FAQ

What is Ransomware?

Ransomware is a type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid. More modern ransomware families, collectively categorized as crypto-ransomware, encrypt certain file types on infected systems and forces users to pay the ransom through certain online payment methods to get a decrypt key.

What is TOR?

TOR, also known as The Onion Router, conceals its users' identities and their online activity from surveillance and traffic analysis by separating identification and routing. It is an implementation of onion routing, which encrypts and then randomly bounces communications through a network of relays run by volunteers around the globe.

What is malware?

Malware, short for malicious software, is an umbrella term used to refer to a variety of forms of hostile or intrusive software, including computer viruses, worms, Trojan horses, ransomware, spyware, adware, scareware, and other malicious programs. It can take the form of executable code, scripts, active content, and other software. 

How does Known Networks® reduce false positive?

Known Networks® reduces false positives by providing the analyst the capability to filter out network traffic that is un-actionable or uninterested in.  This filtering can account for over 50% of the network traffic, thus allowing the analyst to focus on the true threat to the organization.

What is Musubu®?

Musubu the word, is Japanese and is defined as “the point at which all things come together”.  Musubu® the R2i product is an automated threat intelligence triage and reputation service utility for IP addresses at the point of collection (the edge) which provides context to analysts.  It “pulls together” all of network threat intelligence R2i has collected for over 3 years.

What is the Difference Between Raw Data and Threat Intelligence?

Raw Threat Data:
Raw Threat Data is any data that is directly gathered, without enrichment, and acted on as preventive measure or a response to an action.  This data alone is commonly mislabeled as “intelligence”.

Threat Intelligence:
Threat intelligence is information that has been enriched (analyzed) using context, relevance, accuracy, or known associations with other information and applied specifically to the organization and its use cases. Threat intelligence enables you to identify and contextualize your adversaries. Once you understand your adversary, you can take decisive action to better protect your organization.

Are we exposed to malicious actors?

Everyone is exposed, so it's prudent to continually assess your posture.  Release 2 Innovations offers a managed, comprehensive exposure assessment to identify and document evidence of exposure, with specific recommendations on what actions to take. The Release 2 Innovations Passive Perimeter Evaluation (PPE) will provide information on: exposed systems; potential for data loss; compromised information; dark web exposure; susceptibility to ransomware; training on phishing; and recommendations on how to address these issues. The Release 2 Innovations PPE leverages actual tools, tradecraft and processes employed by malicious actors, resulting in real world, relevant, actionable results.

Request a demo today!

Are we the victim of compromise or a potential data breach?

Your business data is your livelihood.  Release 2 Innovations offers a managed, comprehensive exposure assessment to identify and document evidence of exposure with specific recommendations on what actions to take. The Release 2 Innovations Passive Perimeter Evaluation (PPE) will identify any potential evidence of compromise or data breach and provide tailored courses of action. The Release 2 Innovations PPE leverages actual tools, tradecraft and processes employed by malicious actors, resulting in real world, relevant, actionable results.

Request a demo today!

How does our organization stay protected?

Release 2 Innovations provides a managed offering which will perform continuous diagnostics and monitoring of your network perimeter defenses, potential for exposure, dark web information and evidence of compromise. The Release 2 Innovations Passive Perimeter Evaluation (PPE) will identify any potential evidence of compromise or data breach and provide tailored courses of action. How is the Release 2 Innovations different? The Release 2 Innovations PPE leverages actual tools, tradecraft and processes employed by malicious actors, resulting in real world, relevant, actionable results.

Request a demo today!

How does our organization develop a safe software baseline?

Release 2 Innovations provides a managed offering which will work with your organization to develop a safe software baseline. As the needs of your organization evolve, Release 2 Innovations will work with your organization to ensure that any potential risks posed by your software baseline are identified before they result in exposure.

Request a consultation today!