VMRay. Agentless Threat Analysis & Detection.
SonicWall relies on VMRay for Detection of Evasive Malware
Read the Solution Brief to learn how SonicWall’s network sandbox Capture ATP leverages VMRay to detect threats by executing them as they would in the wild.
Read the Brief
Join our Team
We are in search of skilled, enthusiastic people who are passionate about technology and excited about advancing their careers on the leading edge of Internet security.
View Open Positions
100% Total Detection Efficacy Against In-the-Wild Malware
Download MRG Effitas’ assessment of VMRay Analyzer against 60 in-the-wild malware samples, 10 different sandbox evasion techniques and 17 custom malware samples.
Cutting Through the Noise
Learn how automated threat analysis can turn millions of raw data points into actionable intelligence in our webcast featuring co-founder Carsten Willems and SANS Sr. Instructor Dave Shackleford.
VMRay Analyzer Rated 5-Stars
“VMRay Analyzer is a powerful, moderately easy to use, reasonably-priced tool for analysts who don’t want to do manual analysis but want the benefit of full information.”
Our Statement on Spectre and Meltdown
Spectre and Meltdown are attack methodologies enabled by fundamental processor design principles. In particular, they exploit unwanted side effects of caching, speculative/out-of-order execution, and branch target prediction. These features are part of most modern CPUs (Intel, AMD, ARM) and were widely introduced into production in the 1990s to enhance performance. As a result, the performance […]
VMRay Malware Analysis Report Recap – December ’17
Welcome to the VMRay Malware Analysis Report Recap. Every month our Research Team provides a recap of the malware analysis reports posted to the VMRay Twitter account. This past December, our team analyzed a variant of Globeimposter ransomware, a Windows Script File (WSF) that downloads a payload to set-up a server to accept incoming connections […]
Risky Business Podcast: Using VMRay Analyzer for Incident Response
Recently, VMRay sponsored the 480th episode of the popular weekly information security podcast, Risky Business. On the podcast, Incident Response Expert Koen Van Impe, spoke to host Patrick Gray about how he uses VMRay Analyzer for automated malware analysis. Koen gave a great overview of the real-world challenges IR practitioners face and how automated analysis can […]
“With VMRay’s capabilities we can provide faster answers when customers ask, ‘What should I do right now to contain the damage and get rid of the malware while also ensuring it doesn’t come back next week or next month?”
Tilman Frosch, Managing Director, G DATA Advanced Analytics
“Cloudmark customers and partners around the world count on us to secure their email, ensuring that threats are identified and blocked. Our team looked extensively at what the industry had to offer for automated in-depth dynamic malware analysis, and we chose VMRay as a vendor and technology we could trust. VMRay Analyzer provides the accuracy, performance and depth of analysis we require to meet our customers’ expectations.”
Angela Knox, SVP of Engineering, Cloudmark
“SonicWall Capture Advanced Threat Protection Service incorporates the VMRay third-generation Analyzer threat detection analysis engine, supporting SonicWall’s ability to deliver a first-to-market, adaptive, multi-engine sandboxing approach that enhances organizations’ ability to safeguard against today’s shape-shifting cyber threats.”
Dmitriy Ayrapetov, Executive Director, Product Management, SonicWALL
“VMRay has become one of the most important tools for our security team. We use it to analyze malware and also for system level hardening against common malware. We significantly reduced the time and effort needed for malware analysis.”
Adem Sen, CSIRT Lead, DB Systel GmbH (Deutsche Bahn)
“Carbon Black’s customers are targeted by some of the most evasive and advanced malware around. When analyzing a new threat, our team uses VMRay Analyzer to provide deep analysis and insights that surpass what we’ve seen from other sandboxing technologies.”
Paul Drapeau, Principal Security Researcher, Carbon Black