Accessibility Statement Skip Navigation
  • Why PRWeb
  • How It Works
  • Who Uses It
  • Pricing
  • Login
  • GDPR
  • Create a Free Account
Return to PRWeb homepage
  • News
  • Resources
  • Contact
When typing in this field, a list of search results will appear and be automatically updated as you type.

Searching for your content...

No results found. Please change your search terms and try again.
  • News in Focus
      • Browse News Releases

      • All News Releases
      • Multimedia Gallery

      • All Multimedia
      • All Photos
      • All Videos
  • Business & Money
      • Auto & Transportation

      • Aerospace, Defense
      • Air Freight
      • Airlines & Aviation
      • Automotive
      • Maritime & Shipbuilding
      • Railroads and Intermodal Transportation
      • Supply Chain/Logistics
      • Transportation, Trucking & Railroad
      • Travel
      • Trucking and Road Transportation
      • View All Auto & Transportation

      • Business Technology

      • Blockchain
      • Broadcast Tech
      • Computer & Electronics
      • Computer Hardware
      • Computer Software
      • Data Analytics
      • Electronic Commerce
      • Electronic Components
      • Electronic Design Automation
      • Financial Technology
      • High Tech Security
      • Internet Technology
      • Nanotechnology
      • Networks
      • Peripherals
      • Semiconductors
      • View All Business Technology

      • Entertain­ment & Media

      • Advertising
      • Art
      • Books
      • Entertainment
      • Film and Motion Picture
      • Magazines
      • Music
      • Publishing & Information Services
      • Radio & Podcast
      • Television
      • View All Entertain­ment & Media

      • Financial Services & Investing

      • Accounting News & Issues
      • Acquisitions, Mergers and Takeovers
      • Banking & Financial Services
      • Bankruptcy
      • Bond & Stock Ratings
      • Conference Call Announcements
      • Contracts
      • Cryptocurrency
      • Dividends
      • Earnings
      • Earnings Forecasts & Projections
      • Financing Agreements
      • Insurance
      • Investments Opinions
      • Joint Ventures
      • Mutual Funds
      • Private Placement
      • Real Estate
      • Restructuring & Recapitalization
      • Sales Reports
      • Shareholder Activism
      • Shareholder Meetings
      • Stock Offering
      • Stock Split
      • Venture Capital
      • View All Financial Services & Investing

      • General Business

      • Awards
      • Commercial Real Estate
      • Corporate Expansion
      • Earnings
      • Environmental, Social and Governance (ESG)
      • Human Resource & Workforce Management
      • Licensing
      • New Products & Services
      • Obituaries
      • Outsourcing Businesses
      • Overseas Real Estate (non-US)
      • Personnel Announcements
      • Real Estate Transactions
      • Residential Real Estate
      • Small Business Services
      • Socially Responsible Investing
      • Surveys, Polls and Research
      • Trade Show News
      • View All General Business

  • Science & Tech
      • Consumer Technology

      • Artificial Intelligence
      • Blockchain
      • Cloud Computing/Internet of Things
      • Computer Electronics
      • Computer Hardware
      • Computer Software
      • Consumer Electronics
      • Cryptocurrency
      • Data Analytics
      • Electronic Commerce
      • Electronic Gaming
      • Financial Technology
      • Mobile Entertainment
      • Multimedia & Internet
      • Peripherals
      • Social Media
      • STEM (Science, Tech, Engineering, Math)
      • Supply Chain/Logistics
      • Wireless Communications
      • View All Consumer Technology

      • Energy & Natural Resources

      • Alternative Energies
      • Chemical
      • Electrical Utilities
      • Gas
      • General Manufacturing
      • Mining
      • Mining & Metals
      • Oil & Energy
      • Oil and Gas Discoveries
      • Utilities
      • Water Utilities
      • View All Energy & Natural Resources

      • Environ­ment

      • Conservation & Recycling
      • Environmental Issues
      • Environmental Policy
      • Environmental Products & Services
      • Green Technology
      • Natural Disasters
      • View All Environ­ment

      • Heavy Industry & Manufacturing

      • Aerospace & Defense
      • Agriculture
      • Chemical
      • Construction & Building
      • General Manufacturing
      • HVAC (Heating, Ventilation and Air-Conditioning)
      • Machinery
      • Machine Tools, Metalworking and Metallurgy
      • Mining
      • Mining & Metals
      • Paper, Forest Products & Containers
      • Precious Metals
      • Textiles
      • Tobacco
      • View All Heavy Industry & Manufacturing

      • Telecomm­unications

      • Carriers and Services
      • Mobile Entertainment
      • Networks
      • Peripherals
      • Telecommunications Equipment
      • Telecommunications Industry
      • VoIP (Voice over Internet Protocol)
      • Wireless Communications
      • View All Telecomm­unications

  • Lifestyle & Health
      • Consumer Products & Retail

      • Animals & Pets
      • Beers, Wines and Spirits
      • Beverages
      • Bridal Services
      • Cannabis
      • Cosmetics and Personal Care
      • Fashion
      • Food & Beverages
      • Furniture and Furnishings
      • Home Improvement
      • Household, Consumer & Cosmetics
      • Household Products
      • Jewelry
      • Non-Alcoholic Beverages
      • Office Products
      • Organic Food
      • Product Recalls
      • Restaurants
      • Retail
      • Supermarkets
      • Toys
      • View All Consumer Products & Retail

      • Entertain­ment & Media

      • Advertising
      • Art
      • Books
      • Entertainment
      • Film and Motion Picture
      • Magazines
      • Music
      • Publishing & Information Services
      • Radio & Podcast
      • Television
      • View All Entertain­ment & Media

      • Health

      • Biometrics
      • Biotechnology
      • Clinical Trials & Medical Discoveries
      • Dentistry
      • FDA Approval
      • Fitness/Wellness
      • Health Care & Hospitals
      • Health Insurance
      • Infection Control
      • International Medical Approval
      • Medical Equipment
      • Medical Pharmaceuticals
      • Mental Health
      • Pharmaceuticals
      • Supplementary Medicine
      • View All Health

      • Sports

      • General Sports
      • Outdoors, Camping & Hiking
      • Sporting Events
      • Sports Equipment & Accessories
      • View All Sports

      • Travel

      • Amusement Parks and Tourist Attractions
      • Gambling & Casinos
      • Hotels and Resorts
      • Leisure & Tourism
      • Outdoors, Camping & Hiking
      • Passenger Aviation
      • Travel Industry
      • View All Travel

  • Policy & Public Interest
      • Policy & Public Interest

      • Advocacy Group Opinion
      • Animal Welfare
      • Congressional & Presidential Campaigns
      • Corporate Social Responsibility
      • Domestic Policy
      • Economic News, Trends, Analysis
      • Education
      • Environmental
      • European Government
      • FDA Approval
      • Federal and State Legislation
      • Federal Executive Branch & Agency
      • Foreign Policy & International Affairs
      • Homeland Security
      • Labor & Union
      • Legal Issues
      • Natural Disasters
      • Not For Profit
      • Patent Law
      • Public Safety
      • Trade Policy
      • U.S. State Policy
      • View All Policy & Public Interest

  • People & Culture
      • People & Culture

      • Aboriginal, First Nations & Native American
      • African American
      • Asian American
      • Children
      • Diversity, Equity & Inclusion
      • Hispanic
      • Lesbian, Gay & Bisexual
      • Men's Interest
      • People with Disabilities
      • Religion
      • Senior Citizens
      • Veterans
      • Women
      • View All People & Culture

  • Hamburger menu
  • Cision PRWeb provides efficient communication tools to continuously engage with target audiences across multiple online channels
  • Create a Free Account
    • ALL CONTACT INFO
    • Contact Us


      11AM ET Sunday – 8PM ET Friday

  • Send a Release
  • Sign up
  • Log in
  • Resources
  • RSS
  • GDPR
  • News in Focus
    • Browse All News
    • Multimedia Gallery
  • Business & Money
    • Auto & Transportation
    • Business Technology
    • Entertain­ment & Media
    • Financial Services & Investing
    • General Business
  • Science & Tech
    • Consumer Technology
    • Energy & Natural Resources
    • Environ­ment
    • Heavy Industry & Manufacturing
    • Telecomm­unications
  • Lifestyle & Health
    • Consumer Products & Retail
    • Entertain­ment & Media
    • Health
    • Sports
    • Travel
  • Policy & Public Interest
  • People & Culture
    • People & Culture
  • Send a Release
  • Sign up
  • Log in
  • Resources
  • RSS
  • GDPR
  • Send a Release
  • Sign up
  • Log in
  • Resources
  • RSS
  • GDPR
  • Send a Release
  • Sign up
  • Log in
  • Resources
  • RSS
  • GDPR

Thwart Cybercriminals with RollBack Rx Enterprise-level Cybersecurity Software
  • USA - English


News provided by

Horizon DataSys

Apr 10, 2014, 03:00 ET

Share this article

Share toX

Share this article

Share toX

RollBack Rx Logo
RollBack Rx Logo

Blaine, WA (PRWEB) April 10, 2014 -- Horizon DataSys, the premier developer of PC instant recovery solutions, announces that its RollBack Rx greatly enhances and compliments firewall, antivirus, and other threat monitoring software by allowing IT managers to regularly return to a clean system state without losing any data. With RollBack Rx installed, business IT managers can eliminate work-related disruptions and downtime.

If cyberthieves hack into a network and implant malware, without a reset software this intruder can remain resident on the machines indefinitely.

Post this

It seems like every day there's another news story about another security breach at another large business. Earlier this year, it was Target, the giant American retailer, who suffered a spectacular cybersecurity attack. 40 million user accounts with credit card and debit card info were compromised. It's estimated that this cyber intrusion alone could end up costing Target over a billion dollars in payment card claims. A few weeks ago, it was Kickstarter, the popular crowdfunding platform, who had its investors' usernames, encrypted passwords, and e-mail addresses stolen.

Besides Target and Kickstarter.com, cyberthefts have also occurred at Snecma, Michael’s, Neiman-Marcus, Sally Beauty Supply, Experian, Arizona Public Employees' Pension Fund, Snapchat, Evernote, Dropbox, Yahoo, and many others. In fact, Symantec Security has estimated that cybercrime costs businesses over $113 billion per year.

Basic Cybersecurity Measures

The best security measures can't beat commonsense: having unique complex passwords on each machine, not publicly posting these passwords on the company bulletin board, not being lured by phishing emails, having independent security measures on all the machines, and routinely cleaning out your systems to remove any potential threats. Since the longer an attack remains undetected, the greater the damage will eventually be, it's best to have a system reset software installed. If cyberthieves hack into a network and implant malware, without a reset software this intruder can remain resident on the machines indefinitely. These workstations can then be used as bots or zombie machines to then continue to infect other machines. These implanted intruders could otherwise also be eavesdropping on the host machine until they discover something worth stealing. As writing such malware becomes more lucrative, cyber-criminals have been getting increasingly sophisticated, disciplined, and patient. According to Verizon DBIR, 66% of such security breaches go undetected for at least a few months.

While a lot of companies concentrate on server security they have generally neglected endpoint protection. But most break-ins occur on the individual PCs. So it's critically important to have a robust security measure on these endpoint devices. Employees' individual PCs are the largest source of hacking attempts and could be the locus of gapping vulnerabities to viruses, worms, spyware, adware, rootkits, keyloggers, dialers, spyware, et cetera.

The strength of a network's security is based on its weakest link. Once hackers have gained access to a single node on a company network they can then usually hop onto other nodes from this single access point. Clearly, such cyberattacks can cause serious disruption or destruction to businesses. So what's an overstressed and overburdened IT administrator to do?

The Shortcomings of Anti-virus Programs

The problem with firewalls, antivirus programs, and other threat monitoring software is that they simply attempt to restrict programs containing certain flagged code or url redirects that lack certification based on their current library of malware definitions. If the infection type is new then, of course, these anti-virus programs may completely fail to detect the intrusion. And new viruses, worms, spyware, adware, rootkits, keyloggers, dialers, spyware, et cetra, seem to pop up every day. If the intruder comes disguised as a welcomed guest (that is, as part of a legitimate looking program) and the user has inadvertently already executed the malware then there may not be much the virus-scanning software can do after the fact. And the viral code can remain resident on the machines indefinitely and completely evade discovery and even thwart all attempts by the security program to remove it. Such anti-malware applications also seem to require an update with the newest definitions almost every day if not every hour and always seem to be lagging in their pursuit of technologically advanced attacks. Anti-virus utilities give a false sense of security as many of these new intrusion attempts are regularly successful in bypassing all such cybersecurity measures.

Recently, this shortcoming of such traditional cybersecurity measures was illustrated by Cryptolocker, a vicious trojan horse that came hidden in packaged files. Cryptolocker was able to completely evade discovery by the best malware detection software since it was disguised as a legitimate UPS attachment or as originating from other legitimate businesses. But there is a software called RollBack Rx that has been able to completely remove the Cryptolocker randsomware and even recover any salvageable files from infected computers by returning to an earlier point in time. So RollBack Rx should be an integral part of your cybersecurity planning.

RollBack Rx: The PC Time Machine

RollBack Rx is an instant recovery software. RollBack Rx completely restores up to four internal harddrives on a bit-for-bit basis back to any one of hundreds of snapshots. Every last byte is returned to how it was when the snapshot was taken. This gives IT managers a much more robust and comprehensive recovery capability than the default alternative, Windows System Restore. With RollBack Rx all computing assets can even be set to continually return to this predefined configuration every time the machine restarts, on logoff, on any fixed schedule, or after a period of inactivity. If these endpoint PCs are thin clients that access and save data to cloud servers system administrators can set up roaming profiles that will be retained even if the system is roaming and disconnected from the network.

Enterprise-level System Restore Software

Large networks of RollBack Rx client computers can easily be controlled and centrally administrated from a single interface using the free enterprise-level Remote Management Console. RollBack Rx also offers other additional tools to facilitate the management of public IT assets. RollBack allows admins to also pick and choose which folders they would like to be recorded and which folders should remain unchanged even when the machines are restored back to any number of prior system states (or "snapshots"). Once the user has logged out of the system the machine can be set it to return to any one of these snapshots, discarding unwanted user changes: including erased files, installed software, downloaded spyware, adware, viruses, Trojan horses, et cetra. Network administrators can ensure privacy on PCs and prevent identify theft and keyboard logging since no sensitive information is left behind. All the automatic data caches are cleared, all cookies wiped clean, all auto-complete passwords forgotten, all surfing activity deleted, and other personal data is automatically removed. RollBack Rx desktop security software has government-grade AES 256-bit encryption absolutely prevents unauthorized access. This allows IT managers to make the most of their limited time, staff, and computing resources by ensuring more uptime and productivity while drastically reducing support costs and security breaches.

And since employees today are increasingly working on tablets rather than desktops, RollBack Rx is now available for Windows Surface as well.

About Horizon DataSys:
Horizon DataSys Corporation is a privately held software company headquartered in Blaine, WA which develops, publishes, and distributes branded computer software applications specializing in end-point PC management, OS integrity, and instant restore.

Kully Pawa, Horizon DataSys, http://www.horizondatasys.com, (800) 496-0148, [email protected]

Modal title

Contact PRWeb

  • 11AM ET Sunday – 8PM ET Friday
  • Contact Us

About PRWeb

  • About PRWeb
  • Partners
  • Partnership Programs
  • Editorial Guidelines
  • Resources

Why PRWeb

  • Why PRWeb
  • How It Works
  • Who Uses It
  • Pricing

Accounts

  • Create a Free Account
  • Log in
  • Contact Us

Do not sell or share my personal information:

  • Submit via [email protected] 
  • Call Privacy toll-free: 877-297-8921

Contact Cision

Products

About

My Services
  • All News Releases
  • Online Member Center
  • ProfNet
Cision Distribution Helpline
888-776-0942
  • Legal
  • Site Map
  • RSS
  • Cookie Settings
Copyright © 2025 Cision US Inc.