VMRay & ThreatQuotient Connector

VMRay & ThreatQuotient Connector

Create Threat Intel you can trust
– with ThreatQuotient & VMRay

About The Partner:

ThreatQuotient improves security operations by fusing together data sources, tools & teams to accelerate threat detection & response. ThreatQuotient’s data-driven security operations platform helps teams prioritize, automate & collaborate on security incidents; enables more focused decision making & maximizes limited resources by integrating existing processes & technologies into a unified workspace.

ThreatQ + VMRay Platform

VMRay Platform flexibly integrates with ThreatQ, automating the submission of files and URLs for analysis. Precise and actionable results are returned back that drive TI enrichment, block/allow decisions, threat hunting workflows and other security measures across the whole enterprise fleet. The Integration is available in two parts : VMRay TI Extraction and VMRay Operation.

VMRay Operation
Connection Capabilities

Connects Into Analyzer: Yes – The VMRay Operation is used to submit URLs, FQDNs and File Objects to VMRay Platform for analysis and retrieve reports in PDF format. File and URL analysis results including Verdicts, IOCs, VTIs, and YARA rule matches; malicious file hashes into ThreatQ (Threat Intel)

Use Cases: Enhanced Threat Intelligence, IOC Mining, Secure Detonation, Binary Evaluation

VMRay TI Extraction
Connection Capabilities

Connects Out of Analyzer: Yes – The VMRay TI Extraction ingests threat intelligence data that has been submitted to VMRay Platform via the “VMRay Operation”. VMRay Platform returns Indicators of type URL, MD5, SHA-1, SHA-256, Fuzzy Hash, IPv4 Address, Registry Key, Filename, FQDN and Malware Objects, Attack Patterns and uses basic HTTP authentication based on API key

Use Cases: Enhanced Threat Intelligence, IOC Mining, Detonation, Threat Hunting

VMRay is Trusted by

VMRay is our deep analysis solution that helped us reduce the workload of our manual analyses by 90%.
Global Top 3 Cyber Security
IR Services Provider
With auto-forwarding feature, VMRay automatically scans and detonates phishing emails. The time our analysts need to analyze phishing is nearly halved.
Life Fitness
Brad Marr | CISO & Senior Director
With VMRay, we are able to handle analysis of huge numbers of submissions with ease in an automated way. This creates enormous value for our company.
Cyber Security Team Lead
A Leading Global Tech Company
Previous slide
Next slide
Calculate how much malware false positives are costing your organization:
Malware False Positive Cost Calculator