Next-Generation Malware Analysis Sandbox Now Available
March 7, 2016
Shah Sheikh (1294 articles)
Share

Next-Generation Malware Analysis Sandbox Now Available

ThreatAnalyzer 6.0 provides advanced discovery and response for malware that evades detection

ThreatTrack Security has announced the release of a new version of its malware analysis sandbox,ThreatAnalyzer 6.0, which has been re-engineered to expose advanced malware that is increasingly being developed with multiple layers of obfuscation to bypass or evade detection. With ThreatAnalyzer 6.0, security analysts have an enterprise-class tool that gives them the ability to conduct their analysis within minutes so they can respond more quickly and accurately to threats.

The release follows the publication of new research from ThreatTrack that reveals when it comes to defending against cyber attacks, it still takes far too long to analyze malware. For most companies, it takes one to 24 hours.

ThreatAnalyzer (formerly CW Sandbox and GFI Sandbox) has been re-engineered to expose the new generation of advanced threats and enable enterprises to quickly and accurately respond to discovered malware. Among the added enhancements included in the new version are greater intuitive investigation, improved insight into malware processes, real-time exploration of multistage malware, enhanced visibility into risks, and extended platform support.

“As the first sandbox to market, ThreatAnalyzer has long been recognized as a leader in malware analysis, providing a complete view of every aspect of malicious code and its impact to the organization,” said Usman Choudhary, chief product officer at ThreatTrack. “With ThreatAnalyzer 6.0, we’ve significantly raised the bar with a more intuitive and powerful enterprise-class solution that gives analysts the customized controls they need to dig deeper into their environment to uncover and profile advanced malware attacks.”

Using ThreatAnalyzer, organizations have the ability to re-create their entire application stack – including virtual and native environments – in order to experiment with detonation of malicious code and discover how malware will behave on their networks. It can be deployed as a stand-alone solution or in conjunction with existing advanced-threat detection platforms.

“The growing sophistication of custom malware and multistaged attacks has made sandboxing environments an important tool, that malware analysts need to understand these complex attacks,” said Robert Westervelt, security products research manager at IDC Corp. “The behavioral patterns and other information gained from analyzing malware behavior helps provide the context needed to identify common attack vectors, innovative intrusion techniques and attacker movement within a corporate network.”

ThreatTrack will be demonstrating ThreatAnalyzer at RSA Conference 2016 in booth #S1221, Feb. 29 – March 3.

Source | bsminfo