Warning Cookies are used on this site to provide the best user experience. If you continue, we assume that you agree to receive cookies from this site. OK

Total data protection

30.00
data-neus-16520
In stock
+
Buy now with 1-click

How Does Mirror Shielding Work?

Imagine at work you had an important meeting with several coworkers to draw up a business plan. The business plan would be sketched out on a whiteboard and take several days to complete, meaning it would be left overnight where others could access it. However, unless you wrote it with permanent marker, it would be quite easy for someone to come by and erase it or modify it. You could put a note on the whiteboard to tell everyone not to erase it, but people may miss the note or just ignore it.

One way you could protect the whiteboard would be to put a piece of glass over it. Anyone who tried to write over or erase it would only affect the glass, the whiteboard behind the glass would be protected. When you come back the next day you can just wipe off the glass and your business plan would remain intact.

 

Mirror Shielding

This is similar to how Mirror Shielding™ works. When NeuShield Data Sentinel is installed it adds a barrier to your protected files preventing them from direct changes. When an application tries to modify a protected file, it gets redirected and the file modification is stored on an overlay, keeping the original file intact. Later, if you want to go back to the original file you can simply delete the data on the overlay. This process of deleting data on the overlay is called reverting changes.

 

Reverting

Reverting is useful for undoing changes to your files that you don’t want. For instance, if you accidentally save a new document over the top of an existing document you can go back to your original document. It is also useful in cybersecurity by allowing you to reverse undesired changes that ransomware or other malware does. When ransomware tries to encrypt your files, the encrypted files are stored on an overlay, but the underlying files are never changed. You can simply revert changes, which will delete the encrypted data, allowing you to access your original, unencrypted files again. 

 
 

Performance

This method of recovering files is also useful for performance. It is significantly faster to delete a file than to copy or restore a file, which is what a backup does. Because of this NeuShield Data Sentinel can recover data almost instantly, no matter how much data is being protected.

But it is not just reverting files that is quick. Since the overlay only stores file changes, which need to be written to the disk anyways, there is virtually no performance overhead on your actual disk. NeuShield Data Sentinel can protect files with virtually no impact to your computer’s overall performance.

 

 


   

The war on Ransomware is over 

NeuShield Data Sentinel does more than just detecting and blocking ransomware attacks. We’re the only anti-ransomware technology that can recover your damaged data from malicious software attacks without a backup. Data Sentinel uses Mirror Shielding™ to protect files ensuring that you can instantly recover your important data from any ransomware attack.

Patented technology that adds a barrier to protected files preventing them from being modified. Mirror Shielding™ makes an attacker believe they have access to a computer’s original data files, but they are in fact only seeing a mirror image of them. Restores operating system files and settings back to a known good state allowing you to quickly regain access to your computer after a ransomware attack. One-Click Restore also removes both known and unknown malware. Protects local cloud drive folders allowing destroyed or corrupted data to be recovered quickly without an Internet connection. Supports popular solutions, such as: OneDrive, Google Drive, DropBox, and Box.com.
Protects the boot portion of a drive to prevent aggressive types of ransomware from taking over the boot process and preventing applications from writing to the boot record. Leverages Mirror Shielding™ to create copies of modified data at different points in time. Data Engrams™ work like file revision history, allowing files to be restored to previous versions. Monitors all direct disk access preventing malicious programs from destroying data on the hard drive or SSD. Protects against destructive ransomware or wipers that attempt to wipe the disk.
Temporarily blocks write access to protected files preventing them from being modified during an active attack from Fully UnDetectable (FUD) ransomware. Extremely small client engine using less than 10MBs of memory, making decisions about critical files with virtually no CPU or disk (IOPS) overhead.

 

 

 

 

 

Software Features

Software Compatibility:
  • For Windows
  • For Mac
Years of licence:
1 year
Computer protection:
Yes
Number of licenses / device:
1 license / device
Prevention of attacks:
Yes
Hackers protection:
Yes
Ransomware Protection:
Yes
Data recovery:
Yes
Operating system recovery:
Yes

No posts found

Write a review