Comprehensive Ransomware Security Built for the Enterprise

The only platform designed from the ground up to fight ransomware from attack initiation to extortion, reducing your risk of downtime, data loss, and brand damage.

Halcyon product use interface

Bad Actors Never Sleep. Neither Do We.

Comprehensive Ransomware Security Requires a Layered Approach

1
DURABLE PREVENTION

Prevent ransomware before it begins

We train our AI/ML prevention models on one of the largest ransomware repositories in the world, making it nearly impossible for an attacker to slip one past our prevention. We also act as bodyguards for your other security tools, making sure an attacker doesn’t tamper or bypass them.

2
DATA EXFILTRATION PREVENTION

Stop attackers from stealing your data

Attackers will steal your data before they let you know that you are under attack, giving them more leverage to get you to pay. With Data Exfiltration Prevention (DXP), we eliminate that leverage by keeping your data secure, making it harder for them to pressure you to pay.

3
Real-Time Recovery

Reduce recovery to hours not weeks

Reduce your mean time to recovery by up to 90%, without relying on backups. Halcyon agents intercept encryption keys and recover the affected endpoints at the system level. This effectively eliminates all the risks of restoring from backup like operational disruption, data loss, downtime, or restoration failures.

Mitigating Ransomware Impacts Across the Enterprise

Ransomware impacts everyone in the organization, from the CEO to the front-line manager and beyond. With Halcyon, you can ensure an attempted attack won’t ruin anyone’s day.

Keep the business running no matter what happens

For our customers the risk of ransomware disrupting normal business operations is a thing of the past. With our ability fight ransomware from initial access to extortion attempt the likelihood of a damaging attack couldn’t be lower.

Guard against damage to your brand reputation, and bottom line

Organizations suffering a widespread ransomware attack could feel the impacts for weeks, months, and even years in damage to their brand and reputation, not to mention the overall cost incurred. Halcyon’s comprehensive approach to ransomware security minimizes the risk that you and your organization will experience any of these pains.

Seamlessly incorporate ransomware security into your workflows without slowing down your environment

Not only does our lightweight agent use as little resources as possible on your endpoints and servers while keeping you safe from ransomware, but it also ensures your other endpoint security products are tamper-proof. The ultimate in ransomware protection packed into one simple-to-deploy agent.

Incident responders

Harden your environment with detailed attack analysis

Stopping a ransomware outbreak is what Halcyon does best, and now with the critical data we collect you can understand how an attacker compromised your environment and take steps to harden your environment from future attacks as well as meet compliance requirements.

SOC Analysts working

Speed up ransomware investigations without breaking a sweat

Halcyon takes the guesswork out of rogue process identification, speeding the investigation process. With a hands-free approach to configuration Halcyon delivers ransomware-related alerts automatically without any of the headaches common with advanced security products.

Halcyon Logo Icon only

How Halcyon Works

PREVENTION FIRST

Using purpose-built AI/ML models Halcyon identifies ransomware before it can execute, rendering the attack harmless. To date Halcyon has prevented over 10,000 ransomware attacks from executing automatically.

KNOW YOUR ADVERSARY

With dozens of years of in-the-field experience fighting ransomware, and hundreds of hours of in-depth research, Halcyon has a unique understanding of how ransomware actors behave, making it easy for us to spot them and disrupt their attacks.

HOPE IS NOT A STRATEGY

While many vendors hope their prevention capabilities will stop an attack, we know that every security product ever built eventually gets bypassed. Therefore, we designed multiple fail-safe features in Halcyon, enabling us to capture encryption keys, protect your other security products, and the ability to automatically decrypt your files if needed.

THE HALCYON PLATFORM
RANSOMWARE PREVENTION
Prevention Engine
Next-Gen Behavioral Modeling
Sidekick Protection
RANSOMWARE RECOVERY
Key Material Interception
Automated Decryption
VSS Protection
RANSOMWAR DXP
Data Exfiltration Prevention
Ransomware Early Warning
HalcYon Services: Strategy + RECOVERY
PRE-RANSOMWARE
Ransomware Readiness Assessment
RaaS Incident Tabletop Exercise
POST-RANSOMWARE
Ransomware Emergency Response
Keyless Rapid Recovery Service

Windows OS Environments

Windows Server
2012 x64
2016
2019
2022
Windows Desktop
Windows 10
Windows 11

Other OS Environments

Linux
RHEL 8, 9
Debian 11, 12
Ubuntu 22.04, 24.04 LTS
AWS 2023
Oracle 8, 9
Rocky 8, 9
Alma 8, 9
Halcyon Agent Information

Low Footprint,
High Performance

Halcyon understands every admin has “agent fatigue” and we value the importance of minimizing system impact. Our agent has been deployed to over one million systems with zero compatibility issues or conflicts with other tools.

Constant Performance Testing

Minimal Resource Impact

Security Stack Compatibility

Extended Agent Capabilities

Key Features & Benefits

Halcyon is the only solution designed to protect you from a ransomware attack from initiation through ransom demand.

Pre-Execution Prevention

Using purpose-built AI models trained exclusively on ransomware, Halcyon can detect and prevent files and applications exhibiting ransomware attributes from executing, including never-before-seen strains.

Tamper-Proofing Your Stack

Built-in self-protection capabilities restrict attackers from stopping services, modifying system files, or triggering malicious content. If our agent stops unexpectedly, an emergency signal, known as Last Gasp, notifies users immediately.

Ransomware Response Engine

Trigger the automated decryption of data encrypted during a ransomware attack, eliminating the need for manual-intensive user intervention to return to a trusted state.

Key Material Capture

Automatically captures the keys and entropy used by attackers during a ransomware encryption event enabling the swift recovery of any encrypted data.

Data Exfiltration Prevention

Ransomware-tuned data protection that automatically detects the attempted exfiltration of data using a combination of suspicious IPS, DNS, volume threshold, and more, to mitigate any attempts by an attacker to "double-extort" your organization.

Linux Ransomware Security

Comprehensive ransomware security for Linux machines, including lateral movement/brute force protection, SSH configuration and monitoring, malicious file creation prevention and automated ransomware response.

Recovery & Resilience

Encryption Event Detected

Halcyon detects ransomware attacks in real time while proactively looking for indicators of ransomware, triggering automated response playbooks.

A computer screen with a Halion Alert program open.

Key Materials Captured

Halcyon captures key materials during the ransomware encryption event and safely stores them from tampering.

A computer screen with a web page that says "Alert" on it.

Automated Investigation

Ransomware recovery process begins, to ensure stable business operations as quickly as possible. Artifacts are collected and preserved for future investigation.

A screenshot of a computer screen showing a list of assets.

Decryptor Activated

A decryptor deployed by Halcyon starts decryption via collected key material, and state-of-the-art ransomware encryption bypass methods.

A computer screen with a Halion Alert program open.

System Restored Without Backups

System(s) are restored to operational within minutes or hours thanks to keyless decryption. Restoring happens at the system level to avoid backup failure risk.

A computer screen with a Halion Alert program open.

Become Ransomware Resilient

Talk to a Halcyon Services expert to learn more.

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Cookie Consent

By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.