Introducing G2.ai, the future of software buying.Try now

Best Malware Analysis Tools for Medium-Sized Businesses

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Products classified in the overall Malware Analysis Tools category are similar in many regards and help companies of all sizes solve their business problems. However, medium-sized business features, pricing, setup, and installation differ from businesses of other sizes, which is why we match buyers to the right Medium-Sized Business Malware Analysis Tools to fit their needs. Compare product ratings based on reviews from enterprise users or connect with one of G2's buying advisors to find the right solutions within the Medium-Sized Business Malware Analysis Tools category.

In addition to qualifying for inclusion in the Malware Analysis Tools category, to qualify for inclusion in the Medium-Sized Business Malware Analysis Tools category, a product must have at least 10 reviews left by a reviewer from a medium-sized business.

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

1 filter applied
Clear All
7 Listings in Malware Analysis Tools Available
(874)4.6 out of 5
Optimized for quick response
1st Easiest To Use in Malware Analysis Tools software
View top Consulting Services for ESET PROTECT
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Stay one step ahead of known and emerging cyber threats with our AI-native, prevention-first approach. ESET combines the power of AI and human expertise to make protection easy and effective. Expe

    Users
    • IT Manager
    • Network Administrator
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 47% Small-Business
    • 44% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ESET PROTECT Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    148
    Security
    146
    Protection
    126
    Cybersecurity Protection
    93
    Features
    83
    Cons
    Expensive
    39
    Learning Curve
    30
    Slow Performance
    29
    Compatibility Issues
    25
    Missing Features
    22
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ESET PROTECT features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 8.8
    9.6
    Malware Evaluation
    Average: 8.9
    9.6
    Malware Detection
    Average: 9.1
    9.5
    File Analysis
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ESET
    Company Website
    Year Founded
    1992
    HQ Location
    Bratislava, Slovak Republic
    Twitter
    @ESET
    286,273 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,887 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Stay one step ahead of known and emerging cyber threats with our AI-native, prevention-first approach. ESET combines the power of AI and human expertise to make protection easy and effective. Expe

Users
  • IT Manager
  • Network Administrator
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 47% Small-Business
  • 44% Mid-Market
ESET PROTECT Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
148
Security
146
Protection
126
Cybersecurity Protection
93
Features
83
Cons
Expensive
39
Learning Curve
30
Slow Performance
29
Compatibility Issues
25
Missing Features
22
ESET PROTECT features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 8.8
9.6
Malware Evaluation
Average: 8.9
9.6
Malware Detection
Average: 9.1
9.5
File Analysis
Average: 8.9
Seller Details
Seller
ESET
Company Website
Year Founded
1992
HQ Location
Bratislava, Slovak Republic
Twitter
@ESET
286,273 Twitter followers
LinkedIn® Page
www.linkedin.com
1,887 employees on LinkedIn®
(104)4.4 out of 5
Optimized for quick response
6th Easiest To Use in Malware Analysis Tools software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Overview Our Cloud-Delivered Security Services are natively integrated, offering consistent best-in-class protection everywhere. Backed by our world-renowned Unit 42® Threat Research team, this one-o

    Users
    • Network Engineer
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 40% Mid-Market
    • 35% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cloud-Delivered Security Services features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 8.8
    8.8
    Malware Evaluation
    Average: 8.9
    8.7
    Malware Detection
    Average: 9.1
    8.5
    File Analysis
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    127,092 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    17,526 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Overview Our Cloud-Delivered Security Services are natively integrated, offering consistent best-in-class protection everywhere. Backed by our world-renowned Unit 42® Threat Research team, this one-o

Users
  • Network Engineer
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 40% Mid-Market
  • 35% Enterprise
Cloud-Delivered Security Services features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 8.8
8.8
Malware Evaluation
Average: 8.9
8.7
Malware Detection
Average: 9.1
8.5
File Analysis
Average: 8.9
Seller Details
Company Website
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
127,092 Twitter followers
LinkedIn® Page
www.linkedin.com
17,526 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(125)4.7 out of 5
3rd Easiest To Use in Malware Analysis Tools software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ANY.RUN provides an interactive sandbox for malware analysis, offering deep visibility into threat behavior in a secure, cloud-based environment with Windows, Linux, and Android support. It helps SOC

    Users
    No information available
    Industries
    • Computer & Network Security
    • Financial Services
    Market Segment
    • 38% Enterprise
    • 32% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ANY.RUN Sandbox features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 8.8
    9.2
    Malware Evaluation
    Average: 8.9
    9.1
    Malware Detection
    Average: 9.1
    9.3
    File Analysis
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ANY.RUN
    Company Website
    Year Founded
    2016
    HQ Location
    Dubai, United Arab Emirates
    Twitter
    @anyrun_app
    29,171 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    269 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ANY.RUN provides an interactive sandbox for malware analysis, offering deep visibility into threat behavior in a secure, cloud-based environment with Windows, Linux, and Android support. It helps SOC

Users
No information available
Industries
  • Computer & Network Security
  • Financial Services
Market Segment
  • 38% Enterprise
  • 32% Small-Business
ANY.RUN Sandbox features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 8.8
9.2
Malware Evaluation
Average: 8.9
9.1
Malware Detection
Average: 9.1
9.3
File Analysis
Average: 8.9
Seller Details
Seller
ANY.RUN
Company Website
Year Founded
2016
HQ Location
Dubai, United Arab Emirates
Twitter
@anyrun_app
29,171 Twitter followers
LinkedIn® Page
www.linkedin.com
269 employees on LinkedIn®
(218)4.7 out of 5
Optimized for quick response
2nd Easiest To Use in Malware Analysis Tools software
Save to My Lists
Entry Level Price:Starting at $6.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Coro, the leading cybersecurity platform for small and midsize businesses, revolutionized cybersecurity with the introduction of the world’s first modular cybersecurity platform. Coro’s platform e

    Users
    • IT Manager
    • IT Director
    Industries
    • Non-Profit Organization Management
    • Financial Services
    Market Segment
    • 57% Mid-Market
    • 37% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Coro Cybersecurity is a security platform that uses AI to identify and flag potential spam and phishing, and provides a single dashboard for managing white and black lists for Office 365.
    • Reviewers appreciate the platform's ease of use, comprehensive protection, affordability, and the responsive customer support that provides quick responses and solutions to issues.
    • Reviewers experienced issues with some features not working as expected, minimal support in certain areas, and a desire for more robust console and additional features.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Coro Cybersecurity Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    93
    Customer Support
    66
    Security
    63
    Protection
    50
    Easy Setup
    46
    Cons
    Performance Issues
    32
    Improvements Needed
    20
    Inaccuracy
    16
    False Positives
    15
    Limited Features
    14
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Coro Cybersecurity features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 8.8
    9.3
    Malware Evaluation
    Average: 8.9
    9.6
    Malware Detection
    Average: 9.1
    9.4
    File Analysis
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Coronet
    Company Website
    Year Founded
    2014
    HQ Location
    Chicago, IL
    Twitter
    @coro_cyber
    1,922 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    380 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Coro, the leading cybersecurity platform for small and midsize businesses, revolutionized cybersecurity with the introduction of the world’s first modular cybersecurity platform. Coro’s platform e

Users
  • IT Manager
  • IT Director
Industries
  • Non-Profit Organization Management
  • Financial Services
Market Segment
  • 57% Mid-Market
  • 37% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Coro Cybersecurity is a security platform that uses AI to identify and flag potential spam and phishing, and provides a single dashboard for managing white and black lists for Office 365.
  • Reviewers appreciate the platform's ease of use, comprehensive protection, affordability, and the responsive customer support that provides quick responses and solutions to issues.
  • Reviewers experienced issues with some features not working as expected, minimal support in certain areas, and a desire for more robust console and additional features.
Coro Cybersecurity Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
93
Customer Support
66
Security
63
Protection
50
Easy Setup
46
Cons
Performance Issues
32
Improvements Needed
20
Inaccuracy
16
False Positives
15
Limited Features
14
Coro Cybersecurity features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 8.8
9.3
Malware Evaluation
Average: 8.9
9.6
Malware Detection
Average: 9.1
9.4
File Analysis
Average: 8.9
Seller Details
Seller
Coronet
Company Website
Year Founded
2014
HQ Location
Chicago, IL
Twitter
@coro_cyber
1,922 Twitter followers
LinkedIn® Page
www.linkedin.com
380 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IVX is a signature-less, dynamic analysis engine that captures and confirms zero-day, and targeted APT attacks. IVX identifies attacks that evade traditional signature-based defenses by detonating sus

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 43% Mid-Market
    • 37% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Trellix Intelligent Virtual Execution (IVX) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Detection
    8
    Detection Efficiency
    6
    Ease of Use
    6
    Security
    6
    Cloud Integration
    5
    Cons
    Expensive
    8
    Pricing Issues
    4
    Learning Curve
    3
    Cloud Dependency
    1
    Compatibility Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trellix Intelligent Virtual Execution (IVX) features and usability ratings that predict user satisfaction
    7.5
    Has the product been a good partner in doing business?
    Average: 8.8
    6.7
    Malware Evaluation
    Average: 8.9
    7.9
    Malware Detection
    Average: 9.1
    6.7
    File Analysis
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Trellix
    Year Founded
    2004
    HQ Location
    Milpitas, CA
    Twitter
    @Trellix
    250,169 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    823 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

IVX is a signature-less, dynamic analysis engine that captures and confirms zero-day, and targeted APT attacks. IVX identifies attacks that evade traditional signature-based defenses by detonating sus

Users
No information available
Industries
No information available
Market Segment
  • 43% Mid-Market
  • 37% Small-Business
Trellix Intelligent Virtual Execution (IVX) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Detection
8
Detection Efficiency
6
Ease of Use
6
Security
6
Cloud Integration
5
Cons
Expensive
8
Pricing Issues
4
Learning Curve
3
Cloud Dependency
1
Compatibility Issues
1
Trellix Intelligent Virtual Execution (IVX) features and usability ratings that predict user satisfaction
7.5
Has the product been a good partner in doing business?
Average: 8.8
6.7
Malware Evaluation
Average: 8.9
7.9
Malware Detection
Average: 9.1
6.7
File Analysis
Average: 8.9
Seller Details
Seller
Trellix
Year Founded
2004
HQ Location
Milpitas, CA
Twitter
@Trellix
250,169 Twitter followers
LinkedIn® Page
www.linkedin.com
823 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    FileScan.IO is a free malware analysis service that offers rapid in-depth file assesments, threat intelligence and indicator of compromise (IOCs) extraction for a wide range of executable files, docum

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 52% Small-Business
    • 35% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OPSWAT Filescan features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.8
    9.3
    Malware Evaluation
    Average: 8.9
    9.7
    Malware Detection
    Average: 9.1
    9.5
    File Analysis
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    OPSWAT
    Year Founded
    2002
    HQ Location
    Tampa, Florida
    Twitter
    @OPSWAT
    7,241 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    982 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

FileScan.IO is a free malware analysis service that offers rapid in-depth file assesments, threat intelligence and indicator of compromise (IOCs) extraction for a wide range of executable files, docum

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 52% Small-Business
  • 35% Mid-Market
OPSWAT Filescan features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.8
9.3
Malware Evaluation
Average: 8.9
9.7
Malware Detection
Average: 9.1
9.5
File Analysis
Average: 8.9
Seller Details
Seller
OPSWAT
Year Founded
2002
HQ Location
Tampa, Florida
Twitter
@OPSWAT
7,241 Twitter followers
LinkedIn® Page
www.linkedin.com
982 employees on LinkedIn®
(192)4.5 out of 5
Optimized for quick response
5th Easiest To Use in Malware Analysis Tools software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Intezer automates the entire alert triage process, like an extension of your team handling Tier 1 SOC tasks for every alert at machine-speed. Intezer monitors incoming incidents from endpoint, reporte

    Users
    • Software Engineer
    • Student
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 55% Small-Business
    • 23% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Intezer Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    5
    Easy Integrations
    3
    Features
    3
    Customer Support
    2
    Cybersecurity
    2
    Cons
    Complex Interface
    2
    Improvements Needed
    2
    Poor Interface Design
    2
    UX Improvement
    2
    Alert Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Intezer features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 8.8
    9.3
    Malware Evaluation
    Average: 8.9
    9.6
    Malware Detection
    Average: 9.1
    9.4
    File Analysis
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Intezer
    Company Website
    Year Founded
    2015
    HQ Location
    New York
    Twitter
    @IntezerLabs
    10,285 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    58 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Intezer automates the entire alert triage process, like an extension of your team handling Tier 1 SOC tasks for every alert at machine-speed. Intezer monitors incoming incidents from endpoint, reporte

Users
  • Software Engineer
  • Student
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 55% Small-Business
  • 23% Mid-Market
Intezer Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
5
Easy Integrations
3
Features
3
Customer Support
2
Cybersecurity
2
Cons
Complex Interface
2
Improvements Needed
2
Poor Interface Design
2
UX Improvement
2
Alert Issues
1
Intezer features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 8.8
9.3
Malware Evaluation
Average: 8.9
9.6
Malware Detection
Average: 9.1
9.4
File Analysis
Average: 8.9
Seller Details
Seller
Intezer
Company Website
Year Founded
2015
HQ Location
New York
Twitter
@IntezerLabs
10,285 Twitter followers
LinkedIn® Page
www.linkedin.com
58 employees on LinkedIn®