Introducing G2.ai, the future of software buying.Try now

Best Malware Analysis Tools

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Malware analysis tools that are used to isolate and investigate malware as it is detected on a company’s IT resources, endpoints, and applications. They typically work by detecting malware and then moving infected resources to an isolated environment. In this secure, sandboxed environment, security professionals examine the malware’s code and behaviors to learn more about how it works, what it has done, and how to protect against it in the future.

Security teams and other IT staff involved in incident response, risk analysis, and security operations may all use these tools. They collect data from malware that is detected and use it to bolster security and prevent similar malware from compromising their system by integrating it with their existing threat intelligence systems. They may also use the information gathered to examine larger portions of their IT systems to ensure the malware is not present elsewhere.

Many malware analysis solutions provide features of network sandboxing software for secure analysis. Not all network sandboxing tools have the same ability to automatically detect malware nor the tools necessary for in-depth forensic investigation.

To qualify for inclusion in the Malware Analysis category, a product must:

Detect zero-day threats and other unknown malware using contextual threat data
Isolate threats in a secure environment
Provide tools for forensic investigation and risk analysis

Best Malware Analysis Tools At A Glance

Highest Performer:
Easiest to Use:
Best Free Software:
Top Trending:
Show LessShow More
Easiest to Use:
Best Free Software:
Top Trending:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
48 Listings in Malware Analysis Tools Available
(865)4.6 out of 5
Optimized for quick response
1st Easiest To Use in Malware Analysis Tools software
View top Consulting Services for ESET PROTECT
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Stay one step ahead of known and emerging cyber threats with our AI-native, prevention-first approach. ESET combines the power of AI and human expertise to make protection easy and effective. Expe

    Users
    • IT Manager
    • Network Administrator
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 46% Small-Business
    • 44% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ESET PROTECT Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    148
    Security
    146
    Protection
    126
    Cybersecurity Protection
    93
    Features
    83
    Cons
    Expensive
    39
    Learning Curve
    30
    Slow Performance
    29
    Compatibility Issues
    25
    Missing Features
    22
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ESET PROTECT features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 8.8
    9.5
    Malware Evaluation
    Average: 8.9
    9.5
    Malware Detection
    Average: 9.0
    9.5
    File Analysis
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ESET
    Company Website
    Year Founded
    1992
    HQ Location
    Bratislava, Slovak Republic
    Twitter
    @ESET
    286,399 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,870 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Stay one step ahead of known and emerging cyber threats with our AI-native, prevention-first approach. ESET combines the power of AI and human expertise to make protection easy and effective. Expe

Users
  • IT Manager
  • Network Administrator
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 46% Small-Business
  • 44% Mid-Market
ESET PROTECT Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
148
Security
146
Protection
126
Cybersecurity Protection
93
Features
83
Cons
Expensive
39
Learning Curve
30
Slow Performance
29
Compatibility Issues
25
Missing Features
22
ESET PROTECT features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 8.8
9.5
Malware Evaluation
Average: 8.9
9.5
Malware Detection
Average: 9.0
9.5
File Analysis
Average: 8.9
Seller Details
Seller
ESET
Company Website
Year Founded
1992
HQ Location
Bratislava, Slovak Republic
Twitter
@ESET
286,399 Twitter followers
LinkedIn® Page
www.linkedin.com
1,870 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Overview Our Cloud-Delivered Security Services are natively integrated, offering consistent best-in-class protection everywhere. Backed by our world-renowned Unit 42® Threat Research team, this one-o

    Users
    • Network Engineer
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 40% Mid-Market
    • 35% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cloud-Delivered Security Services features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 8.8
    8.7
    Malware Evaluation
    Average: 8.9
    8.7
    Malware Detection
    Average: 9.0
    8.4
    File Analysis
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    126,982 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    17,221 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Overview Our Cloud-Delivered Security Services are natively integrated, offering consistent best-in-class protection everywhere. Backed by our world-renowned Unit 42® Threat Research team, this one-o

Users
  • Network Engineer
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 40% Mid-Market
  • 35% Enterprise
Cloud-Delivered Security Services features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 8.8
8.7
Malware Evaluation
Average: 8.9
8.7
Malware Detection
Average: 9.0
8.4
File Analysis
Average: 8.9
Seller Details
Company Website
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
126,982 Twitter followers
LinkedIn® Page
www.linkedin.com
17,221 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(115)4.7 out of 5
3rd Easiest To Use in Malware Analysis Tools software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ANY.RUN provides an interactive sandbox for malware analysis, offering deep visibility into threat behavior in a secure, cloud-based environment with Windows, Linux, and Android support. It helps SOC

    Users
    No information available
    Industries
    • Computer & Network Security
    • Financial Services
    Market Segment
    • 38% Enterprise
    • 33% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ANY.RUN Sandbox features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 8.8
    9.3
    Malware Evaluation
    Average: 8.9
    9.1
    Malware Detection
    Average: 9.0
    9.3
    File Analysis
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ANY.RUN
    Company Website
    Year Founded
    2016
    HQ Location
    Dubai, United Arab Emirates
    Twitter
    @anyrun_app
    29,024 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    269 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ANY.RUN provides an interactive sandbox for malware analysis, offering deep visibility into threat behavior in a secure, cloud-based environment with Windows, Linux, and Android support. It helps SOC

Users
No information available
Industries
  • Computer & Network Security
  • Financial Services
Market Segment
  • 38% Enterprise
  • 33% Small-Business
ANY.RUN Sandbox features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 8.8
9.3
Malware Evaluation
Average: 8.9
9.1
Malware Detection
Average: 9.0
9.3
File Analysis
Average: 8.9
Seller Details
Seller
ANY.RUN
Company Website
Year Founded
2016
HQ Location
Dubai, United Arab Emirates
Twitter
@anyrun_app
29,024 Twitter followers
LinkedIn® Page
www.linkedin.com
269 employees on LinkedIn®
(218)4.7 out of 5
Optimized for quick response
2nd Easiest To Use in Malware Analysis Tools software
Save to My Lists
Entry Level Price:Starting at $6.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Coro, the leading cybersecurity platform for small and midsize businesses, revolutionized cybersecurity with the introduction of the world’s first modular cybersecurity platform. Coro’s platform e

    Users
    • IT Manager
    • IT Director
    Industries
    • Non-Profit Organization Management
    • Financial Services
    Market Segment
    • 57% Mid-Market
    • 37% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Coro Cybersecurity is a security platform that uses AI to identify and flag potential spam and phishing, and provides a single dashboard for managing white and black lists for Office 365.
    • Users frequently mention the ease of use, comprehensive protection, affordability, and excellent customer support as key benefits of using Coro Cybersecurity.
    • Reviewers noted some issues with the product, such as occasional false positives, minimal support for certain features, and the need for more robust console and additional features.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Coro Cybersecurity Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    93
    Customer Support
    66
    Security
    63
    Protection
    50
    Easy Setup
    46
    Cons
    Performance Issues
    32
    Improvements Needed
    20
    Inaccuracy
    16
    False Positives
    15
    Limited Features
    14
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Coro Cybersecurity features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 8.8
    9.3
    Malware Evaluation
    Average: 8.9
    9.6
    Malware Detection
    Average: 9.0
    9.4
    File Analysis
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Coronet
    Company Website
    Year Founded
    2014
    HQ Location
    Chicago, IL
    Twitter
    @coro_cyber
    1,928 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    386 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Coro, the leading cybersecurity platform for small and midsize businesses, revolutionized cybersecurity with the introduction of the world’s first modular cybersecurity platform. Coro’s platform e

Users
  • IT Manager
  • IT Director
Industries
  • Non-Profit Organization Management
  • Financial Services
Market Segment
  • 57% Mid-Market
  • 37% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Coro Cybersecurity is a security platform that uses AI to identify and flag potential spam and phishing, and provides a single dashboard for managing white and black lists for Office 365.
  • Users frequently mention the ease of use, comprehensive protection, affordability, and excellent customer support as key benefits of using Coro Cybersecurity.
  • Reviewers noted some issues with the product, such as occasional false positives, minimal support for certain features, and the need for more robust console and additional features.
Coro Cybersecurity Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
93
Customer Support
66
Security
63
Protection
50
Easy Setup
46
Cons
Performance Issues
32
Improvements Needed
20
Inaccuracy
16
False Positives
15
Limited Features
14
Coro Cybersecurity features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 8.8
9.3
Malware Evaluation
Average: 8.9
9.6
Malware Detection
Average: 9.0
9.4
File Analysis
Average: 8.9
Seller Details
Seller
Coronet
Company Website
Year Founded
2014
HQ Location
Chicago, IL
Twitter
@coro_cyber
1,928 Twitter followers
LinkedIn® Page
www.linkedin.com
386 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    VirusTotal is a service that analyzes suspicious files and facilitates real-time detection of viruses, worms, trojans and malware content.

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 44% Small-Business
    • 28% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • VirusTotal features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.8
    9.1
    Malware Evaluation
    Average: 8.9
    9.3
    Malware Detection
    Average: 9.0
    9.5
    File Analysis
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2004
    HQ Location
    Spain
    Twitter
    @virustotal
    31,665 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    61 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

VirusTotal is a service that analyzes suspicious files and facilitates real-time detection of viruses, worms, trojans and malware content.

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 44% Small-Business
  • 28% Mid-Market
VirusTotal features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.8
9.1
Malware Evaluation
Average: 8.9
9.3
Malware Detection
Average: 9.0
9.5
File Analysis
Average: 8.9
Seller Details
Year Founded
2004
HQ Location
Spain
Twitter
@virustotal
31,665 Twitter followers
LinkedIn® Page
www.linkedin.com
61 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Analyse suspicious files, domains, IPs and URLs to detect malware and other breaches, automatically share them with the security community.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 38% Small-Business
    • 31% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Google VirusTotal features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 8.8
    9.3
    Malware Evaluation
    Average: 8.9
    9.0
    Malware Detection
    Average: 9.0
    9.4
    File Analysis
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Google
    Year Founded
    1998
    HQ Location
    Mountain View, CA
    Twitter
    @google
    32,750,646 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    310,061 employees on LinkedIn®
    Ownership
    NASDAQ:GOOG
Product Description
How are these determined?Information
This description is provided by the seller.

Analyse suspicious files, domains, IPs and URLs to detect malware and other breaches, automatically share them with the security community.

Users
No information available
Industries
No information available
Market Segment
  • 38% Small-Business
  • 31% Mid-Market
Google VirusTotal features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 8.8
9.3
Malware Evaluation
Average: 8.9
9.0
Malware Detection
Average: 9.0
9.4
File Analysis
Average: 8.9
Seller Details
Seller
Google
Year Founded
1998
HQ Location
Mountain View, CA
Twitter
@google
32,750,646 Twitter followers
LinkedIn® Page
www.linkedin.com
310,061 employees on LinkedIn®
Ownership
NASDAQ:GOOG
(192)4.5 out of 5
Optimized for quick response
5th Easiest To Use in Malware Analysis Tools software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Intezer automates the entire alert triage process, like an extension of your team handling Tier 1 SOC tasks for every alert at machine-speed. Intezer monitors incoming incidents from endpoint, reporte

    Users
    • Software Engineer
    • Student
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 55% Small-Business
    • 23% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Intezer Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    5
    Easy Integrations
    3
    Features
    3
    Customer Support
    2
    Cybersecurity
    2
    Cons
    Complex Interface
    2
    Improvements Needed
    2
    Poor Interface Design
    2
    UX Improvement
    2
    Alert Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Intezer features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 8.8
    9.3
    Malware Evaluation
    Average: 8.9
    9.6
    Malware Detection
    Average: 9.0
    9.4
    File Analysis
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Intezer
    Company Website
    Year Founded
    2015
    HQ Location
    New York
    Twitter
    @IntezerLabs
    10,270 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    58 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Intezer automates the entire alert triage process, like an extension of your team handling Tier 1 SOC tasks for every alert at machine-speed. Intezer monitors incoming incidents from endpoint, reporte

Users
  • Software Engineer
  • Student
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 55% Small-Business
  • 23% Mid-Market
Intezer Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
5
Easy Integrations
3
Features
3
Customer Support
2
Cybersecurity
2
Cons
Complex Interface
2
Improvements Needed
2
Poor Interface Design
2
UX Improvement
2
Alert Issues
1
Intezer features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 8.8
9.3
Malware Evaluation
Average: 8.9
9.6
Malware Detection
Average: 9.0
9.4
File Analysis
Average: 8.9
Seller Details
Seller
Intezer
Company Website
Year Founded
2015
HQ Location
New York
Twitter
@IntezerLabs
10,270 Twitter followers
LinkedIn® Page
www.linkedin.com
58 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Deep Discovery Inspector is available as a physical or virtual network appliance. It's designed to quickly detect advanced malware that typically bypasses traditional security defenses and exfiltrates

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 41% Mid-Market
    • 35% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trend Micro Deep Discovery features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 8.8
    8.8
    Malware Evaluation
    Average: 8.9
    9.4
    Malware Detection
    Average: 9.0
    9.0
    File Analysis
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Tokyo
    Twitter
    @trendmicro
    112,808 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,690 employees on LinkedIn®
    Ownership
    OTCMKTS:TMICY
Product Description
How are these determined?Information
This description is provided by the seller.

Deep Discovery Inspector is available as a physical or virtual network appliance. It's designed to quickly detect advanced malware that typically bypasses traditional security defenses and exfiltrates

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 41% Mid-Market
  • 35% Enterprise
Trend Micro Deep Discovery features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 8.8
8.8
Malware Evaluation
Average: 8.9
9.4
Malware Detection
Average: 9.0
9.0
File Analysis
Average: 8.9
Seller Details
Year Founded
1988
HQ Location
Tokyo
Twitter
@trendmicro
112,808 Twitter followers
LinkedIn® Page
www.linkedin.com
7,690 employees on LinkedIn®
Ownership
OTCMKTS:TMICY
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Detect and block advanced threats that elude traditional analysis with multiple-layer inspection and customizable sandboxing

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 37% Enterprise
    • 37% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Symantec Content Analysis and Sandboxing features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.8
    9.7
    Malware Evaluation
    Average: 8.9
    9.7
    Malware Detection
    Average: 9.0
    9.3
    File Analysis
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Broadcom
    Year Founded
    1991
    HQ Location
    San Jose, CA
    Twitter
    @broadcom
    60,101 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    59,194 employees on LinkedIn®
    Ownership
    NASDAQ: CA
Product Description
How are these determined?Information
This description is provided by the seller.

Detect and block advanced threats that elude traditional analysis with multiple-layer inspection and customizable sandboxing

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 37% Enterprise
  • 37% Mid-Market
Symantec Content Analysis and Sandboxing features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.8
9.7
Malware Evaluation
Average: 8.9
9.7
Malware Detection
Average: 9.0
9.3
File Analysis
Average: 8.9
Seller Details
Seller
Broadcom
Year Founded
1991
HQ Location
San Jose, CA
Twitter
@broadcom
60,101 Twitter followers
LinkedIn® Page
www.linkedin.com
59,194 employees on LinkedIn®
Ownership
NASDAQ: CA
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    FileWall is a must-have native security solution for Microsoft 365 and provides the ultimate protection against file-based cyber-attacks for Microsoft 365 business applications. Leveraging odix’s pate

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 90% Small-Business
    • 10% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FileWall for Microsoft 365 features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.8
    0.0
    No information available
    10.0
    Malware Detection
    Average: 9.0
    10.0
    File Analysis
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    odix
    Year Founded
    2012
    HQ Location
    Rosh Haain, Israel
    Twitter
    @odix
    10 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    18 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

FileWall is a must-have native security solution for Microsoft 365 and provides the ultimate protection against file-based cyber-attacks for Microsoft 365 business applications. Leveraging odix’s pate

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 90% Small-Business
  • 10% Mid-Market
FileWall for Microsoft 365 features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.8
0.0
No information available
10.0
Malware Detection
Average: 9.0
10.0
File Analysis
Average: 8.9
Seller Details
Seller
odix
Year Founded
2012
HQ Location
Rosh Haain, Israel
Twitter
@odix
10 Twitter followers
LinkedIn® Page
www.linkedin.com
18 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Threat.Zone is a a holistic malware platform that is hypervisor-based, automated and interactive tool for analyzing malware, so you can fight new generation malwares by conducting: Real-time behaviora

    Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 50% Mid-Market
    • 33% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Threat Zone features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 8.8
    8.8
    Malware Evaluation
    Average: 8.9
    8.8
    Malware Detection
    Average: 9.0
    9.1
    File Analysis
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Malwation
    Year Founded
    2020
    HQ Location
    Delaware, US
    Twitter
    @malwation
    988 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    12 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Threat.Zone is a a holistic malware platform that is hypervisor-based, automated and interactive tool for analyzing malware, so you can fight new generation malwares by conducting: Real-time behaviora

Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 50% Mid-Market
  • 33% Enterprise
Threat Zone features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 8.8
8.8
Malware Evaluation
Average: 8.9
8.8
Malware Detection
Average: 9.0
9.1
File Analysis
Average: 8.9
Seller Details
Seller
Malwation
Year Founded
2020
HQ Location
Delaware, US
Twitter
@malwation
988 Twitter followers
LinkedIn® Page
www.linkedin.com
12 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IVX is a signature-less, dynamic analysis engine that captures and confirms zero-day, and targeted APT attacks. IVX identifies attacks that evade traditional signature-based defenses by detonating sus

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 43% Mid-Market
    • 37% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Trellix Intelligent Virtual Execution (IVX) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Detection
    8
    Detection Efficiency
    6
    Ease of Use
    6
    Security
    6
    Cloud Integration
    5
    Cons
    Expensive
    8
    Pricing Issues
    4
    Learning Curve
    3
    Cloud Dependency
    1
    Compatibility Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trellix Intelligent Virtual Execution (IVX) features and usability ratings that predict user satisfaction
    7.5
    Has the product been a good partner in doing business?
    Average: 8.8
    6.7
    Malware Evaluation
    Average: 8.9
    7.9
    Malware Detection
    Average: 9.0
    6.7
    File Analysis
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Trellix
    Year Founded
    2004
    HQ Location
    Milpitas, CA
    Twitter
    @Trellix
    250,269 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    826 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

IVX is a signature-less, dynamic analysis engine that captures and confirms zero-day, and targeted APT attacks. IVX identifies attacks that evade traditional signature-based defenses by detonating sus

Users
No information available
Industries
No information available
Market Segment
  • 43% Mid-Market
  • 37% Small-Business
Trellix Intelligent Virtual Execution (IVX) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Detection
8
Detection Efficiency
6
Ease of Use
6
Security
6
Cloud Integration
5
Cons
Expensive
8
Pricing Issues
4
Learning Curve
3
Cloud Dependency
1
Compatibility Issues
1
Trellix Intelligent Virtual Execution (IVX) features and usability ratings that predict user satisfaction
7.5
Has the product been a good partner in doing business?
Average: 8.8
6.7
Malware Evaluation
Average: 8.9
7.9
Malware Detection
Average: 9.0
6.7
File Analysis
Average: 8.9
Seller Details
Seller
Trellix
Year Founded
2004
HQ Location
Milpitas, CA
Twitter
@Trellix
250,269 Twitter followers
LinkedIn® Page
www.linkedin.com
826 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    PT MultiScanner is a multithreaded malware detection system designed to find threats with precision and speed by combining multiple anti-virus engines and supplementing them with other detection metho

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 61% Small-Business
    • 22% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • PT MultiScanner features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 8.8
    9.2
    Malware Evaluation
    Average: 8.9
    9.6
    Malware Detection
    Average: 9.0
    8.8
    File Analysis
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    N/A
    Twitter
    @PTsecurity_UK
    5 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    664 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

PT MultiScanner is a multithreaded malware detection system designed to find threats with precision and speed by combining multiple anti-virus engines and supplementing them with other detection metho

Users
No information available
Industries
No information available
Market Segment
  • 61% Small-Business
  • 22% Mid-Market
PT MultiScanner features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 8.8
9.2
Malware Evaluation
Average: 8.9
9.6
Malware Detection
Average: 9.0
8.8
File Analysis
Average: 8.9
Seller Details
HQ Location
N/A
Twitter
@PTsecurity_UK
5 Twitter followers
LinkedIn® Page
www.linkedin.com
664 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    FileScan.IO is a free malware analysis service that offers rapid in-depth file assesments, threat intelligence and indicator of compromise (IOCs) extraction for a wide range of executable files, docum

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 52% Small-Business
    • 35% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OPSWAT Filescan features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.8
    9.3
    Malware Evaluation
    Average: 8.9
    9.7
    Malware Detection
    Average: 9.0
    9.5
    File Analysis
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    OPSWAT
    Year Founded
    2002
    HQ Location
    Tampa, Florida
    Twitter
    @OPSWAT
    7,232 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    982 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

FileScan.IO is a free malware analysis service that offers rapid in-depth file assesments, threat intelligence and indicator of compromise (IOCs) extraction for a wide range of executable files, docum

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 52% Small-Business
  • 35% Mid-Market
OPSWAT Filescan features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.8
9.3
Malware Evaluation
Average: 8.9
9.7
Malware Detection
Average: 9.0
9.5
File Analysis
Average: 8.9
Seller Details
Seller
OPSWAT
Year Founded
2002
HQ Location
Tampa, Florida
Twitter
@OPSWAT
7,232 Twitter followers
LinkedIn® Page
www.linkedin.com
982 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Hybrid Analysis provides free malware analysis service for the community that detects and analyzes unknown threats

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Hybrid Analysis features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.8
    9.3
    Malware Evaluation
    Average: 8.9
    9.3
    Malware Detection
    Average: 9.0
    9.0
    File Analysis
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    N/A
    Twitter
    @HybridAnalysis
    10,781 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Hybrid Analysis provides free malware analysis service for the community that detects and analyzes unknown threats

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 33% Mid-Market
Hybrid Analysis features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.8
9.3
Malware Evaluation
Average: 8.9
9.3
Malware Detection
Average: 9.0
9.0
File Analysis
Average: 8.9
Seller Details
HQ Location
N/A
Twitter
@HybridAnalysis
10,781 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    PolySwarm is a more effective way to detect, analyze and respond to the latest malware threats, the ones more likely to go undetected. PolySwarm is a launchpad for new and innovative threat detection

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 46% Small-Business
    • 38% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • PolySwarm features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 8.8
    9.4
    Malware Evaluation
    Average: 8.9
    8.9
    Malware Detection
    Average: 9.0
    9.4
    File Analysis
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    PolySwarm
    Year Founded
    2017
    HQ Location
    San Diego, US
    LinkedIn® Page
    www.linkedin.com
    21 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

PolySwarm is a more effective way to detect, analyze and respond to the latest malware threats, the ones more likely to go undetected. PolySwarm is a launchpad for new and innovative threat detection

Users
No information available
Industries
No information available
Market Segment
  • 46% Small-Business
  • 38% Mid-Market
PolySwarm features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 8.8
9.4
Malware Evaluation
Average: 8.9
8.9
Malware Detection
Average: 9.0
9.4
File Analysis
Average: 8.9
Seller Details
Seller
PolySwarm
Year Founded
2017
HQ Location
San Diego, US
LinkedIn® Page
www.linkedin.com
21 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cuckoo Sandbox is the leading open source automated malware analysis system.You can throw any suspicious file at it and in a matter of minutes Cuckoo will provide a detailed report outlining the behav

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 57% Small-Business
    • 36% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cuckoo Sandbox features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.8
    8.3
    Malware Evaluation
    Average: 8.9
    8.3
    Malware Detection
    Average: 9.0
    8.3
    File Analysis
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cuckoo
    Year Founded
    2010
    HQ Location
    N/A
    Twitter
    @cuckoosandbox
    13,897 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cuckoo Sandbox is the leading open source automated malware analysis system.You can throw any suspicious file at it and in a matter of minutes Cuckoo will provide a detailed report outlining the behav

Users
No information available
Industries
No information available
Market Segment
  • 57% Small-Business
  • 36% Mid-Market
Cuckoo Sandbox features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.8
8.3
Malware Evaluation
Average: 8.9
8.3
Malware Detection
Average: 9.0
8.3
File Analysis
Average: 8.9
Seller Details
Seller
Cuckoo
Year Founded
2010
HQ Location
N/A
Twitter
@cuckoosandbox
13,897 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Todays zero-day threats, polymorphic malware and weaponized attachments demand a sophisticated multi-layered approach to keep businesses safe. VIPRE Email Security and suite of add-on solutions, del

    Users
    • IT Manager
    Industries
    • Information Technology and Services
    Market Segment
    • 49% Mid-Market
    • 44% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • VIPRE Email Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    AI Scanning
    1
    Customer Support
    1
    Deployment Ease
    1
    Ease of Management
    1
    Ease of Use
    1
    Cons
    Expensive
    1
    Poor Interface Design
    1
    UX Improvement
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • VIPRE Email Security features and usability ratings that predict user satisfaction
    7.6
    Has the product been a good partner in doing business?
    Average: 8.8
    10.0
    Malware Evaluation
    Average: 8.9
    8.3
    Malware Detection
    Average: 9.0
    8.3
    File Analysis
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1994
    HQ Location
    Clearwater, FL
    Twitter
    @VIPRESecurity
    8,570 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    207 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Todays zero-day threats, polymorphic malware and weaponized attachments demand a sophisticated multi-layered approach to keep businesses safe. VIPRE Email Security and suite of add-on solutions, del

Users
  • IT Manager
Industries
  • Information Technology and Services
Market Segment
  • 49% Mid-Market
  • 44% Small-Business
VIPRE Email Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
AI Scanning
1
Customer Support
1
Deployment Ease
1
Ease of Management
1
Ease of Use
1
Cons
Expensive
1
Poor Interface Design
1
UX Improvement
1
VIPRE Email Security features and usability ratings that predict user satisfaction
7.6
Has the product been a good partner in doing business?
Average: 8.8
10.0
Malware Evaluation
Average: 8.9
8.3
Malware Detection
Average: 9.0
8.3
File Analysis
Average: 8.9
Seller Details
Year Founded
1994
HQ Location
Clearwater, FL
Twitter
@VIPRESecurity
8,570 Twitter followers
LinkedIn® Page
www.linkedin.com
207 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    REMnux® is a Linux toolkit for reverse-engineering or otherwise examining malicious software. It provides a curated collection of free tools created by the community. Malware analysts can start using

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 86% Small-Business
    • 14% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Remnux features and usability ratings that predict user satisfaction
    5.0
    Has the product been a good partner in doing business?
    Average: 8.8
    8.8
    Malware Evaluation
    Average: 8.9
    7.5
    Malware Detection
    Average: 9.0
    8.8
    File Analysis
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Remnux
    HQ Location
    N/A
    Twitter
    @REMnux
    6,292 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

REMnux® is a Linux toolkit for reverse-engineering or otherwise examining malicious software. It provides a curated collection of free tools created by the community. Malware analysts can start using

Users
No information available
Industries
No information available
Market Segment
  • 86% Small-Business
  • 14% Mid-Market
Remnux features and usability ratings that predict user satisfaction
5.0
Has the product been a good partner in doing business?
Average: 8.8
8.8
Malware Evaluation
Average: 8.9
7.5
Malware Detection
Average: 9.0
8.8
File Analysis
Average: 8.9
Seller Details
Seller
Remnux
HQ Location
N/A
Twitter
@REMnux
6,292 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sandboxing reinvented against the threats of today - and tomorrow. At VMRay, our purpose is to liberate the world from undetectable digital threats. Led by reputable cyber security pioneers, we dev

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 86% Enterprise
    • 14% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • VMRay Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automation
    3
    Customer Support
    2
    Ease of Use
    2
    Solutions
    2
    Threat Detection
    2
    Cons
    Difficult Learning Curve
    1
    Difficult Setup
    1
    Expensive
    1
    Poor Detection Performance
    1
    UX Improvement
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • VMRay features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.8
    8.7
    Malware Evaluation
    Average: 8.9
    9.0
    Malware Detection
    Average: 9.0
    8.7
    File Analysis
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    VMRay
    Company Website
    Year Founded
    2013
    HQ Location
    Bochum, Germany
    Twitter
    @vmray
    3,797 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    115 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Sandboxing reinvented against the threats of today - and tomorrow. At VMRay, our purpose is to liberate the world from undetectable digital threats. Led by reputable cyber security pioneers, we dev

Users
No information available
Industries
No information available
Market Segment
  • 86% Enterprise
  • 14% Small-Business
VMRay Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automation
3
Customer Support
2
Ease of Use
2
Solutions
2
Threat Detection
2
Cons
Difficult Learning Curve
1
Difficult Setup
1
Expensive
1
Poor Detection Performance
1
UX Improvement
1
VMRay features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.8
8.7
Malware Evaluation
Average: 8.9
9.0
Malware Detection
Average: 9.0
8.7
File Analysis
Average: 8.9
Seller Details
Seller
VMRay
Company Website
Year Founded
2013
HQ Location
Bochum, Germany
Twitter
@vmray
3,797 Twitter followers
LinkedIn® Page
www.linkedin.com
115 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    State-of-the-art server security with an all-in-one platform BitNinja offers an advanced server security solution with a proactive and unified system designed to effectively defend against a wide ran

    Users
    No information available
    Industries
    • Information Technology and Services
    • Internet
    Market Segment
    • 88% Small-Business
    • 8% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • BitNinja Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cybersecurity
    2
    Ease of Use
    1
    Features
    1
    Security
    1
    User Interface
    1
    Cons
    Ineffective Blocking
    2
    Bugs
    1
    Cloud Compatibility
    1
    False Positives
    1
    Inefficient Alert System
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BitNinja features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 8.8
    6.7
    Malware Evaluation
    Average: 8.9
    8.3
    Malware Detection
    Average: 9.0
    8.3
    File Analysis
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2014
    HQ Location
    Debrecen
    Twitter
    @bitninjaio
    1,102 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    24 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

State-of-the-art server security with an all-in-one platform BitNinja offers an advanced server security solution with a proactive and unified system designed to effectively defend against a wide ran

Users
No information available
Industries
  • Information Technology and Services
  • Internet
Market Segment
  • 88% Small-Business
  • 8% Mid-Market
BitNinja Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cybersecurity
2
Ease of Use
1
Features
1
Security
1
User Interface
1
Cons
Ineffective Blocking
2
Bugs
1
Cloud Compatibility
1
False Positives
1
Inefficient Alert System
1
BitNinja features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 8.8
6.7
Malware Evaluation
Average: 8.9
8.3
Malware Detection
Average: 9.0
8.3
File Analysis
Average: 8.9
Seller Details
Year Founded
2014
HQ Location
Debrecen
Twitter
@bitninjaio
1,102 Twitter followers
LinkedIn® Page
www.linkedin.com
24 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Emsisoft Business Security is a powerful Windows cybersecurity solution that protects small and medium sized businesses from online threats. Featuring a full suite of multi-layered real-time protectio

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Mid-Market
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Emsisoft Business Security features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.8
    9.3
    Malware Evaluation
    Average: 8.9
    10.0
    Malware Detection
    Average: 9.0
    9.3
    File Analysis
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Emsisoft
    Year Founded
    2003
    HQ Location
    Nelson,New Zealand
    Twitter
    @emsisoft
    6,164 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    23 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Emsisoft Business Security is a powerful Windows cybersecurity solution that protects small and medium sized businesses from online threats. Featuring a full suite of multi-layered real-time protectio

Users
No information available
Industries
No information available
Market Segment
  • 67% Mid-Market
  • 50% Small-Business
Emsisoft Business Security features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.8
9.3
Malware Evaluation
Average: 8.9
10.0
Malware Detection
Average: 9.0
9.3
File Analysis
Average: 8.9
Seller Details
Seller
Emsisoft
Year Founded
2003
HQ Location
Nelson,New Zealand
Twitter
@emsisoft
6,164 Twitter followers
LinkedIn® Page
www.linkedin.com
23 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ReversingLabs is the trusted name in file and software security. We provide the modern cybersecurity platform to verify and deliver safe binaries. Trusted by the Fortune 500 and leading cybersecurity

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ReversingLabs Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Accuracy of Information
    1
    Ease of Use
    1
    Easy Integrations
    1
    Easy Setup
    1
    Efficiency
    1
    Cons
    Difficult Learning Curve
    1
    Difficulty for Beginners
    1
    Lack of Clarity
    1
    Learning Difficulty
    1
    Poor Documentation
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ReversingLabs features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 8.8
    9.3
    Malware Evaluation
    Average: 8.9
    8.8
    Malware Detection
    Average: 9.0
    8.7
    File Analysis
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2009
    HQ Location
    Cambridge, US
    Twitter
    @ReversingLabs
    6,663 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    314 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ReversingLabs is the trusted name in file and software security. We provide the modern cybersecurity platform to verify and deliver safe binaries. Trusted by the Fortune 500 and leading cybersecurity

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
ReversingLabs Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Accuracy of Information
1
Ease of Use
1
Easy Integrations
1
Easy Setup
1
Efficiency
1
Cons
Difficult Learning Curve
1
Difficulty for Beginners
1
Lack of Clarity
1
Learning Difficulty
1
Poor Documentation
1
ReversingLabs features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 8.8
9.3
Malware Evaluation
Average: 8.9
8.8
Malware Detection
Average: 9.0
8.7
File Analysis
Average: 8.9
Seller Details
Year Founded
2009
HQ Location
Cambridge, US
Twitter
@ReversingLabs
6,663 Twitter followers
LinkedIn® Page
www.linkedin.com
314 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Joe Security specializes in the development of malware analysis systems for malware detection and forensics. Based on the idea of deep malware analysis & multi-technology platform, Joe Security ha

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Small-Business
    • 20% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Joe Sandbox features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 8.8
    10.0
    Malware Evaluation
    Average: 8.9
    9.4
    Malware Detection
    Average: 9.0
    9.4
    File Analysis
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2011
    HQ Location
    Reinach, Baselland
    Twitter
    @joe4security
    7,130 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Joe Security specializes in the development of malware analysis systems for malware detection and forensics. Based on the idea of deep malware analysis & multi-technology platform, Joe Security ha

Users
No information available
Industries
No information available
Market Segment
  • 60% Small-Business
  • 20% Enterprise
Joe Sandbox features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 8.8
10.0
Malware Evaluation
Average: 8.9
9.4
Malware Detection
Average: 9.0
9.4
File Analysis
Average: 8.9
Seller Details
Year Founded
2011
HQ Location
Reinach, Baselland
Twitter
@joe4security
7,130 Twitter followers
LinkedIn® Page
www.linkedin.com
7 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Valkyrie is a file verdict system. Different from traditional signature based malware detection techniques Valkyrie conducts several analysis using run-time behavior and hundreds of features from a fi

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Comodo Valkyrie features and usability ratings that predict user satisfaction
    7.5
    Has the product been a good partner in doing business?
    Average: 8.8
    8.3
    Malware Evaluation
    Average: 8.9
    8.3
    Malware Detection
    Average: 9.0
    9.2
    File Analysis
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Xcitium
    Year Founded
    2018
    HQ Location
    Clifton, NJ
    LinkedIn® Page
    www.linkedin.com
    682 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Valkyrie is a file verdict system. Different from traditional signature based malware detection techniques Valkyrie conducts several analysis using run-time behavior and hundreds of features from a fi

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 33% Mid-Market
Comodo Valkyrie features and usability ratings that predict user satisfaction
7.5
Has the product been a good partner in doing business?
Average: 8.8
8.3
Malware Evaluation
Average: 8.9
8.3
Malware Detection
Average: 9.0
9.2
File Analysis
Average: 8.9
Seller Details
Seller
Xcitium
Year Founded
2018
HQ Location
Clifton, NJ
LinkedIn® Page
www.linkedin.com
682 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Scan your PC in fast and effective way for malware, spyware, virus detection and removal. Detects and removes annoying browser add-on's, adware, unwanted apps and toolbar and any type of malware on yo

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Zemana AntiMalware features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.8
    8.3
    Malware Evaluation
    Average: 8.9
    9.2
    Malware Detection
    Average: 9.0
    8.3
    File Analysis
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Zemana
    Year Founded
    2007
    HQ Location
    Ankara, TR
    Twitter
    @Zemana
    11,457 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    11 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Scan your PC in fast and effective way for malware, spyware, virus detection and removal. Detects and removes annoying browser add-on's, adware, unwanted apps and toolbar and any type of malware on yo

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Zemana AntiMalware features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.8
8.3
Malware Evaluation
Average: 8.9
9.2
Malware Detection
Average: 9.0
8.3
File Analysis
Average: 8.9
Seller Details
Seller
Zemana
Year Founded
2007
HQ Location
Ankara, TR
Twitter
@Zemana
11,457 Twitter followers
LinkedIn® Page
www.linkedin.com
11 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IObit Cloud is an advanced automated threat analysis system. We use the latest Cloud Computing technology and Heuristic Analyzing mechanic to analyze the behavior of spyware, adware, trojans, keylogge

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IObit Cloud features and usability ratings that predict user satisfaction
    0.0
    No information available
    9.2
    Malware Evaluation
    Average: 8.9
    10.0
    Malware Detection
    Average: 9.0
    8.3
    File Analysis
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2004
    HQ Location
    N/A
    Twitter
    @IObitSoft
    9,041 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    137 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

IObit Cloud is an advanced automated threat analysis system. We use the latest Cloud Computing technology and Heuristic Analyzing mechanic to analyze the behavior of spyware, adware, trojans, keylogge

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Small-Business
IObit Cloud features and usability ratings that predict user satisfaction
0.0
No information available
9.2
Malware Evaluation
Average: 8.9
10.0
Malware Detection
Average: 9.0
8.3
File Analysis
Average: 8.9
Seller Details
Year Founded
2004
HQ Location
N/A
Twitter
@IObitSoft
9,041 Twitter followers
LinkedIn® Page
www.linkedin.com
137 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Avira Cloud Sandbox API enables security vendors and service providers to submit files and receive detailed threat intelligence reports containing a complete threat assessment.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Avira Cloud Sandbox features and usability ratings that predict user satisfaction
    0.0
    No information available
    10.0
    Malware Evaluation
    Average: 8.9
    8.3
    Malware Detection
    Average: 9.0
    6.7
    File Analysis
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2022
    HQ Location
    Tempe, Arizona
    Twitter
    @GenDigitalInc
    4,253 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,518 employees on LinkedIn®
    Ownership
    NASDAQ: GEN
Product Description
How are these determined?Information
This description is provided by the seller.

The Avira Cloud Sandbox API enables security vendors and service providers to submit files and receive detailed threat intelligence reports containing a complete threat assessment.

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Avira Cloud Sandbox features and usability ratings that predict user satisfaction
0.0
No information available
10.0
Malware Evaluation
Average: 8.9
8.3
Malware Detection
Average: 9.0
6.7
File Analysis
Average: 8.9
Seller Details
Year Founded
2022
HQ Location
Tempe, Arizona
Twitter
@GenDigitalInc
4,253 Twitter followers
LinkedIn® Page
www.linkedin.com
2,518 employees on LinkedIn®
Ownership
NASDAQ: GEN
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    With a user-friendly interface, cloud or on-prem based management options and a central control panel, you can easily manage all your endpoint devices (Computer, Mobile Device, Smart TV) from one plac

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • C-Prot Endpoint Security features and usability ratings that predict user satisfaction
    0.0
    No information available
    10.0
    Malware Evaluation
    Average: 8.9
    10.0
    Malware Detection
    Average: 9.0
    10.0
    File Analysis
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Twitter
    @cprottr
    182 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    16 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

With a user-friendly interface, cloud or on-prem based management options and a central control panel, you can easily manage all your endpoint devices (Computer, Mobile Device, Smart TV) from one plac

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
C-Prot Endpoint Security features and usability ratings that predict user satisfaction
0.0
No information available
10.0
Malware Evaluation
Average: 8.9
10.0
Malware Detection
Average: 9.0
10.0
File Analysis
Average: 8.9
Seller Details
Twitter
@cprottr
182 Twitter followers
LinkedIn® Page
www.linkedin.com
16 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Domain and IP Threat Intelligence feeds enable cybersecurity vendors and security operations to make their products and teams faster and more secure. By utilizing machine learning to assess the risk a

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Domain and IP Intelligence Feeds Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Accuracy of Information
    2
    Alerts
    1
    Automation
    1
    Ease of Use
    1
    Helpful
    1
    Cons
    Expensive
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Domain and IP Intelligence Feeds features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2020
    HQ Location
    Draper, UT
    Twitter
    @alphamountainai
    38 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Domain and IP Threat Intelligence feeds enable cybersecurity vendors and security operations to make their products and teams faster and more secure. By utilizing machine learning to assess the risk a

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Domain and IP Intelligence Feeds Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Accuracy of Information
2
Alerts
1
Automation
1
Ease of Use
1
Helpful
1
Cons
Expensive
1
Domain and IP Intelligence Feeds features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.8
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2020
HQ Location
Draper, UT
Twitter
@alphamountainai
38 Twitter followers
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    MalZilla is a useful program for use in exploring malicious pages. It allows you to choose your own user agent and referrer, and has the ability to use proxies. It shows you the full source of webpage

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Malzilla features and usability ratings that predict user satisfaction
    6.7
    Has the product been a good partner in doing business?
    Average: 8.8
    6.7
    Malware Evaluation
    Average: 8.9
    6.7
    Malware Detection
    Average: 9.0
    8.3
    File Analysis
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Malzilla
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

MalZilla is a useful program for use in exploring malicious pages. It allows you to choose your own user agent and referrer, and has the ability to use proxies. It shows you the full source of webpage

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Malzilla features and usability ratings that predict user satisfaction
6.7
Has the product been a good partner in doing business?
Average: 8.8
6.7
Malware Evaluation
Average: 8.9
6.7
Malware Detection
Average: 9.0
8.3
File Analysis
Average: 8.9
Seller Details
Seller
Malzilla
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The odix Kiosk is a Linux-based hardened workstation dedicated to safely introducing files from removable media. The odix cybersecurity Kiosk has no hard disk and both the operating system and softwar

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • odix Kiosk features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.3
    Malware Evaluation
    Average: 8.9
    10.0
    Malware Detection
    Average: 9.0
    10.0
    File Analysis
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    odix
    Year Founded
    2012
    HQ Location
    Rosh Haain, Israel
    Twitter
    @odix
    10 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    18 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The odix Kiosk is a Linux-based hardened workstation dedicated to safely introducing files from removable media. The odix cybersecurity Kiosk has no hard disk and both the operating system and softwar

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
odix Kiosk features and usability ratings that predict user satisfaction
0.0
No information available
8.3
Malware Evaluation
Average: 8.9
10.0
Malware Detection
Average: 9.0
10.0
File Analysis
Average: 8.9
Seller Details
Seller
odix
Year Founded
2012
HQ Location
Rosh Haain, Israel
Twitter
@odix
10 Twitter followers
LinkedIn® Page
www.linkedin.com
18 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Phishfort Anti-Phishing Solutions features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.3
    Malware Evaluation
    Average: 8.9
    8.3
    Malware Detection
    Average: 9.0
    8.3
    File Analysis
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    PhishFort
    HQ Location
    N/A
    LinkedIn® Page
    www.linkedin.com
    18 employees on LinkedIn®
Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Phishfort Anti-Phishing Solutions features and usability ratings that predict user satisfaction
0.0
No information available
8.3
Malware Evaluation
Average: 8.9
8.3
Malware Detection
Average: 9.0
8.3
File Analysis
Average: 8.9
Seller Details
Seller
PhishFort
HQ Location
N/A
LinkedIn® Page
www.linkedin.com
18 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Re-Sec solution provides a means preventing cyber threats from entering and spreading within the organization.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Re-Sec Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Data Security
    1
    Ease of Use
    1
    Easy Setup
    1
    Implementation Ease
    1
    Product Quality
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Re-Sec features and usability ratings that predict user satisfaction
    0.0
    No information available
    10.0
    Malware Evaluation
    Average: 8.9
    10.0
    Malware Detection
    Average: 9.0
    10.0
    File Analysis
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Re-Sec solution provides a means preventing cyber threats from entering and spreading within the organization.

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Re-Sec Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Data Security
1
Ease of Use
1
Easy Setup
1
Implementation Ease
1
Product Quality
1
Cons
This product has not yet received any negative sentiments.
Re-Sec features and usability ratings that predict user satisfaction
0.0
No information available
10.0
Malware Evaluation
Average: 8.9
10.0
Malware Detection
Average: 9.0
10.0
File Analysis
Average: 8.9
Seller Details
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Deep Instinct is the only preemptive data security solution that PREVENTS >99% of UNKNOWN and ZERO-DAY threats, including ransomware and AI generated malware before they breach your environment, wh

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Deep Instinct Data Security X features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    New York, NY
    Twitter
    @DeepInstinctSec
    8,922 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    274 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Deep Instinct is the only preemptive data security solution that PREVENTS >99% of UNKNOWN and ZERO-DAY threats, including ransomware and AI generated malware before they breach your environment, wh

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Deep Instinct Data Security X features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.8
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2015
HQ Location
New York, NY
Twitter
@DeepInstinctSec
8,922 Twitter followers
LinkedIn® Page
www.linkedin.com
274 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    DOCGuard is a cutting-edge cybersecurity solution specializing in detecting and analyzing malicious documents. Utilizing advanced structural analysis techniques, DOCGuard identifies threats in Office

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DOCGUARD Groundbreaking Malware Analysis Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2022
    HQ Location
    Wilmington, US
    Twitter
    @doc_guard
    6,386 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

DOCGuard is a cutting-edge cybersecurity solution specializing in detecting and analyzing malicious documents. Utilizing advanced structural analysis techniques, DOCGuard identifies threats in Office

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
DOCGUARD Groundbreaking Malware Analysis Platform features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2022
HQ Location
Wilmington, US
Twitter
@doc_guard
6,386 Twitter followers
LinkedIn® Page
www.linkedin.com
4 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Triage is Hatching’s new and revolutionary malware sandboxing solution. It leverages a unique architecture, developed with scaling in mind from the start. Triage can scale up to 500.000 analyses per d

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Hatching Triage features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Hatching
    HQ Location
    Zaanstad, North Holland
    LinkedIn® Page
    www.linkedin.com
    12 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Triage is Hatching’s new and revolutionary malware sandboxing solution. It leverages a unique architecture, developed with scaling in mind from the start. Triage can scale up to 500.000 analyses per d

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Hatching Triage features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Hatching
HQ Location
Zaanstad, North Holland
LinkedIn® Page
www.linkedin.com
12 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Immunity Debugger is a powerful new way to write exploits, analyze malware, and reverse engineer binary files. It builds on a solid user interface with function graphing, the industry's first heap ana

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Immunity Debugger features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Immunity
    Twitter
    @Immunityinc
    6,568 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    41 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Immunity Debugger is a powerful new way to write exploits, analyze malware, and reverse engineer binary files. It builds on a solid user interface with function graphing, the industry's first heap ana

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Immunity Debugger features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Immunity
Twitter
@Immunityinc
6,568 Twitter followers
LinkedIn® Page
www.linkedin.com
41 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    malwareleaks.com - Cyber ​​Threat Intelligence platform specializing in threat detection and user protection. The main objectives include: - Preventing cyber attacks Early detection and blocking of th

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • malwareleaks features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    New York , US
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

malwareleaks.com - Cyber ​​Threat Intelligence platform specializing in threat detection and user protection. The main objectives include: - Preventing cyber attacks Early detection and blocking of th

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
malwareleaks features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
HQ Location
New York , US
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    QFlow is an advance malware detection and analysis platform to reduce the risk of infection during file transfers. QFlow offers comprehensive detection methods and the customization and automation of

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • QFlow features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Quarkslab
    Year Founded
    2011
    HQ Location
    Paris, FR
    LinkedIn® Page
    www.linkedin.com
    100 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

QFlow is an advance malware detection and analysis platform to reduce the risk of infection during file transfers. QFlow offers comprehensive detection methods and the customization and automation of

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
QFlow features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Quarkslab
Year Founded
2011
HQ Location
Paris, FR
LinkedIn® Page
www.linkedin.com
100 employees on LinkedIn®
0 ratings
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Reverss provides automated dynamic malware analysis to enable Cyber Intelligence Response Teams (CIRT) to mitigate obfuscated malware faster and effectively.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • REVERSS features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Anlyz
    Year Founded
    2017
    HQ Location
    Benguluru, IN
    LinkedIn® Page
    www.linkedin.com
    4 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Reverss provides automated dynamic malware analysis to enable Cyber Intelligence Response Teams (CIRT) to mitigate obfuscated malware faster and effectively.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
REVERSS features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Anlyz
Year Founded
2017
HQ Location
Benguluru, IN
LinkedIn® Page
www.linkedin.com
4 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cyber-first Active Directory recovery. Active Directory Forest Recovery (ADFR)—the only backup and recovery solution purpose-built for recovering Active Directory from cyber disasters—fully automa

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Semperis Active Directory Forest Recovery features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Semperis
    Year Founded
    2015
    HQ Location
    Hoboken, New Jersey
    Twitter
    @SemperisTech
    10,097 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    510 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cyber-first Active Directory recovery. Active Directory Forest Recovery (ADFR)—the only backup and recovery solution purpose-built for recovering Active Directory from cyber disasters—fully automa

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Semperis Active Directory Forest Recovery features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Semperis
Year Founded
2015
HQ Location
Hoboken, New Jersey
Twitter
@SemperisTech
10,097 Twitter followers
LinkedIn® Page
www.linkedin.com
510 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    We started Threatray to create the world’s most advanced and effective malware threat search and analytics engine. We achieved this mission by combining data-based and algorithmic technologies to go b

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Threatray features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Threatray
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

We started Threatray to create the world’s most advanced and effective malware threat search and analytics engine. We achieved this mission by combining data-based and algorithmic technologies to go b

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Threatray features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Threatray
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CyberSoft offers anti-virus products and solutions for UNIX, Linux, and Solaris systems.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • VFind Security ToolKit features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cybersoft
    Year Founded
    1988
    HQ Location
    Conshohocken, US
    LinkedIn® Page
    www.linkedin.com
    4 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CyberSoft offers anti-virus products and solutions for UNIX, Linux, and Solaris systems.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
VFind Security ToolKit features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Cybersoft
Year Founded
1988
HQ Location
Conshohocken, US
LinkedIn® Page
www.linkedin.com
4 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • VIPRE Email Cloud Add-on Solutions features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1994
    HQ Location
    Clearwater, FL
    Twitter
    @VIPRESecurity
    8,570 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    207 employees on LinkedIn®
Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
VIPRE Email Cloud Add-on Solutions features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1994
HQ Location
Clearwater, FL
Twitter
@VIPRESecurity
8,570 Twitter followers
LinkedIn® Page
www.linkedin.com
207 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    VIPRE Endpoint Detection & Response (EDR) provides powerful endpoint threat detection with intuitive and actionable incident management and threat visualization in the console. Built on top of our

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • VIPRE Endpoint Detection & Response features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1994
    HQ Location
    Clearwater, FL
    Twitter
    @VIPRESecurity
    8,570 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    207 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

VIPRE Endpoint Detection & Response (EDR) provides powerful endpoint threat detection with intuitive and actionable incident management and threat visualization in the console. Built on top of our

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
VIPRE Endpoint Detection & Response features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1994
HQ Location
Clearwater, FL
Twitter
@VIPRESecurity
8,570 Twitter followers
LinkedIn® Page
www.linkedin.com
207 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    VIPRE ThreatAnalyzer is a dynamic malware analysis sandbox that lets you safely reveal the potential impact of malware on your organization—so you can respond faster and smarter in the event of a real

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • VIPRE Threat Analyzer Sandbox features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1994
    HQ Location
    Clearwater, FL
    Twitter
    @VIPRESecurity
    8,570 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    207 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

VIPRE ThreatAnalyzer is a dynamic malware analysis sandbox that lets you safely reveal the potential impact of malware on your organization—so you can respond faster and smarter in the event of a real

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
VIPRE Threat Analyzer Sandbox features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1994
HQ Location
Clearwater, FL
Twitter
@VIPRESecurity
8,570 Twitter followers
LinkedIn® Page
www.linkedin.com
207 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Virusade provides hosted virus scanning for developers

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Virusade features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Virusade
    Twitter
    @virusade
    3 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Virusade provides hosted virus scanning for developers

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Virusade features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Virusade
Twitter
@virusade
3 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®

Learn More About Malware Analysis Tools

What are Malware Analysis Tools?

Malware analysis tools help organizations detect and mitigate potential cyber threats. Malware is a malicious software that attacks and causes damage to programmable devices, servers, networks, and host systems. It can be of different varieties, such as ransomware, virus, spyware, and more. Malware analysis is the process that allows for easy identification of malware emergence, its purpose, and its impact on the organization’s IT assets, endpoints, and applications. It helps in tackling vulnerabilities on time and reduces threats to applications, websites, and servers.

Once a malware is detected in the system, cybersecurity experts typically collect a sample and analyze it in a sandboxed environment to understand its functionalities and the impact it can have on the company’s security infrastructure. The team then devises how the malware can be reverse engineered by testing its response to various countermeasures such as antivirus programs.

What Types of Malware Analysis Tools Exist?

Malware analysis tools can be categorized based on how the analysis is conducted. They will fall under one of the following types:

Static malware analysis tools

This type of tool examines a file without executing the code. Static analysis can easily be performed and helps derive static information associated with the files being examined, such as metadata, embedded resources, headers, and more. Certain technical parameters are used to identify if the file is harmful. Static analysis is not instrumental in detecting sophisticated malware as it does not run the program. It can, however, provide insights to identify where the security team should conduct their subsequent investigation. If the results of static malware analysis reveal no malicious intent, the code is usually discarded, and no further analysis is conducted to detect malware.

Dynamic malware analysis tools

Tools for conducting dynamic analysis execute suspicious codes in a secure environment known as a sandbox. They search through the codes of executable files to pull out specific suspicious actions. The sandbox helps simulate an entire host environment (memory, CPU, operating systems), allowing the security experts to constantly monitor the malware's capabilities without posing any threat to the organization’s security. It provides high-level insights to understand the nature of the malware and its impact. It also expedites the process of rediscovering a malicious file. 

Hybrid malware analysis tools

Static analysis does not help in detecting sophisticated malicious code. Sophisticated malware can sometimes go undetected, even with the application of sandbox technology. Hybrid tools offer a combination of both techniques. Hybrid analysis identifies risks even from the most sophisticated malware. It detects files hiding malicious codes and derives more indicators of compromise for more informed analysis.

Forensic malware analysis tools

Digital forensic analysts use these tools to examine a system post-compromise to identify malicious files, log changes, and suspicious activity. These tools are typically used after a malware attack for security teams to analyze the capability and effects of the malware and deal with it in the future. 

What are the Common Features of Malware Analysis Tools?

The following are some core features within malware analysis tools that can help users in detecting potential cybersecurity threats:

Malware identification: Malware analysis tools have built-in capabilities to identify good and malicious code. They assist in the effective detection of vulnerabilities and threats. Threat actors are resorting to highly advanced techniques that make detecting an anomaly more difficult. Malware analysis tools provide behavioral analysis to identify malicious codes and suspicious activities. This includes analysis of activity logs, process monitoring, file system tracking, and more to assist in responding to threats efficiently. Additionally, malware analysis offers extraction of indicators of compromise (IoCs), which helps to identify future threats of the same nature.

Threat alerts and triage: These tools help security teams understand the pattern of malware threats and enable them to take corrective actions on time. They conduct an initial triage of malware samples and help malware analysts to discover suspicious artifacts for debugging and reverse engineering the malware. Malware analysis tools emphasize sending high-fidelity alerts that users can trust and act on. Therefore, security professionals can prevent time wastage and take prompt actions based on these alerts.

Network activity monitoring: Organizations can benefit from malware analysis tools that monitor endpoints and networks to detect suspicious files. The tools can record, filter, and analyze network traffic to help security operations teams understand the behavioral indicators of malware and how the malware impacts network traffic.

What are the Benefits of Malware Analysis Tools?

Organizations can benefit from malware analysis tools in the following ways:

Effective response to incidents: Malware analysis tools allow security experts to efficiently respond to and contain incidents. By correctly analyzing with the help of these tools, responders can prevent the malicious code from causing massive damage to the organization and its sensitive data.

In-depth analysis of suspicious activities: The tools provide real-time insights into processes and file systems. They help incident responders and security analysts to collect, analyze and gain an in-depth understanding of the information from events and log files. This threat intelligence data can be gathered from firewalls, routers, network detection systems, and domain controllers. After performing deep analysis, these tools generate detailed reports in various formats to guide the team in determining the attacker’s motive and devise strategies for the containment and eradication of malware.

Increased security: Tools for malware analysis facilitate quick identification of threats in their systems and take corrective actions on time. This ensures the security of sensitive data and intellectual property from threat actors. Security teams also ensure safety by analyzing compiled code on different platforms such as Windows, macOS, and Linux using these tools.

Who Uses Malware Analysis Tools?

Incident response teams: Cyber security incident response teams conduct digital forensics and malware analysis. Incident response teams conduct root cause analysis to understand how the malware can affect the organization. The team uses malware analysis tools for reverse engineering malware samples and extracting actionable threat intelligence that can be used as reference to identify suspicious files in the future.

Malware researchers: Industry or academic malware researchers use malware analysis solutions to enhance their knowledge of the latest techniques, maneuvers, and tools used by cyber attackers to disrupt the security thread of organizations.

What are the Alternatives to Malware Analysis Tools?

Alternatives to malware analysis tools can replace this type of software, either partially or completely:

Website security software: Website security software safeguards websites from cyber attacks, online threats, and adversaries. These tools offer attributes of distributed denial of service (DDoS) protection software, content delivery networks (CDN), and web application firewalls (WAF) to provide all-around website protection. 

Antivirus software: It is a software that searches for, detects, debugs, and prevents malicious software from infecting the networks, virtual machines, systems, and devices. Malware detected by an antivirus includes viruses, worms, trojans, adware, etc.

Software Related to Malware Analysis Tools

Related solutions that can be used together with malware analysis tools include:

Network sandboxing software: A network sandboxing software provides a secure and isolated environment for security analysts to monitor, analyze, identify, and eradicate suspicious files on the company’s network.

Challenges with Malware Analysis Tools

While malware analysis tools provide numerous advantages to businesses across the globe, they pose certain challenges, as listed below, which organizations must take into account.

Lack of integration, accuracy, and automation: One of the core challenges with malware analysis tools is their lack of integration and automation of workflows. As a result, the process becomes error-prone and doesn’t yield productive results. Organizations can lose valuable time due to a lack of accuracy and faulty code analysis while investigating malicious software.

Lack of expertise in the application of malware analysis tools: Malware analysis demands accuracy and requires the staff to be properly trained for the execution of this job. It is often challenging to find professionals with the right skill set. Additionally, security teams are often short-staffed and overwhelmed by the increasing number of threats. As a result, they can investigate only a fraction of the total alerts generated.

How to Buy Malware Analysis Tools

Requirements Gathering (RFI/RFP) for Malware Analysis Tools

Whether a company is looking to buy its first malware analysis tool or switching to a new solution—wherever a business is in its buying process, g2.com can help select the best tool to suit the organization’s requirements.

The organization’s security professionals team should think about the pain points and jot them down, and these should be used to help create a criteria checklist. The business pain points might be related to the functionalities the tool must have to meet expectations. Besides technical and performance considerations, the team must also take into account how the new solution can add value to the existing security stack of the company. The checklist is a detailed guide that includes security requirements, necessary and nice-to-have features, budget, number of users, integrations, cloud or on-premises solutions, etc.

Depending on the scope of the deployment, it might be helpful to produce a request for information (RFI), a one-page list with a few bullet points describing what is needed from the malware analysis tool.

Compare Malware Analysis Tools Products

Create a long list

Vendor evaluations are essential to the software buying process, from meeting the business functionality needs to implementation. It helps to prepare a consistent list of questions regarding specific requirements and concerns to ask each vendor. The buyer may choose between an open-source or a closed-source tool.

The malware analysis products should be evaluated based on the following major parameters:

User-friendly interface: Malware analysis is not an easy task. As such, the tools for this job should come with a couple of user-friendly features which make the job of malware analysts as easy as possible. The tools should provide easy-to-use customizable features to help them stay organized.

Extensive library of malware variants: It becomes imperative for the tool to have large threat repositories of malware samples to help in the easy identification of different kinds of malware that can infect the system. The tools used for malware analysis typically use signature-based detection, which scans the database for artifacts of known malware families. Malware can go undetected if there is no record of the same variant in the database.

Automation: Without automation capabilities, malware detection can become tedious and error-prone even as evasive and advanced malware are becoming more common. To ensure higher accuracy, it is desirable to have additional automation capabilities within the tool as compared to a regular malware analysis solution. The organization can benefit from tools that incorporate machine learning (ML) and artificial intelligence (AI) in malware detection and analysis. ML is not limited to signature-based analysis. Machine learning algorithms help in behavior-based malware detection through the evaluation of objects for malicious behavior by identifying patterns and trends.

Create a short list

From the long list of vendors, narrowing down the list of contenders is pragmatic. Buyers must read user reviews, view ratings on the G2 Grid for the malware analysis software category and read useability ratings. Buyers can compare the features offered by different products, such as decompilation, disassembly, assembly, graphing, and scripting, along with various other features. It is also recommended to compare the pricing structure of various solutions to shorten the list to a handful of contenders.

Conduct demos

While extensive documentation and tutorials are available on vendor websites, it is beneficial to request the provider for a live demo to have a better understanding of their offering. During each demo, buyers must ask questions and get clarifications on different use cases to best evaluate how each vendor stacks up against the competition. 

Selection of Malware Analysis Tools

Choose a selection team

Before getting started, creating a winning team that will work together throughout the entire process, from identifying pain points to implementation, is essential. The selection team should consist of organization members with the right interest, skills, and time to participate in this process. A good starting point is to aim for three to five people who fill the required roles. This may include the primary decision maker, cyber security incident response professional, technical lead, and IT administrator. 

Users must make sure that the selection team takes productivity-driven data into account. The selection process should involve comparing notes, facts, and figures noted during the process, such as the availability of advanced capabilities, usability, and security features.

Negotiation

It is important to discuss with the vendor their pricing structure, subscription fees, and licensing costs. For instance, the vendor may be willing to give a discount for multi-year contracts or for recommending the tool to other users.

Final decision

Selecting a vendor that has a strategy aligned with the company’s security objectives will accelerate growth. Before going all in, it is recommended to roll out a test run or pilot program to test adoption with a small sample size of users. If the tool is well used and received, the buyer can be confident that the selection is correct. If not, it might be time to evaluate other offerings.