Filter Results By:
Products
Applications
Manufacturers
Malware
malicious code used to cause harm.
-
product
Malware Analysis
The Tevora malware analysis process begins with the identification and quarantine of the software in question. Our experienced analysts will then test the malware in our malware analysis lab and isolate the malicious software so its behavior can be learned. Understanding what a particular piece of malware is designed to do, helps direct focus on what other systems and information are at risk.
-
product
Malware Analysis Tool
ThreatAnalyzer®
See how you can defend your network from targeted attacks, advanced malware and Zero-days with ThreatAnalyzer®, the industry''s premier malware analysis sandbox. Our dynamic malware analysis sandbox (formerly known as CWSandbox) is used to dig deep into malware to reveal its impact on your organization so you can respond quickly – knowing what''s happening on your network and what systems or data are at the greatest risk.
-
product
Malware Communication Analyzer
Malcom
Malcom is a tool designed to analyze a system's network communication using graphical representations of network traffic, and cross-reference them with known malware sources. This comes handy when analyzing how certain malware species try to communicate with the outside world. detect central command and control (C&C) servers. understand peer-to-peer networks. observe DNS fast-flux infrastructures. quickly determine if a network artifact is 'known-bad'.
-
product
Automated Memory Analyzer For Malware
VolatilityBot
VolatilityBot is an automation tool for researchers cuts all the guesswork and manual tasks out of the binary extraction phase, or to help the investigator in the first steps of performing a memory analysis investigation. Not only does it automatically extract the executable (exe), but it also fetches all new processes created in memory, code injections, strings, IP addresses, etc.
-
product
Free Online Virus, Malware and URL Scanner
VirusTotal
VirusTotal is a free service that analyzes suspicious files and URLs and facilitates the quick detection of viruses, worms, trojans, and all kinds of malware.
-
product
Software - Packet Capture, Metadata Generation, Real-Time Indexing up to Layer 7, IDS (Signature and Anomaly), Malware Analytics & More
NetDetectorLive™
Whatever the task, from forensic reconstruction of network activity to complete situational awareness of your network, NIKSUN NetDetectorLive™, with capture rates well into multi-Tbps, is the tool for the job. Simply plug it in and Know the Unknown®.NetDetectorLive™ is the only solution that integrates packet capture, metadata generation, real-time indexing up to Layer 7, IDS (signature and anomaly), malware analytics, and more. The NIKSUN NetDetector® Suite provides in-depth and real-time forensics that go beyond firewalls and IDS/IPS systems to identify, resolve, and prevent cyber-attacks. NIKSUN NetDetector® is the world's first packet-to-disk appliance for cyber defense.
-
product
Threat Detection/Analysis
Schweitzer Engineering Laboratories, Inc.
Several SEL devices have built-in malware detection or can identify nonauthorized network traffic.
-
product
Cybersecurity
Schweitzer Engineering Laboratories, Inc.
Networks are protected with multiple layers of cybersecurity, including securing access and permissions, detecting malware, encrypting data, and logging events.
-
product
Layered Cybersecurity
Schweitzer Engineering Laboratories, Inc.
Networks are protected with multiple layers of cybersecurity, including securing access and permissions, detecting malware, encrypting data, and logging events.
-
product
Secure Smartphone - Salus
Stratign’s Salus Smartphone is a high-end smartphone built from the ground-up and protects you from eavesdropping, malware, data breaches and any attempts to hack or tamper with your mobile communications and data.
-
product
IT Security & Anti-Virus Testing Services
The AV-TEST Institute is a leading international and independent service provider in the fields of IT security and anti-virus research. The aim of the research work carried out by AV-TEST is to directly detect the latest malware, to analyse it using state-of-the-art methods and to inform our customers of the top-quality results obtained.
-
product
Global Threat Intelligence
Arbor has a long history in botnet research and DDoS mitigation. However, as DDoS has moved from just a diversion to be a feature of malware and botnets used in cybercrime and APT attacks, Arbor has expanded its research team and research capabilities to tackle additional threat types.
-
product
Security Education Platform
Our unique Assess, Educate, Reinforce, Measure training methodology combines the four key components of successful security awareness and training programs. Customers who have used this cyclical approach have experienced up to a 90% reduction in successful external phishing attacks and malware infections.
-
product
Authentication
STSAFE is a secure element product range providing authentication, confidentiality and platform integrity services to protect OEMs against cloning, counterfeiting, malware injection and unauthorized production. Compliant with the most demanding security certifications, STSAFE secure elements are turnkey solutions developed through a trusted supply chain with pre-provisioned secrets and certificates, that include a set of software libraries and drivers for secure, seamless integration.
-
product
Forensics and Investigation
Our Forensics and Investigation solutions will give you attack context, infrastructure-wide visibility, codified expertise, rich intelligence, and insights gained from front-line experience responding to the world’s most impactful threats. So, you’ll have everything you need to rapidly detect, triage, investigate, and minimize the impact of attacks. Develop attack context in near-real time and facilitate rapid investigations. Safely execute and analyze malware in a secure environment to strengthen threat intelligence.
-
product
Cyber Security and Digital Data Protection
As security demands evolve, Applied Computer Technologies provides a layered and progressive approach to security. Organizations without a sufficient security footprint are being affected and held ransom, operations disrupted, and business reputations damaged. We've partnered with some amazing and innovative companies to offer our clients the best cyber security and protection available today. Our integrated security products include next generation firewalls; ransomware and crypto malware; secure connectivity; Email, encryption, archiving, and SPAM filtering; Web and content filtering; and data integrity & theft prevention.
-
product
Cyber Protection System
Raytheon’s Cyber Protection System enables enterprises to go beyond traditional CSOC monitoring and establish a response center capable of situational awareness, proactive defense and rapid response. Cyber test ranges: Test the cyber resilience of hardware, software, and networks. Penetration/Malware/Forensics Fly Away Kits: Provide mobile environments to perform testing and analysis at remote facilities. Lab environments: Analyze malware, perform penetration testing and conduct forensics at enterprise scale so analysts can determine the best way to manage them.