[SANS Product Review Webcast] VMRay Analyzer

Incident response cases move fast. Analysts typically collect data from all corners of the enterprise, from registry hives to logs to malware samples. And while teams are good at collecting malware samples, many don’t have dedicated reverse engineers to turn those samples into actionable intelligence. It’s time to change course.

VMRay wants to transform automated malware analysis with its agentless hypervisor-based approach. SANS analyst, instructor, and incident responder Matt Bromiley has tested VMRay Analyzer and put it through its paces. In this webcast and paper, he shares his experience with the product, including:

Ease of use, including product layout and barriers to success
Efficiency of the rapid reputation engine to determine file maliciousness
Integration with IR team workflows and third-party products
How VMRay Analyzer handles multiple malware samples to provide quick and actionable answers to incident responders.
Watch this webcast to see how VMRay Analyzer can become an integral part of your incident response team.

Covered in The Webinar

About The Speakers

No data found

Explore Valuable Cybersecurity Resources

Tech Insights Deep Dive of April:
Detection Strategies & Operational Excellence

join VMRay for two powerhouse webinars designed to sharpen your threat detection and response capabilities — featuring a special joint session with Red Canary:

Live session's over. Watch the on-demand video to learn how VMRay and Red Canary combine forces to deliver faster, smarter threat detection!

Learn how to cut phishing triage time with automated detonation and deep analysis — quickly uncover threats while improving response accuracy!