iSecurity Anti-Ransomware for IBM i
How iSecurity Anti-Ransomware Protects Systems

Ransomware is a cyber-attack that blocks access to a computer system or files until a determined amount of money is paid for a decryption key. Ransomware attacks any file it can access including connected devices, mapped network drivers, shared local networks, and cloud storage services that are mapped to the infected computer.
Ransomware doesn’t discriminate. It encrypts every data file that it has access to, including IFS files.
Advanced Ransomware Threat Protection for IFS
iSecurity Anti-Ransomware quickly detects high volume cyber threats deployed from an external source, isolates the threat, and prevents it from damaging valuable data.
- iSecurity Anti-Ransomware software is the first component of iSecurity ATP
- A comprehensive advanced threat protection solution for defending IBM i IFS files against ransomware and other kinds of malware
- It prevents ransomware from damaging valuable data while preserving performance.

Ransomware database is updated constantly so you are automatically protected against even the newest versions of this malware just keeping the definition updated.
How Does it Work?
Protecting IFS
As malicious activity is diagnosed, Anti-Ransomware stops the attack, disconnects the intruder, and raises an alert.
- Identifies, stops, delays, and reports attacks in real-time
- Suspends the attack and alerts the offending computer in real-time
- Disconnects the intruder and sends email, messages and Syslog messages to up to 3 SIEMS in CEF/LEEF formats
- Gets ransomware definition updates every two hours
Results speak for themselves
iSecurity Anti Ransomware was tested in a completely isolated lab which included:
- IBM i
- Windows based PC with mapped IBM i folder
- Set of 10+ real ransomwares (not emulators)
TEST OUTCOME
- PC data files are encrypted (as expected)
- When IFS file was attacked, the Anti-Ransomware stopped the attack before even the first file was compromised
- Alert was raised
- IBM i was disconnected from the attacking PC
- IBM i survived the attack!

Key Features
- Automatic, regularly updated database
- Command-line scanner
- Database updater with support for digital signatures
- Cannot be disabled by viruses
- Built-in support for zip, gzip, jar, and tar files
- User-friendly, multilingual interface (green screen and GUI)
- Supports V5R3 Scanning Enablement
- Integration with OS/400 Scheduler
- History Log for review and analysis
Related Products
Antivirus
IFS virus checks and scans, Native Object Integrity checks, alert by email and by Syslog.
Field Encryption
Column-level field encryption based on IBM’s FIELDPROC, Encryption & Tokenization.
Firewall
Network security, controlling Exit Points, Open DB’s and SSH. Rule Wizards and graphical BI.