Knowledge is power


[SANS Webcast] Cutting Through the Noise: Turning Threat Data into Threat Intel Using Automated Analysis [Forrester Webcast] Behind Enemy Lines: How Threat Actors Design Evasive Malware [Partner Webcast] An Introduction to VMRay Analyzer & Channel Program

Watch the Webcast

Case Study

G DATA Advanced Analytics Relies on VMRay for Rapid Incident Response and Malware Analysis


MRG Effitas’ assessment of VMRay Analyzer against a wide range of use cases that included in-the-wild and fully custom malware

VMRay Analyzer Earns a 5 Star Review from SC Media


VMRay Analyzer is the 3rd generation in advanced threat detection. Read why hypervisor-based agentless monitoring for malware analysis and threat detection supersedes other approaches.

Learn how malware authors use 3 categories of techniques to conceal the real behavior of malicious files and evade analysis.


Get a high level overview of VMRay Analyzer’s capabilities and ease of integration.

Read how VMRay Analyzer helps protect organizations from malicious email attachments and URLs.

Download the VMRay Analyzer Email Sensor Data Sheet

Solution Briefs

VMRay Analyzer provides out of the box integration with many leading technology vendors. Read about how VMRay integrates with ThreatConnect, a leading Threat Intelligence Platform (TIP) vendors.




We’ve published videos showing VMRay in action, as well as giving overviews of our technology and features.

Intro to VMRay Analyzer

An introduction to VMRay Analyzer and how our agentless hypervisor-based monitoring approach analyzes malware and detects threats that other approaches can’t.

Protecting Organizations from Malicious Email with Phantom

Using the VMRay App for Phantom, we demonstrate with a simple playbook how VMRay and Phantom help to protect organizations from malicious email. This video post details the automatic scanning of emails received by an organization and forwarding any file attachments to VMRay’s agentless hypervisor-based sandbox for analysis.

How to Use Built-In YARA Rules

In v2.1 of VMRay Analyzer users have access to several hundred built-in YARA rules to bolster detection efficacy. With built-in YARA rulesets and a built-in reputation engine to complement its best-in-class hypervisor-based detection, VMRay Analyzer provides the right combination of signature-based and dynamic analysis techniques for malware detection.


VP of Sales & Marketing, Chad Loeven, discusses how the VMRay Analyzer integration with OPSWAT Metadefender enhances detection and analysis of advanced threats.

Cryptolocker Ransomware Analysis with VTI scoring

We show an automated malware analysis in VMRay analyzer of Cryptolocker ransomware, highlighting how our VTI engine does automated threat scoring even for unknown malware undetected by AV.

VTI Custom Threat Scoring – Rule Creation

We show how to write a custom VTI rule to flag specific malware behavior and increase the threat score.

CryptoWall Analysis – Part 1: Overview

This video is Part 1 of 2, where we use VMRay’s hypervisor-based dynamic malware analysis to analyze a CryptoWall 2.0 variant.

VMRay Analyzer & Carbon Black Integration Overview

VP of Sales & Marketing, Chad Loeven, explains how VMRay and Carbon Black work together to provide total visibility into your environment and protection against the most advanced threats.

Watch the Video