Customer Success Stories

How VMRay Helps Customers Analyze & Detect the Most Evasive Malware

3 of the World’s Top Tech Giants

5 of the Big 6
Accounting Firms

10
Global Financials

63
Government Agencies

How Cyberint Uses VMRay To Stay One-Step Ahead Of Threat Actors 
Using VMRay Analyzer for Effective Incident Response

 

Customer Success Stories

Deutsche Telekom

“VMRay provided the fully automated detection capabilities that were crucial to speed up our incident response process and shorten investigation. Our malware analysts are finally able to quickly and accurately assess the scope and impact of threats, monitor what is most critical and dig deeper when needed.”

– Robert Giczewski, Cyber Threat Intelligence, Deutsche Telekom Security GmbH

Carbon Black

“Like many security researchers, we use a variety of tools for static and behavioral analysis.  What our team loves about VMRay is the ability to quickly triage a lot of malicious samples by providing a wide variety of targets, configurations and applications out of the box. We get a good sense of all the behavior, whether it uses an Office document or malicious PDF, and because VMRay foils many sandbox-evasion techniques and allows more malware to run.  We also appreciate the little timesavers that VMRay has provided: quick access to PCAPs and function logs, sample tagging, and YARA rule tests against submitted samples.”

–  Carbon Black Threat Research Team

Global Top Ten

“When it came to selecting a full-featured sandbox with turnkey integration into our existing security monitoring stack, VMRay couldn’t be beat. Analyzer provides our cyber defense team with a complete picture of malware behavior allowing us to shorten investigations. The team loves the flexibility of the VMs, the depth of analysis available through the Ida Pro Plugin, and how it connected seamlessly with the REST API. And I love how the VMRay team has continuously driven platform improvements over our 2 year relationship.”

– Cyber Defense Senior Manager for a Global Top 10 Private Company

National Bank Of Canada

“The level of detail provided for each analysis is truly impressive. We could fine-tune parameters and interact during detonation to make sure that we captured the behavior we needed.”

– Marc-André Gagnon , Senior Advisor, Cyber Threat Intelligence, National Bank of Canada

Expel

“VMRay gave us the best interface for our analysts to use in terms of simplicity and the information that surfaced gave us exactly what we needed to keep our team moving quickly through the investigative process. Additionally, being able to interact with the malware as it executes was another big win!”

– Matt Peters, CTO, Expel 

GDATA Advanced Analytics

“With VMRay’s capabilities we can provide faster answers when customers ask, ‘What should I do right now to contain the damage and get rid of the malware while also ensuring it doesn’t come back next week or next month?”

– Tilman Frosch, Managing Director, GDATA Advanced Analytics

Jisc

“VMRay Analyzer supports remote desktop access to the host during analysis. We could interact with the sample and enter a password. Most other solutions would fail there. With VMRay Analyzer, because of functionality like that, we obtain valuable threat intelligence critical to helping our connected organizations.”

– Antoni Julian Fertner, Senior Security Specialist, JISC

Gartner Peer insights

“VMRay Analyzer provides a vast amount of data per analysis, which enables detailed visibility for each malware sample. The increased visibility results in quicker classification and identification of malware.”

Lead Security Analyst

Featured Case Studies

Get Hands-on with VMRay

Try the smartest, stealthiest malware analysis and detection platform.


See VMRay’s Analysis Reports

See real-world examples of VMRay’s best-in-class malware analysis and detection platform.

ACCESS THE REPORTS

VMRay Analyzer Data Sheet

Learn why leading DFIR teams worldwide see VMRay Analyzer the gold standard for dynamic analysis.

DOWNLOAD THE DATA SHEET

Defeating Evasive Malware

Learn about the primary methods
threat actors use to evade sandbox detection.

DOWNLOAD THE WHITEPAPER