FireEye Malware Analysis (AX)
Offer a reference bonus
1.40

FireEye Malware Analysis (AX)

FireEye

-
ROI-
USD
Using0
Selling19

PitchMalware Analysis provides a secure environment to test, replay, characterize, and document advanced malicious activities.

Product features

Description

FireEye Malware Analysis is a forensic analysis solution that gives security analysts hands-on control over powerful auto-configured test environments to safely execute and inspect advanced malware, zero-day and advanced persistent threat (APT) attacks embedded in web pages, email attachments and files.

As cyber criminals tailor attacks to penetrate a specific business, user account or system, analysts need easy-to-use forensic tools that help them rapidly address targeted malicious activities.

HIGHLIGHTS:

  • Performs deep forensic analysis through the full attack life cycle, using the FireEye MVX engine
  • Streamlines and batches analysis of suspicious web code, executables and files
  • Reports in-depth on system-level OS and application changes to file systems, memory and registries
  • Offers live-mode or sandbox analysis to confirm zero-day exploits
  • Dynamically generates threat intelligence for immediate local protection via integration with FireEye Central Management
  • Captures packets to allow analysis of malicious URL session and code execution
  • Includes the FireEye AV-Suite to streamline incident response prioritization
  • Includes support for Windows and MacOS X environments

Categories

Problems that the product solves

Unauthorized access to corporate IT systems and data

No IT security guidelines

Risk or Leaks of confidential information

Risk of attacks by hackers

Risk of data loss or damage

Risk of lost access to data and IT systems

Non-compliant with IT security requirements

Customer fraud

Malware infection via Internet, email, storage devices

Values

Reduce Costs

Ensure Security and Business Continuity

Ensure Compliance

Characteristics (Network Sandboxing)

Web traffic scan

Avaliable

Email scan

Yes

Endpoint protection

Avaliable

Mobile protection

N/A

Malware Detection in files

Avaliable

Encrypted traffic scan

N/A

Network shares scan

N/A

YARA files scanning

N/A

YARA implementation by customer

Avaliable

Malware blocking by protocols

N/A

CPU-level detection

Avaliable

OS kernel level detection

N/A

Malware Samples

N/A

Zero-day threats protection

Avaliable

Detecting C&C server

N/A

Hardware Applience

Avaliable

Working in in-band/out-of-band modes

N/A

Cloud

N/A

Threat Intelligence Feeds

N/A

SIEM Integration

N/A

Vulnerability manager

N/A

Uploading "Golden Image"

N/A

Using Multiple OSes

N/A

Multiple Versions of Sandbox App

N/A

Payload detonation

Avaliable

Auto-uploading files

N/A

URL analysis

N/A

Analyst console

Avaliable

Security Reports

N/A

Alerts via Email

Avaliable

Central Policy Management for Data Protection

Avaliable

Forensic analysis of data history

Avaliable

Automated remediation capabilities

N/A

Auto Update of Signatures

N/A

Trial

Yes

Competitive products

prev
next