<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1018517621595528&amp;ev=PageView&amp;noscript=1">
ondemand_video Ransomware

True Cost of Ransomware

Watch now
class Endpoint Protection

Endpoint Protection Buyer's Guide

Get the guide
searchRansomware

2017 Ransomware Report

Get the report
build Testing

stackhackr™

Test your security
Filters:
eBooks clear Webinars clear Research clear Tools clear Videos clear Guides clear Datasheets clear Barkly vs Malware clear Barkly EPP clear AV Replacement clear Ransomware clear Malware clear Machine Learning clear Endpoint Protection clear Testing clear

class eBooks

Malware

2017 Malware Trends in Review

How attacks are evolving and what to expect next.

Read now
Endpoint Protection

Endpoint Protection Buyer's Guide

The information you need to make evaluating and buying endpoint security easy.

Read now
Ransomware

The Ransomware Survival Handbook

Instructions for preventing, responding, and recovering from an attack.

Read now
Endpoint Protection

The Amazing Security Awareness Playbook

Make user training engaging, practical, and actually effective.

Read now
Endpoint Protection

Cybersecurity Made Simple: A Getting Started Guide

A clear, step-by-step process for you take control of your security.

Read now
Endpoint Protection

The Realist's Guide to Cybersecurity Awareness

Tips from industry experts for engaging and empowering employees.

Read now
View more +

ondemand_video Webinars

Ransomware

Floppy Disks to Fileless

Watch this on-demand webinar to hear Jack Danahy, Barkly CTO, discuss how the threat of Ransomware has grown and changed over time

Watch now
Malware

2017 Malware Trends

WannaCry, NotPetya, Emotet and more

Watch now
Ransomware

The True Cost of Ransomware

3 Companies, 3 Attacks, and the Reality of Recovery

Watch now
Malware

Fileless Cyber Attacks Demystified

Jack Danahy, CTO at Barkly, discusses how attackers are using fileless techniques to gain execution, persistence, & lateral movement, & what you can do to keep your company protected.

Watch now
View more +

search Research

Endpoint Protection

Cybersecurity Confidence Report

How confident are you in your security program? Find out where you stand based on 350 IT pros' top cybersecurity priorities, needs, and concerns.

Get the report
View more + Back to top

build Tools

Ransomware

Ransomware Decryption Tool Finder

Unlock encrypted files without paying a cent.

Search now
View more +

videocam Videos

Barkly vs. Malware

Barkly blocks Silence

See Barkly in action against the stealthy banking trojan, Silence.

Watch now
Barkly vs. Malware

Barkly blocks new Locky variant

See Barkly in action against Ykol, the latest variant of Locky ransomware.

Watch now
Barkly vs. Malware

Barkly blocks Virlock

See Barkly in action against the viral, polymorphic ransomware Virlock.

Watch now
Barkly vs. Malware

Barkly blocks Goldeneye

See Barkly in action against the disk-encrypting successor to Petya ransomware

Watch now
Barkly vs. Malware

Barkly Blocks credential-stealing malware

Watch Barkly stop Ovidiy Stealer before it can harvest victim credentials.

Watch now
Barkly vs. Malware

Barkly blocks ransomware that makes $242K demands

See Barkly in action against Bit Paymer ransomware.

Watch now
Barkly vs. Malware

Barkly blocks Lukitus variant of Locky

See Barkly in action against ransomware.

Watch now
Barkly vs. Malware

Barkly blocks Gryphon ransomware

See Barkly in action against Gryphon, the latest variant of BTCWare.

Watch now
Barkly vs. Malware

Barkly blocks a fileless ransomware attack

Watch Barkly block an attempt to spread ransomware via PsExec.

Watch now
Barkly vs. Malware

Barkly blocks Locky variant

See Barkly in action against Diablo6, a variant of Locky ransomware.

Watch now
Barkly vs. Malware

Barkly blocks Emotet trojan

See Barkly block a macro-based attack.

Watch now
Barkly vs. Malware

Barkly blocks WannaCry

See Barkly in action against the WannaCry ransomware.

Watch now
Barkly vs. Malware

Barkly blocks clickless PowerPoint malware

Watch Barkly block malware that exploits PowerPoint's mouseover function.

Watch now
Barkly vs. Malware

Barkly blocks Cerber

See Barkly in action against Cerber ransomware.

Watch now
Barkly vs. Malware

Barkly blocks macro-based malware

See how Barkly blocks macro-based attacks.

Watch now
Barkly vs. Malware

Barkly blocks QakBot banking trojan

See Barkly block one of the most advanced banking trojans currently active.

Watch now
Barkly vs. Malware

Barkly blocks Defray ransomware

See Barkly in action against Defray ransomware.

Watch now
Barkly vs. Malware

Barkly blocks Dharma

See Barkly in action against Dharma ransomware.

Watch now
Barkly vs. Malware

Barkly blocks Fireball

See Barkly in action against Fireball adware.

Watch now
Barkly vs. Malware

Barkly blocks Amnesia

See Barkly in action against Amnesia ransomware.

Watch now
Barkly vs. Malware

Barkly blocks Dridex

See Barkly in action against the Dridex banking trojan.

Watch now
Barkly vs. Malware

Barkly blocks Spora

See Barkly in action against Spora ransomware.

Watch now
Barkly vs. Malware

Barkly blocks Ursnif (Gozi)

See Barkly in action against the Ursnif (aka Gozi) banking trojan.

Watch now
Barkly vs. Malware

Barkly blocks Satan

See Barkly in action against Satan ransomware.

Watch now
Barkly vs. Malware

Barkly blocks Revenge

See Barkly in action against Revenge ransomware.

Watch now
Barkly vs. Malware

Barkly blocks Zepto

See Barkly in action against Locky variant Zepto.

Watch now
Barkly vs. Malware

Barkly blocks AES-NI

See Barkly in action against AES-NI ransomware.

Watch now
Barkly vs. Malware

Barkly blocks Mimikatz

See Barkly block malware that antivirus doesn't.

Watch now
View more +

map Guides

Endpoint Protection

The Open Source Cybersecurity Playbook

Build a solid game plan for preventing cyber attacks and data theft.

Read now
Endpoint Protection

Phishing Emails: A Field Guide

Train your users to stop taking the bait.

Read now
Ransomware

Ransomware Protection 101

A prescriptive guide for hospitals and healthcare providers.

Read now
View more +

description Datasheets