Here we have gathered some of the most common questions about Realtime Blocklist.
If you do not find an answer to a question or have other concerns, you are welcome to contact our support.
This is our latest product within the Syspeace family. Its main purpose is to secure access on the corporate firewall level by blocking known offenders through a near real-time updated global blocklist that is downloaded to a firewall.
Syspeace Realtime Blocklist is a method to protect all your computers behind a corporate firewall. The Syspeace product found on syspeace.com is an endpoint protection product that stops hacking and brute force attacks on Windows servers.
It is free to create an account and by that, you will get a free trial of the Enterprise license that is valid for 30 days.
After the free trial has expired, you need to purchase a license if you want to continue to use the product.
Please contact firstname.lastname@example.org for more details.
Syspeace Realtime Blocklist lowers the risk of getting infected by ransomware, viruses, and malware. It prevents known hackers, private and state-owned, from accessing your services and computers behind the firewall.
Hacking is a common way to inject a system with ransomware, viruses, and malware. Syspeace Realtime Blocklist defends against brute force and hacking attacks from sources known to engage in that kind of activity.
Download our white paper and read about the cost of being hacked under the headline ROI Calculation.
Gain knowledge of live hacking activities that are being blocked right now by visiting our Threat Activity Map. This map shows how Syspeace in real-time mitigates hacking attempts.
Many organizations have a hard time finding out that they are being hacked. The hackers are “flying under the radar” by using time to their advantage.
It is not uncommon that hackers spend many months in a low-energy state, trying to work their way into systems and not trigger any alarms with patience as their primary weapon. Sometimes they are in a hurry, and that is when you have a fair chance to catch them.
Read more about how ransomware has evolved here.
As long as the firewall can download a list of IP addresses and use that list in a rule that will block those addresses, the firewall ought to work with our service.
There are many firewalls on the market and we do not have the possibility to be experts or even have deep knowledge of all of them. There is usually great competence in communities and support from the companies that delivered the firewall.
You are always free to send us a message and we will do our best to guide you.
You will always get the complete list of IP addresses which includes the most active offenders in near real-time amongst the more than 100 million blocked intrusion attempts targeted against our customers.
We recommend downloading the blocklist every ten minutes, as this is the interval that the list is automatically updated.
No, not yet. We will implement throttling only if we need to.
Our priority is to have satisfied customers. We always refund the complete purchase up to one week after the date of purchase without any questions asked.
However, we would be delighted if you could tell us why you were not satisfied with our product so that we can improve it.