is an effective endpoint solution and gives a high level of confidence to the end user, eliminating any security after thoughts.


Financial Services Industry

Financial Services Industry

enSilo provides a view of the malware battlefield from a different point of view and makes it possible to see system processes that are behaving in an unexpected fashion, alerting this activity.


Financial Institution

Financial Institution

After successfully installing the pre-and post-infection protection as the final line of defense on the servers and forty ATM’s, it was clear that this was the best software experience ever.


Vulnerable by Design

Vulnerable by Design

Learn how attackers appear legitimate in face of security tools by exploiting design vulnerabilities.


Food and Beverages

Food and Beverages

Beverage companies’ data and intellectual property are constantly on the radar of either competitors or threat actors looking to steal or maliciously modify ingredients in data breaches.


Automated Endpoint Security Realized

Automated Endpoint Security Realized

Modern malware is evolving at a rapid rate, and most traditional security defenses are failing to detect in an efficient timeframe and account for pre- and post-infection scenarios.