Additional Info

CompanyAlchemi Data Management
Websitehttp://www.shieldcrs.com
Company size (employees)10 to 49
Headquarters RegionNorth America

Overview

Alchemi Data Management’s ShieldCRS platform identifies, isolates and remediates threats such as ransomware, IP theft and other digital sabotage. ShieldCRS stands out in a crowded cybersecurity sector due to its ability to bring together compliance, data resilience and overall security into one platform that provides peace of mind like no other solution available today. It provides the unique ability to rollback any affected files to their state before an attack without going to backups or other third-party systems. Through its unique location within the network, ShieldCRS is agentless with no client software and unobtrusively arms enterprises with the threat identification, isolation capabilities, and remediation steps needed to protect against soaring attacks. Whether born of malice or mistake, insider threats can devastate an organization in seconds. ShieldCRS empowers organizations to detect and neutralize these dangers before they become catastrophic.

Key Capabilities / Features

● Audit/Accountability – Automated reporting streamlines regulatory adherence, saving time and reducing errors


● Compliance – Simplified compliance with GDPR, HIPAA, CMMC, and other key regulations, turning challenges into opportunities for enhanced data security


● High Availability – Automatic failover ensures access to files are available to users regardless of network or storage system failures


● Risk Management – Enables the implementation of frameworks and controls to mitigate insider threats


● Redundancy – Multiple copies of an organization’s data are placed across multiple targets to ensure if one copy fails, data remains accessible in real time


How we are different

The unique foundational capabilities within ShieldCRS include:


● Detection – Using a powerful combination of behavior analytics and artificial intelligence to that help distinguish between normal behavior and malicious activity


● Isolation – The source of an attack is isolated while the organization continues to operate


● Remediation – All affected files are quickly and simply restored to their pre-attack state without the need to go to backups


  • Vote for this Nomination
    (click the thumbs-up icon to cast your vote)

Browse Award Nominations