Advanced Endpoint Security Solution

Sangfor Endpoint Secure utilizes a different approach to defending systems from malware and APT threats compared to current next-generation Anti-virus (NGAV) or endpoint detection & response (EDR) solutions.

Endpoint Secure provides a holistic response to malware infections and APT breaches across the entire organization's network, with ease of management, operation, and maintenance. The solution is scalable to meet the needs of any organization needing on-premise management, cloud management, or a hybrid solution when it comes to endpoint security, protection, detection, and response.

What is Endpoint Security?
What is Endpoint Security?

Sangfor's Endpoint Security Overview

Pre-Attack

Prevention

  • Endpoint Discovery & Unified Endpoint Management
  • Vulnerability & Patch Management
  • Configuration Baseline Check

During Attack

Passive Detection

  • Signature-Based Detection (Traditional AV)
  • Behavior-Based Detection (NG-AV)
  • AI & Machine Learning (NG-AV)
  • Sandboxing (NG-AV)

Active Protection

  • Micro-Segmentation
  • Ransomware Honeypot
  • Two-Factor Authentication
  • Brute-Force Attack Detection 

Post-Attack

Residual Threat Detection

  • Threat Hunting

Forensic Analysis

  • Threat Correlation & Visualization

World-Class Malware Detection

World-Class Malware Detection

Awards & Achievements

AV-Test Certification

AV-Test Certification

Sangfor Business Antivirus Solution Receives AV-Test Top Award

Magazine CDM “Next Gen” Award icon

Magazine CDM “Next Gen” Award

Sangfor Endpoint Secure Won Magazine CDM “Next Gen” Award

Operating Systems

windows
macOS
centos
debian
oracle
redhat
suse
ubuntu
asianux
redflag linux

Virtualization

vmware
nutanix
h3c
sangfor cloud
zstack
tencent
alibaba

Customer Success Stories

Below you will find all the Success Stories with Secure Internet Gateway, classified by Industry, such as Enterprises, Governments, Schools & Universities, etc.

FRIEM S.p.A

FRIEM S.p.A

Mahasarakham University (MSU)

Education

Mahasarakham University (MSU)

Kensington Hotels and Resorts

Retail

Kensington Hotels and Resorts

venine cable logo

Manufacturing & Natural Resources

Venine Cable

FRIEM S.p.A

FRIEM S.p.A

Mahasarakham University (MSU)

Mahasarakham University (MSU)

Kensington Hotels and Resorts

Kensington Hotels and Resorts

venine cable logo

Venine Cable

Videos

Samudera Indonesia's IT Transformation: Powering Logistics Excellence with Sangfor Technologies

video-image
Samudera Indonesia's IT Transformation: Powering Logistics Excellence with Sangfor Technologies
video-image
Customer Testimonial - FRIEM SPA x Sangfor Cyber Command
video-image
Cyber Command Correlates with Endpoint Secure to Automatically Deal with Network Threat
video-image
Guy Rosefelt Interview with Cyber Defense Magazine 2022
video-image
The PC Security Channel Security Test for Sangfor Endpoint Secure
video-image
Let Sangfor Protect you Against Ransomware
video-image
Sangfor Cloud-Firewall-Endpoint Integrated Solution

Get in Touch With Us

icon notification

Latest Blog

latsest webinars img
Cyber Security

Cybersecurity Awareness Month CSAM 2023: Key Strategies

Cybersecurity is a growing industry in the modern age. As technology evolves, so do the threats against it. To emphasize the importance of cybersecurity to the public and business sectors, October was deemed the National Cyber Security Awareness Month (CSAM) by the US and is an internationally recognized awareness campaign. Cybersecurity solutions protect businesses and individuals from damage to networks, systems, and data. Businesses are quickly undergoing a digital transformation to keep up with the times. This creates a gaping vulnerability for enterprises only looking to advance their technology. National University has described the top reasons why cyber security is now crucial for businesses: The Protection of Data – Companies need to keep their data secure from breaches or ransomware. This includes personal information, financial records, and propriety intellectual property. A data breach can financially cripple a business and ruin its reputation. Regulatory Compliance – Most businesses are subject to regulations dictating the standard cybersecurity standards to be met for a business to operate lawfully. Cybersecurity solutions ensure that you stay compliant at all times to avoid hefty penalties. Maintaining Business Operations – Preventing downtime is one of the main purposes of good cyber security. A cyber-attack can disrupt operations for long periods – affecting profits, livelihoods, and supply chains. Building Trust – Customers are the cornerstone of a good business. Cyber security measures show that a business cares about data safety and fosters loyal and long-term clients. Staying Ahead – Investing in cybersecurity solutions also demonstrates to the market how seriously you take your business. This gives you a competitive edge and gives you a better – more secure – position in the industry. CISA Cybersecurity Awareness Month 2023 This year, the Cybersecurity and Infrastructure Security Agency (CISA) is marking the 20th annual Cybersecurity Awareness Month. The agency has launched a new awareness program that encourages 4 simple steps to stay safe online. These steps are described as “simple actions we should all take not only during Cybersecurity Awareness Month - but every day throughout the year.” The theme of 2023 is "It's easy to stay safe online." The 4 CISA cybersecurity awareness month steps include: Using Strong Passwords and a Password Manager: The agency has noted that strong passwords are crucial to protecting data in the digital age. Using long, random, and unique passwords that include uppercase, lowercase, numbers, and symbols will go a long way to securing your accounts. Password managers are also ideal for storing and generating strong passwords. Turning on Multi-Factor Authentication (MFA): Using multi-factor authentication protects your accounts and reduces your chances of getting hacked. This feature is especially helpful for social media, email, and finance accounts. Recognizing and Reporting Phishing: Phishing scams make up the majority of data breaches. CISA has asked that the public be vigilant when answering calls, emails, or texts asking for personal information. Avoid sharing any credentials without verifying the source through the official organization. Moreover, try to report any phishing scams you suspect to the relevant authorities or departments. Update Software: The last step is to ensure that your software is updated with the latest security patches. Regularly check for updates to keep your systems running efficiently and securely. Source: CISA Sangfor has already touched on the importance of these issues when discussing Cybersecurity Awareness Month CSAM 2022 and how you can stay protected from cyber threats. Moving into 2023, the cyber threats we face are now rapidly evolved and evolving. To counter this, businesses need to take full advantage of cybersecurity solutions while they still can. Top Enterprise Cyber Threats in 2023 2023 has been a year of great strides in technology. From AI and the Internet of Things to 5G and quantum computing, the future has never looked this bright. However, these steps cannot be taken without the risks casting shadows on their progress. Enterprises are becoming the soft and favorite target of Cyber criminals. In 2022, we have published this highly detailed article on Top Ransomware attacks in 2022. The IT sector has been struggling under the weight of new and advanced cyber threats that are rapidly evolving. The University of San Diego has noted that these threats have placed the data and assets of corporations, governments, and individuals at constant risk. The university further rounded up some of the top cybersecurity threats of 2023 that businesses need to watch out for: Vulnerability in the Cloud While cloud platforms offer many benefits in terms of storage, security, and flexibility – they also present certain risks. The university went on to caution against the following cloud vulnerabilities: Misconfiguration Poor access control Shared tenancy Supply chain vulnerabilities Insecure APIs Lack of multi-factor authentication Data Breaches Data breaches are gaining traction in the modern age. Even large companies are not safe anymore and risk losing billions through compromised data. This article illustrates the recent data breaches in 2022. In addition, not only the EU, but the ASEAN countries also apply fines and penalties to enterprises for the data breaches. Mobile Attacks The popularity of smartphones has made them a growing target for cyber-criminals. Spyware, phishing attacks, and hacking have all gotten easier in the smartphone generation. Complex Phishing The use of machine learning and AI has made phishing scams more sophisticated. Using these technologies, hackers can now make credible-looking phishing scams to manipulate people into downloading malware to steal credentials and personal information. The 2023 Phishing attacks statistics can be read from here. Evolved Ransomware In line with evolved malware, ransomware has also taken a few classes to up the ante. The RaaS – Ransomware As A Service has made hacking simple. RaaS is malware designed by professional coders, designed to be launched against a target quickly and without the need to be an expert coder, hacker or cyber-criminal. Sangfor had a detailed webinar on Hacking Made Simple With Ransomware-as-a-Service. Cryptojacking The university also claimed that cryptocurrency is responsible for the Cryptojacking trend. Basically, cryptocurrency is fueling the ransomware attacks. This involves hackers hijacking a computer’s processing power to “mine” for cryptocurrency. This can cause serious downtime and performance issues for businesses. State-Sponsored Attacks Cybercrime is also an attractive avenue for entire nations looking to infiltrate other governments and attack critical infrastructure. The Russia-Ukraine cyber-attacks have highlighted the dangers of state-sponsored hacking. This emerging threat also poses a danger to thousands of innocent civilians. IoT Attacks Statista noted that the number of devices connected to the Internet of Things is expected to reach 75 billion by 2025. These connections can be useful for businesses to collect data, streamline processes, and stay in touch. However, it’s also a vulnerability having that many devices connected under the threat of a potential cyber-attack. Smart Medical Devices and Electronic Medical Records (EMRs) The healthcare sector is facing rapid digitalization in a race to keep up with emerging technologies. As a result, many of these facilities have fallen behind cybersecurity measures. Cyber-attacks on the healthcare industry can affect thousands of patients. These areas are especially vulnerable to ransomware attacks and phishing scams. A Severe Shortage of Cybersecurity Professionals The university also cited the shortage of cybersecurity talent as a factor in the IT industry’s high alert. As fewer cybersecurity professionals are found, the digital landscape faces an uncertain future. Cyber Security Awareness Month is about understanding the growing threats to your data, networks, and devices. As these trends grow and new ones emerge in 2023, it’s our joint responsibility to mitigate the risks through the use of robust cybersecurity solutions. Cyber Security Implications of Remote Work The COVID-19 pandemic changed the world in several ways. For the business sector, the sudden shift to remote work became a popular setup. Most companies realized that they could cut costs, maximize productivity, and improve employee retention through remote work. Today, the options include a hybrid working model as well. This entails working from home while also visiting the office as needed. While the remote working setup has multiple benefits, it can also present a cybersecurity risk. Securing your network for remote workers can be challenging for most companies. Some of the common cybersecurity challenges faced can include: Remote Accessibility Naturally, a remote worker needs access to the network from wherever they are. However, companies need to be completely certain about who exactly is accessing their files and network at all times. Organizations can set up the Virtual Desktop Infrastructure (VDI). VDI is a technology that virtualizes desktops and hosts them on remote servers. It enables users to access and use their desktop environment and applications from any device and location. Social Engineering Working from home also makes you more vulnerable to phishing scams and other social engineering tactics. Often, workers assume the legitimacy of emails and attachments due to constantly receiving them from the company regularly. Data Loss Remote workers means that company data can often be stored in different locations and on less secure devices. This opens your business up to a potential data breach. Ransomware Virtual Private Networks (VPNs) and Virtual Desktop Infrastructure (VDI) have been widely used to enable remote working conditions. However, the use of these technologies presents a security vulnerability that has been exposed by a hike in ransomware attacks. There has been a direct correlation noted between the rise of remote work and the increase in ransomware attacks. Shadow IT Shadow IT is an unregulated IT solution carried out by novice employees. This includes workers accessing data on their own home devices. Even though well-intentioned, these processes can cause more harm than good and create an attractive vulnerability for hackers. Building a Layered Cybersecurity Defense To fully capitalize on National Cyber Security Awareness Month, companies need to invest in the right tools and services to maintain the best security posture. Enterprises have a responsibility to their customers and workers to build a layered cybersecurity defense. Fortunately, Sangfor’s solutions are available for you. Sangfor Technologies is a leading provider of advanced, integrated, and effective cybersecurity solutions that will enhance your defense plan. Some of the essential tools to build a fully layered and impenetrable defense for business include: Managed Detection and Response This is a solution that finds and mitigates threats before they can damage the network or access data. Sangfor’s Cyber Guardian platform is an MDR cybersecurity platform that combines state-of-the-art AI threat detection technology with the latest global threat intelligence to detect and identify both known and unknown threats. Using logic and skill to analyze threats for context-relevant threat notifications and alerts enhances the effectiveness and value of security operations. Secure Access Service Edge (SASE) Using a SASE solution keeps your cybersecurity agile, secure, and efficient – especially for businesses that need secure direct access between branches or remote offices. Sangfor’s Secure Access solution provides a secure, cloud-based connection throughout the company. The platform also audits both external and internal traffic to ensure consistent network security from malware, viruses, ransomware, and insider threats. Zero-Trust Network Access (ZTNA) Adopting a zero-trust environment for your network assumes that access authorization needs to be re-established often. This prevents the company’s data and network from being accessed by people without those privileges. Employee Training and Awareness More than just cybersecurity platforms and services, the core of any business is the workforce. Your employees are your greatest asset; however, they can also be your greatest liability. National Cybersecurity Awareness Month CSAM is the ideal time to brush up on the cyber hygiene practices that need to be followed by every employee. Educating and training your employees to see the signs of cyber-attack and actively avoid risky cyber behavior can greatly improve your company’s security posture. A well-informed workforce is less likely to click on suspicious links, download dodgy attachments, or put company data at risk. Another key to ensuring employee cyber-safety is to protect the endpoints of your network. Endpoint security is a process of protecting all the endpoints of a network. This includes laptops, cellphones, tablets, desktops, and more. Once secured, these endpoints can’t be infiltrated by malware. Sangfor’s Endpoint Secure platform provides holistic end-to-end protection before, during, and after an attack. Using powerful, multi-layered threat detection, it mitigates all cyber threats seamlessly. Moreover, the platform has the added benefit of being user-friendly and easy to maintain. This accessibility makes it an ideal solution for employee cybersecurity awareness campaigns. Incident Response Preparedness While we can try to stay protected, unfortunately, you can’t always prevent a cyber-attack from happening. This is why it’s equally important to have an actionable incident response plan ready to go. The 2023 Cybersecurity Awareness Month is the ideal time to campaign for a clear and concise Incident Response Plan for your company. This is a set of guidelines to follow after a cyber-attack that prioritizes 3 main aspects: Breach containment Minimizing damage Restoring operations Cyber-attacks can have a huge impact on businesses – regardless of size. However, most small to medium-sized companies balk under the weight of an attack. While prevention is better than a cure, you can’t always be the lucky statistic. Some of the main reasons why businesses need an effective incident response plan are: It allows you to react faster and minimize damage to the network. It can save you the cost of a complete breach. It helps to restore your brand’s reputation. It helps your company stay compliant with your local data regulations. It signifies that your company is prepared in the face of uncertainty. It assures your customers, partners, and potential clients that they’re in safe hands. Making the Most of Cybersecurity Awareness Month Cybersecurity Awareness Month 2023 - CSAM is a teaching moment for us all. In a world caught up in the latest trends, we tend to lose sight of the true nature of working together to achieve greatness. This October Cybersecurity Awareness Month needs to be a reminder to us all that it is only through the collaboration of services, employees, leaders, and governments, that we can truly secure our digital landscape. For cybersecurity and cloud computing solutions that go the extra mile, visit www.sangfor.com to start your secure journey today.   Contact Us for Business Inquiry


Cyber Security

Dallas Ransomware Attack Affects 30,253 People

Ransomware attacks are a growing problem in the digital world. As cyber criminals find new ways to carry out these attacks, they change their victims to more lucrative targets. While a business or individual yields its rewards, hackers are now turning their attention to much bigger fish. The city of Dallas was the latest victim of this trend after a ransomware attack exposed the personal information of 30,253 people. In May 2023, the US city officials confirmed that a number of its servers had been compromised by a ransomware attack. How the Dallas Ransomware Attack Happened On the 3rd of May, the City of Dallas released a statement that its security monitoring tools picked up that a ransomware attack had been launched within the city environment. The city’s IT teams began to actively isolate the ransomware to prevent its spread. The city attempted to remove the ransomware from infected servers to restore any services that were impacted. On May 19th, became aware of a post from what appears to be the Royal ransomware group threatening to release city data. At the time, the release stated that the situation would be monitored and there was no evidence or indication that data had been compromised. According to Bleeping Computer, numerous sources have said that the network printers on the City of Dallas' network began printing out ransom notes claiming responsibility for the ransomware attack. Sourced from Bleeping Computer The Royal ransomware group is known to breach networks using vulnerabilities in Internet-exposed devices but also uses common phishing attacks to gain initial access to corporate networks. Bleeping Computer noted that these Royal phishing attacks will impersonate food delivery and software providers in emails pretending to be subscription renewals. Once in contact, the threat actors manipulate the victims into installing remote access software that allows the group access to the corporate network. The Royal group uses custom encryption according to the joint advisory by the FBI and the US Cybersecurity and Infrastructure Security Agency. The agency also said that Royal attacks have been used since September and have compromised US and international organizations. A blog post by the ransomware group stated that the data would be leaked soon. The post stated that the group would share in the blog “tons of personal information of employees (phones, addresses, credit cards, SSNs, passports), detailed court cases, prisoners, medical information, clients’ information and thousands and thousands of governmental documents.” Sourced from www.govtech.com Impact of the Dallas Ransomware Attack Once the ransomware attack happened in May, multiple critical areas of the city were affected. Several servers were compromised by the attack and more were intentionally taken offline to prevent the bad software from spreading. This led to several departments being hampered and some city services being unavailable. The Dallas ransomware attack affected: The Dallas Police Department 311 Customer Service app Dallas City Courts Dallas Water Utilities Code Compliance Services Dallas Animal Services The City Secretary’s Office Development Services The Dallas Municipal Court posted a notice on its site that all jury trials and jury duties were canceled for the day. Jason Evans, the Dallas Fire-Rescue spokesman, said that the incident also led to problems with the computer-assisted dispatch system used to help first responders respond to emergency calls. Eddie García, the Dallas police chief, revealed in a written statement that the department’s operations were also “significantly impacted” by the outage. The system used by the Dallas police for offense reports and jail intake was also affected - prompting personnel to conduct those tasks manually. On the 7th of August, the Attorney General's office made public a report that disclosed that 26,212 people were affected by the breach. The report further claimed that compromised data included sensitive information such as names, addresses, social security numbers, and medical and health insurance information. However, the total number rose by almost 3000 later on. According to Catherine Cuellar, the city’s communications director, the attorney general’s office initially excluded people for whom the city didn’t have addresses. The United States Department of Health and Human Services Office for Civil Rights has now started investigating the Dallas ransomware attack. Gabriela Sibori, an HHS press secretary, confirmed that an investigation by the department’s civil rights office was ongoing. The city only reported the data breach to the agency earlier this month. The notice was published 97 days after the city first disclosed the ransomware attack. Cuellar stated that the delay was due to the investigation into the breach only wrapping up in late July. State law requires that organizations disclose data breaches to the attorney general’s office no more than 60 days after their discovery. According to the notice, the personal information from 30,253 people in Dallas’ self-insured group health plans was exposed during the breach - which started on the 7th of April but wasn’t detected by the city until the 3rd of May. However, Dallas officials also say that they knew by June 14 that hackers had accessed personal information stored on city servers. This wasn’t disclosed until the 18th of July when City Manager, T.C. Broadnax, sent an email to city employees saying some human resources department data was compromised during the attack. Gabriela Sibori said that these investigations are done with "every large breach reported by a HIPAA-regulated entity." This is the largest data breach disclosed by a Texas city to the attorney general’s office this year. The city of Dallas has sent almost 27,000 letters to mostly employees, retirees, and their relatives giving notice that their personal information was exposed and offering two years of free credit monitoring and identity theft insurance. Lessons Learned from the Dallas Ransomware Attack: How Cities Can Prevent Cyber-Attacks According to the Dallas Police Association President, Michael Mata, his biggest concern is the lack of transparency from the city. The city should have taken proactive steps in the very beginning, rather than having to be pushed for it. Hopefully the city realizes that there are some city services and those critical infrastructures that have to maintain service availability. Michael Mata, President of the Dallas Police Association The City of Dallas said networks are 99% restored and the Dallas City Council has approved US$ 8.6 million to pay for services related to the breach. Cities rely on digital infrastructure to keep functioning. It’s crucial to be prepared for a cyber-attack in the modern world. In April, CISA published its Cybersecurity Best Practices for Smart Cities report. In the report, the agency notes that cities being more reliant on technology has expanded the attack surface for cyber-attacks. The report warns that successful cyber-attacks could lead to disruption of infrastructure services, significant financial losses, exposure of citizens’ private data, erosion of citizens’ trust in the smart systems themselves, and physical impacts to infrastructure that could cause physical harm or loss of life.” A key way to prevent these cyber-attacks is to introduce proper cyber hygiene practices in the workplace and homes alike. These are practices that ensure that your networks are protected and your online habits don’t invite hackers. Some of the tips and practices for a better defense against cyber-attacks include: Principle of least privilege. Multifactor authentication (MFA). Zero Trust Architecture. Updating software regularly. Avoiding suspicious email links and websites. Ensuring that downloaded files are in the correct format and have the right extensions. Installing proactive antivirus protection and Endpoint Security.  Backing up important files and data. Avoiding pop-up ads. Not paying any ransom amounts to the criminals. Maintaining the best cybersecurity measures available. Sangfor Technologies is a world-class cybersecurity and cloud computing company that offers intensive and advanced Anti-Ransomware prevention and state-of-the-art IT infrastructure. Protect your data and network from ransomware attacks using the Sangfor Next-Generation Firewall (NGFW) integrated with Endpoint Security to identify malicious files at both the network level and endpoints and so much more. For more information on Sangfor’s cyber security and cloud computing solutions, please visit www.sangfor.com.   Contact Us for Business Inquiry


Cyber Security

Rhysida Ransomware: Everything You Need to Know

Ransomware has been a growing problem across the world. With new technology and evolving techniques, ransomware variants are getting harder to stop. The newest addition to this problem is the Rhysida ransomware. The Rhysida ransomware has made a name for itself after a string of attacks against healthcare organizations. Coming onto the scene in May 2023, the Rhysida ransomware has gained more traction. Some of the noted victims of the ransomware group so far include the Chilean Army. On the 29th of May, the army shared that its systems were disrupted by a breach. Rhysida then published around 360,000 Chilean Army documents. According to the group, that only made up 30% of the loot. Prospect Medical Holdings was also the victim of the Rhysida ransomware in early August. The attack affected 16 hospitals and 166 other medical facilities across the United States. This cyber-attack was deemed the largest one on a US hospital system since last year. What Is the Rhysida Ransomware? On the 4th of August 2023, the Health Sector Cybersecurity Coordination Center (HC3) released a security alert about the Rhysida ransomware. It was detected as Ransom.PS1.RHYSIDA.SM. According to the alert, the Rhysida Group emerged in May on the dark web with a victim support chat portal. The Ransomware-as-a-Service gang presents itself as a “cybersecurity team” offering to assist victims in finding security weaknesses within their networks and system. Emerging at the end of May 2023, it quickly marked its way up the ladder. Since June 2023, the ransomware group has 8 victims listed on its data leak website. The security alert described Rhysida as “a 64-bit Portable Executable (PE) Windows cryptographic ransomware application compiled using MINGW/GCC.” In each sample analyzed, the application’s program name is set to Rhysida-0.1 which suggests that the tool is in the early stages of development. A notable characteristic of the tool is its plain-text strings revealing registry modification commands. Some of the techniques, tactics, and tools (TTPs) used by the Rhysida ransomware have been compared to those of Vice Society. Security experts noted striking similarities between the two ransomware groups that suggest that Vice Society may have adopted Rhysida as one of its preferred ransomware payloads. The similarities include the use of remote desktop protocol (RDP) connections, remote PowerShell sessions (WinRM), and the use of tools like PsExec for lateral movement. The interest in education and healthcare sectors also adds to this theory. Who Does Rhysida Target? The HH3 security alert signaled that the Rhysida ransomware has victims distributed throughout several countries across Western Europe, North and South America, and Australia. The majority of the victims so far have been based in the US, the UK, Italy, Spain, and Austria. The group is said to primarily attack education, government, manufacturing, technology, and managed service provider sectors. However, there have been recent attacks against the Healthcare and Public Health (HPH) sectors as well. While most ransomware groups steer clear of hospitals and healthcare facilities, the Rhysida ransomware group does not seem swayed by the same moral conflict. How Does Rhysida Work? The Rhysida ransomware is deployed in multiple ways. The group is known to rely on phishing attacks and Cobalt Strike to breach networks and deploy their payloads. Cobalt strike is a penetration testing tool often used by hackers for its advanced exploitation capabilities. After the Rhysida ransomware enters the victim’s machine through the phishing lures, Cobalt Strike is used for lateral movement within the system. The telemetry by security experts has also shown that the threat actors execute PsExec to deploy PowerShell scripts and the Rhysida ransomware payload itself. Bleeping Computer reported that the PowerShell scripts used by Rhysida operators terminate antivirus processes, delete shadow copies, modify Remote Desktop Protocol configurations, and change the active directory (AD) password. While a ransomware encryptor usually handles these tasks, the Rhysida ransomware uses external scripts to achieve the same purposes. This all indicates the locker's active development. Another report also confirms that the most recent Rhysida locker uses a 4096-bit RSA key with the ChaCha20 algorithm for file encryption and now excludes several directories. When the Rhysida ransomware runs, security experts noticed an output from the command line which scans the files, runs the “file_to_crypt” function, and if successful, changes the file extension to “.rhysida”. The attack methods are not specific to any organization which means that any sector could be a potential target. After successful encryption, the ransomware leaves behind a PDF ransom note instructing the victims to contact the group via their portal and pay in Bitcoin. The use of PDF notes also shows that the group is not targeting command-line operating systems used on network devices or servers. Sourced from Bleeping Computer The Rhysida group threatens to expose the stolen data if the ransom isn’t paid. This means that they can be categorized as a double-extortion ransomware group. How to Protect from Rhysida Ransomware Companies and individuals alike need to invest in better cybersecurity measures, practices, and education to keep safe in a time of complex and rapidly evolving ransomware. Some of the steps provided by the HH3 security alert for the Rhysida ransomware included: Virtual Patching – This ensures an additional layer of protection against any software vulnerabilities - which the Rhysida ransomware is known to exploit. Cyber Hygiene Training – Your employees are your greatest asset and they should be prepared and practice good cyber hygiene to ensure a secure network at all times. Endpoint Security – Advanced endpoint security will prevent, fight, and eliminate any cyber threats attempting to enter your network. Sangfor’s Endpoint Secure platform provides a holistic response to malware infections and APT breaches. It’s also easy to manage, offers end-to-end protection, and can be tailored to your needs. Backups – A company can ensure data safety by investing in reliable data backup solutions. Sangfor’s disaster recovery solutions offer the best backup and optimized infrastructure platforms. Network and Access Segmentation – This is the limiting of access and workloads across the network which prevents the spread of ransomware once under attack. Firewalls – The use of a good firewall will ensure your network’s safety by detecting and mitigating potential threats before they cause damage. Sangfor’s Next-Generation Firewall is designed to inspect network and application traffic for threats, secure the network environment from intrusion, and bring in security intelligence from outside the network. Sangfor NGAF A few more tips that one can use to maintain their cyber resilience are: Updating software regularly. Avoid suspicious email links, pop-up ads, and sketchy websites. Ensuring that downloaded files are in the correct format and have the right extensions. Not paying any ransom amounts to the criminals. Maintaining the best cybersecurity measures available. Sangfor Technologies is a world-class cybersecurity and cloud computing company that offers intensive and advanced Anti-Ransomware prevention and state-of-the-art IT infrastructure. Sangfor provides complete and holistic cybersecurity solutions for your company that will protect you from ransomware attacks.   Contact Us for Business Inquiry


Latest News

latest news img
News

Sangfor Technologies Ranked as a Global Top 5 Vendor for Enterprise WLAN Controllers in Gartner® Market Share

A Global Top 5 Vendor for Enterprise WLAN Controllers Gartner recently released "Market Share: Enterprise Network Equipment by Market Segment, Worldwide, 1Q231." According to the report, Sangfor Technologies (via its subsidiary Sundray Technology), ranked among the top five vendors in the world for Enterprise WLAN Controller by revenue in 2022 and Q1 of 2023. We believe our success is attributed to our superior networking products, which have garnered significant market recognition. Sundray Technology (hereafter referred to as Sundray) is a wholly-owned subsidiary of Sangfor Technologies (hereafter referred to as Sangfor). Founded in 2000, Sangfor has established four core business segments: cyber security, cloud computing, IT infrastructure, and IoT. Under this structure, Sangfor specializes in cyber security and cloud computing, while Sundray concentrates on network infrastructure and IoT. Tackling Modern Network Challenges Through Industry Specialization Digital transformation is driving new challenges in enterprise networks. As cyber threats advance and multiply, concerns about data and network security have intensified. Network maintenance challenges have also become more pronounced, prompting companies to seek more efficient and intelligent solutions. AI technology has emerged as a critical tool for enhancing network performance and resilience, from network monitoring to swift AI-driven interventions. These trends are shaping the future of enterprise networks, fueling continuous innovations and advancements in networking technology. Sundray’s achievements are attributed to its consistent focus on industry specialization, catering to the complex demands of sectors like healthcare, finance, education, manufacturing, commerce, and government. In constantly refining our understanding of customer needs, we've delved deep into unique industry requirements and challenges, making regular product refinements based on market feedback. Our enterprise WLAN controllers excel in terms of flexibility and scalability, meeting the intricate demands of various industries. In the healthcare sector, for example, we offer highly secure and stable wireless network solutions to support modern mobile healthcare and remote medical services. In finance, our high-performance and reliable wireless networks ensure the utmost security and user experience. For education, we provide easily managed, integrated wireless networks for seamless connectivity among students and staff. About Sundray Enterprise WLAN Controllers Sundray’s enterprise-grade WLAN controllers are proprietary high-performance networking devices. They are equipped to manage a broad spectrum of Sundray products, including network access points and switches. The devices integrate a range of functionalities, from Sundray's next-gen network controllers to firewall systems and unified wired and wireless management systems. Supporting multiple authentication methods, detailed user behavior management, flexible QoS control, integrated wired and wireless management, and the ability to detect, locate, and block potential network threats, we offer users a unified, convenient, secure, efficient, and flexible network management platform. Sundray's innovation trajectory in WLAN controller products mirrors Sangfor's relentless pursuit of technical excellence. Embracing a customer-first ethos, we consistently innovate to meet core business needs, aspiring to develop best-in-class, technologically superior wireless enterprise solutions.   Sources 1. Gartner, Inc., Market Share: Enterprise Network Equipment by Market Segment, Worldwide, 1Q23, By Christian Canales et al., Published July 7, 2023 Disclaimer GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission.  Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.


Press Release

Official Launch of Sangfor Access Secure - A Revolutionary SASE Solution in Thailand

Introducing Unprecedented SASE Capabilities with Local POP for Enhanced Data Sovereignty Sangfor Technologies, a pioneering global provider of cyber security and cloud computing solutions, proudly launches Sangfor Access Secure – an innovative Secure Access Service Edge (SASE) solution – in Thailand. This new product showcases Sangfor's continuous commitment to developing cutting-edge technology and caters to local data sovereignty regulations. The solution marks a monumental step in unifying both network and security services under a cloud-centric framework – enhancing operational efficiency, simplifying processes, and optimizing costs. What sets Sangfor Access Secure apart is its emphasis on data sovereignty, made possible through localized data processing. This crucial feature enables Thai enterprises to comply with domestic data protection laws while enjoying the premium connectivity and performance of Sangfor's international SASE infrastructure. Perfect for businesses across all industries, this SASE solution addresses modern security and networking challenges, including remote work, international collaboration, and ever-increasing demand for greater application performance. Its distinctive design ensures fluid, secure, and rapid connectivity, positioning it as a transformative tool in the contemporary digital landscape. As a cloud-native platform, Sangfor Access Secure effortlessly scales with your business's evolution, promising consistent connectivity and outstanding digital performance. Enhanced visibility and real-time analytics give users a comprehensive view of their network operations, elevating performance, bolstering security, and fostering informed decision-making. The platform also prides itself on its advanced cybersecurity features. Powered by AI-driven threat detection, it safeguards your network and data from sophisticated cyber threats. All these capabilities are accessible through a user-friendly central management interface, ensuring that businesses can easily grasp the status of their networks at a glance. Introducing Sangfor Access Secure to Thailand is a significant moment for us. We aim to empower businesses to tap into world-class, secure connectivity without overlooking the significance of local data sovereignty. When considering the Total Cost of Ownership (TCO), our solution offers up to an 80% cost-saving compared to traditional tools like NGFW, SWG, EDR, among others. Thuchapon Intaphrome, Country Manager of Sangfor Technologies Thailand In celebration of the launch, Sangfor will host an online Zoom webinar in Thai on the 28th of August 2023 from 14:00 - 16:00 pm local Thai time (GMT+7). Participants can delve deeper into the features of Sangfor Access Secure and engage directly with the product experts during a Q&A. To be a part of this enlightening webinar, follow this "LINK" and stand a chance to win in our lucky draw. For a detailed overview of Sangfor Access Secure, check out this link. About Sangfor Sangfor Technologies is an APAC-based, leading global vendor of cybersecurity and cloud computing solutions. Visit us at www.sangfor.com for more information. Contacts Sunny Sun Marketing Manager Marketing@sangfor.com


Press Release

Sangfor Technologies Officially Launches Its Cyber Guardian MDR (Managed Detection and Response) Services in Asia Pacific

Expanding Premier MDR Services to Enhance Cybersecurity for Organizations Sangfor Technologies is a leading cybersecurity and cloud infrastructure provider and has deployed the most advanced integrated security platforms to ensure the best solutions and IT architecture for growing organizations. Sangfor is excited to officially launch its Cyber Guardian MDR (Managed Detection and Response) service to make cybersecurity more efficient and cost-effective for companies within the Asia Pacific (APAC) region. Having established Cyber Guardian MDR as a robust and formidable cybersecurity solution in Malaysia in July of 2021, Sangfor is now expanding its reach by empowering all businesses throughout APAC. Sangfor’s Cyber Guardian MDR is a leading Managed Detection and Response (MDR) service leveraging advanced purpose-built AI technology, extensive incident response experience, and proven methodologies to deliver the most relevant response recommendations and ensure accurate threat detection. Sangfor understands the growing dangers organizations face daily in a modern digital world. Sophisticated and rapidly evolving threats are constantly working to undermine and destabilize infrastructure. Sangfor’s Cyber Guardian MDR services provides continuous and consistent protection, monitoring, and response. This service ensures real-time notifications about threats, vulnerabilities, and indicators of cyber-attacks. We keep you updated on relevant cyber threats while providing regular remediation recommendations and solutions. These advisories help your company overcome security incidents while improving overall cybersecurity. At Sangfor, we know that teamwork makes a successful company. That’s why we’ve applied the same philosophy to our services. While Cyber Guardian MDR is a stellar service offering by itself, when integrated with other Sangfor solutions, your company will enjoy 360-degree cybersecurity. Enhance your ransomware protection with Cyber Guardian MDR by integrating Sangfor’s Next-Generation Firewall and Endpoint Secure using Sangfor’s XDDR Security Framework. For even more robust cybersecurity, combine Sangfor’s Cyber Command with Cyber Guardian MDR for elite threat detection and simplified threat analysis. If you’re a small to medium-sized business, simply choose Sangfor’s Endpoint Secure with the Cyber Guardian MDR services for cost-effective and efficient cybersecurity. Don’t worry, you can expand quickly and easily because Sangfor makes Your digital transformation simpler and more secure. Cyber Guardian MDR is based on Sangfor’s core patented innovations in network and endpoint protection and detection that have made Sangfor’s Cyber Command, Next-Generation Firewall, and Endpoint Secure solutions global leaders. Sangfor is proud to release this advanced service offering to the APAC region and beyond so Your organization can transcend the current digital threat landscape. Cyber Guardian MDR leverages our vast team of battle-tested security experts to respond to Your needs quickly and effectively. The service is uniquely designed to provide more than just threat detection and mitigation by making sure Your organization is prepared for future threats as well. Look towards the future of cybersecurity and IT infrastructure. Look to Sangfor Technologies. For more information about Sangfor’s Cyber Guardian MDR service and other Cyber Guardian security services, please visit this link. About Sangfor Technologies Sangfor Technologies is an APAC-based, global leading vendor of IT infrastructure solutions specializing in cybersecurity and cloud computing. Visit us at www.sangfor.com for more information. Contact: Sunny Sun Marketing Manager sunny.sun@sangfor.com


Frequently Asked Question

You can install Endpoint Secure Protect on a system with another AV or EDR installed. During the installation, you will be asked if there is other anti-virus software installed. If you say “yes”, the installation will ask if you want to continue. If you choose to continue with the installation, the installation will continue in compatibility mode and the Protect agent will automatically disable real-time protection to not interfere with operation of the existing AV agent.

The Endpoint Secure management server includes the NGAF WAF module to prevent web-based attacks. Both the hardware and virtual versions of the management server are assessed by Sangfor’s BlueSecOps Team to determine if any risks or vulnerabilities exist. Security hardening is performed to minimize attack surfaces by closing all unnecessary ports and services.

Yes, you can choose when agent groups or individual agents are upgraded. This gives you flexibility and control to stagger or delay agent upgrades based on organizational needs.