Veriato RansomSafe

Ignore The Ransom Note, Recover Your Encrypted Files, Save Your Company Money And Be The Hero.

Installs And Configures In Less Than 10 Minutes.

Veriato RansomSafe™ acts as a vital layer in your ransomware defense, combining just-in-time data protection with multiple mechanisms to detect, and shut down attacks before they hold your business hostage.


Should ransomware reach your file server, Veriato RansomSafe™ detects the attack and shuts it down before your data is encrypted.

Fail-Safe Backups

RansomSafe™ backs up your files before they are changed, making a pristine copy of the latest version of your files.

Rapid Recovery

Once the attack is disrupted, recover in minutes with just a few clicks. No extensive, and expensive, downtime.

Veriato RansomSafe™ Installs and configures in less than 10 minutes. Get protected.

File Screening

Veriato RansomSafe™ is continuously updated, maintaining a robust database of known ransomware signatures. The software detects the presence of known variants by matching against this database.


By helping you place honeypot files on your file that, if modified, alert Veriato RansomSafe™ to a ransomware attack, the software is able to reliably detect attacks from previously unknown variants.


The best protection against the disruption and expense of a ransomware attack is current backups. Veriato RansomSafe™ intercepts the command to encrypt (or delete) your files, making a copy and storing it safely away from the reach of the attack.


Veriato RansomSafe™ blocks the user account attempting to encrypt your files from making changes to the file system, shutting down the attack to prevent further encryption attempts and to minimize the restoration effort required. Veriato RansomSafe™ can send you an email notification immediately if and when this happens, allowing you to respond quickly.


How does Veriato RansomSafe™ protect me from a ransomware infection?
Veriato RansomSafe™ creates a safe and secure copy of each file on a protected server before that file can be modified or deleted by any user or process, including ransomware processes, and provides you with a very easy way to recover those files if necessary.

Additionally, RansomSafe™ uses a combination of “honeypot” files along with File Screening to detecting the existence of ransomware. When the ransomware’s activities are detected, the user whose process is creating, modifying, or deleting the file(s) is immediately blocked and prevented from affecting any additional files. The administrator is automatically notified and can take action to remove the infected computer from the network and, in a few quick clicks, restore all of the files the ransomware affected.

Does one installation of Veriato RansomSafe™ protect all of my Windows file servers?
No. Installation of Veriato RansomSafe™ will protect only the files contained on the file server on which it is installed. However, you may use a single Veriato RansomSafe™ console to manage Veriato RansomSafe™ on multiple Windows file servers.
Where does Veriato RansomSafe™ save the files that it has created protected copies of?
The files contained in RansomSafe™ are stored in a protected folder on the same local drive where they originally existed. If you prefer, you may relocate the RansomSafe™ to another local drive on the same server.
Won’t the files stored in the RansomSafe™ eventually consume all of the space on my server?
No. You may select how much space the RansomSafe™ is allowed to consume on the drive it is protecting. This may be selected as a percentage of total drive capacity or a percentage of drive free space. By default, the RansomSafe™ is allowed to consume a maximum of 80% of the drive’s free space.
I’m using RansomSafe™ and I’ve been affected by ransomware. What do I need to do to recover from it?
If the ransomware attempted to modify a “honeypot” file or was detected by File Screening, the activities of the ransomware would stop at that point. It will no longer be able to affect any additional files on your file server. If you had configured email notifications, you would have been notified of this.

The first thing you will want to do is remove the infected computer from your network so you can take steps to clean it of its infection before allowing it to re-join the network.

On your file server, you can use the Veriato RansomSafe™ console to quickly search for files that had recently been modified or deleted by the user who ran the ransomware. You can then take the files found through the search and restore any of them you’d like to. Note that after you restore them, the encrypted versions of the files may still exist alongside the restored files. You’ll want to remove the encrypted versions of the files using Windows Explorer at your convenience.

As soon as you are sure that the user is no longer infected and a threat to your file server, you may use the Veriato RansomSafe™ console to unblock that user and allow them to continue to manage files on your server.