Showing results: 1 - 15 of 17 items found.
-
Tevora
The Tevora malware analysis process begins with the identification and quarantine of the software in question. Our experienced analysts will then test the malware in our malware analysis lab and isolate the malicious software so its behavior can be learned. Understanding what a particular piece of malware is designed to do, helps direct focus on what other systems and information are at risk.
-
ThreatAnalyzer® -
ThreatTrack Security, Inc.
See how you can defend your network from targeted attacks, advanced malware and Zero-days with ThreatAnalyzer®, the industry''s premier malware analysis sandbox. Our dynamic malware analysis sandbox (formerly known as CWSandbox) is used to dig deep into malware to reveal its impact on your organization so you can respond quickly – knowing what''s happening on your network and what systems or data are at the greatest risk.
-
Malcom -
tomchop
Malcom is a tool designed to analyze a system's network communication using graphical representations of network traffic, and cross-reference them with known malware sources. This comes handy when analyzing how certain malware species try to communicate with the outside world. detect central command and control (C&C) servers. understand peer-to-peer networks. observe DNS fast-flux infrastructures. quickly determine if a network artifact is 'known-bad'.
-
VolatilityBot -
mkorman90
VolatilityBot is an automation tool for researchers cuts all the guesswork and manual tasks out of the binary extraction phase, or to help the investigator in the first steps of performing a memory analysis investigation. Not only does it automatically extract the executable (exe), but it also fetches all new processes created in memory, code injections, strings, IP addresses, etc.
-
VirusTotal -
VirusTotal
VirusTotal is a free service that analyzes suspicious files and URLs and facilitates the quick detection of viruses, worms, trojans, and all kinds of malware.
-
NetDetectorLive™ -
Niksun
Whatever the task, from forensic reconstruction of network activity to complete situational awareness of your network, NIKSUN NetDetectorLive™, with capture rates well into multi-Tbps, is the tool for the job. Simply plug it in and Know the Unknown®.NetDetectorLive™ is the only solution that integrates packet capture, metadata generation, real-time indexing up to Layer 7, IDS (signature and anomaly), malware analytics, and more. The NIKSUN NetDetector® Suite provides in-depth and real-time forensics that go beyond firewalls and IDS/IPS systems to identify, resolve, and prevent cyber-attacks. NIKSUN NetDetector® is the world's first packet-to-disk appliance for cyber defense.
-
-
-
-
Stratign
Stratign’s Salus Smartphone is a high-end smartphone built from the ground-up and protects you from eavesdropping, malware, data breaches and any attempts to hack or tamper with your mobile communications and data.
-
AV-TEST GmbH
The AV-TEST Institute is a leading international and independent service provider in the fields of IT security and anti-virus research. The aim of the research work carried out by AV-TEST is to directly detect the latest malware, to analyse it using state-of-the-art methods and to inform our customers of the top-quality results obtained.
-
Arbor Networks
Arbor has a long history in botnet research and DDoS mitigation. However, as DDoS has moved from just a diversion to be a feature of malware and botnets used in cybercrime and APT attacks, Arbor has expanded its research team and research capabilities to tackle additional threat types.
-
Wombat Security Technologies
Our unique Assess, Educate, Reinforce, Measure training methodology combines the four key components of successful security awareness and training programs. Customers who have used this cyclical approach have experienced up to a 90% reduction in successful external phishing attacks and malware infections.
-
STMicroelectronics
STSAFE is a secure element product range providing authentication, confidentiality and platform integrity services to protect OEMs against cloning, counterfeiting, malware injection and unauthorized production. Compliant with the most demanding security certifications, STSAFE secure elements are turnkey solutions developed through a trusted supply chain with pre-provisioned secrets and certificates, that include a set of software libraries and drivers for secure, seamless integration.
-
FireEye, Inc.
Our Forensics and Investigation solutions will give you attack context, infrastructure-wide visibility, codified expertise, rich intelligence, and insights gained from front-line experience responding to the world’s most impactful threats. So, you’ll have everything you need to rapidly detect, triage, investigate, and minimize the impact of attacks. Develop attack context in near-real time and facilitate rapid investigations. Safely execute and analyze malware in a secure environment to strengthen threat intelligence.