Best Software for 2025 is now live!

Top Free Malware Analysis Tools

Check out our list of free Malware Analysis Tools. Products featured on this list are the ones that offer a free trial version. As with most free versions, there are limitations, typically time or features.

If you'd like to see more products and to evaluate additional feature options, compare all Malware Analysis Tools to ensure you get the right product.

View Free Malware Analysis Tools

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.
13 Malware Analysis Tools Products Available
By ESET
(834)4.6 out of 5
Optimized for quick response
1st Easiest To Use in Malware Analysis Tools software
View top Consulting Services for ESET PROTECT
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Stay one step ahead of known and emerging cyber threats with our AI-native, prevention-first approach. ESET combines the power of AI and human expertise to make protection easy and effective. Expe

    Users
    • IT Manager
    • Owner
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 47% Small-Business
    • 44% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ESET PROTECT features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 8.8
    9.5
    Malware Evaluation
    Average: 8.8
    9.5
    Malware Detection
    Average: 8.9
    9.4
    File Analysis
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • GI
    Esect protect offers a cloud console to manage all of protection of endpoint, offers different license to protect device like EDR or only AV solution Read review
    IA
    ESET Protect is the simplest and most secure security system I've ever used. It's features like. - ESET Password Manager, securely storing... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ESET
    Company Website
    Year Founded
    1992
    HQ Location
    Bratislava, Slovak Republic
    Twitter
    @ESET
    290,407 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,840 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Stay one step ahead of known and emerging cyber threats with our AI-native, prevention-first approach. ESET combines the power of AI and human expertise to make protection easy and effective. Expe

Users
  • IT Manager
  • Owner
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 47% Small-Business
  • 44% Mid-Market
ESET PROTECT features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 8.8
9.5
Malware Evaluation
Average: 8.8
9.5
Malware Detection
Average: 8.9
9.4
File Analysis
Average: 8.8
GI
Esect protect offers a cloud console to manage all of protection of endpoint, offers different license to protect device like EDR or only AV solution Read review
IA
ESET Protect is the simplest and most secure security system I've ever used. It's features like. - ESET Password Manager, securely storing... Read review
Seller Details
Seller
ESET
Company Website
Year Founded
1992
HQ Location
Bratislava, Slovak Republic
Twitter
@ESET
290,407 Twitter followers
LinkedIn® Page
www.linkedin.com
1,840 employees on LinkedIn®
(192)4.5 out of 5
Optimized for quick response
4th Easiest To Use in Malware Analysis Tools software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Intezer automates the entire alert triage process, like an extension of your team handling Tier 1 SOC tasks for every alert at machine-speed. Intezer monitors incoming incidents from endpoint, reporte

    Users
    • Software Engineer
    • Student
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 55% Small-Business
    • 23% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Intezer features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 8.8
    9.3
    Malware Evaluation
    Average: 8.8
    9.6
    Malware Detection
    Average: 8.9
    9.4
    File Analysis
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Kunal H.
    KH
    It was helpful for forensics investigation. Read review
    MK
    I like how intuitive the user interface is and how clean everything looks, it's very user friendly Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Intezer
    Company Website
    Year Founded
    2015
    HQ Location
    New York
    Twitter
    @IntezerLabs
    10,248 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    48 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Intezer automates the entire alert triage process, like an extension of your team handling Tier 1 SOC tasks for every alert at machine-speed. Intezer monitors incoming incidents from endpoint, reporte

Users
  • Software Engineer
  • Student
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 55% Small-Business
  • 23% Mid-Market
Intezer features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 8.8
9.3
Malware Evaluation
Average: 8.8
9.6
Malware Detection
Average: 8.9
9.4
File Analysis
Average: 8.8
Kunal H.
KH
It was helpful for forensics investigation. Read review
MK
I like how intuitive the user interface is and how clean everything looks, it's very user friendly Read review
Seller Details
Seller
Intezer
Company Website
Year Founded
2015
HQ Location
New York
Twitter
@IntezerLabs
10,248 Twitter followers
LinkedIn® Page
www.linkedin.com
48 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(88)4.6 out of 5
5th Easiest To Use in Malware Analysis Tools software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ANY.RUN is an online interactive malware analysis sandbox. The service detects, investigates, and monitors cybersecurity threats. A user-friendly interface allows clients to perform effective and qual

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 36% Enterprise
    • 33% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ANY.RUN Sandbox features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 8.8
    9.3
    Malware Evaluation
    Average: 8.8
    9.0
    Malware Detection
    Average: 8.9
    9.4
    File Analysis
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • José C.
    JC
    ANY.RUN has a very simple and understandable UI. It lets you test files and URLs, extract IoCs, it generates a dependency graph where you can see... Read review
    Verified User in Accounting
    AA
    ANY.RUN is a handy tool for analysing malware, offering real-time observation of threats. Its easy-to-use interface and interactive features make... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ANY.RUN
    Company Website
    Year Founded
    2016
    HQ Location
    Dubai, United Arab Emirates
    Twitter
    @anyrun_app
    27,431 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    198 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ANY.RUN is an online interactive malware analysis sandbox. The service detects, investigates, and monitors cybersecurity threats. A user-friendly interface allows clients to perform effective and qual

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 36% Enterprise
  • 33% Small-Business
ANY.RUN Sandbox features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 8.8
9.3
Malware Evaluation
Average: 8.8
9.0
Malware Detection
Average: 8.9
9.4
File Analysis
Average: 8.8
José C.
JC
ANY.RUN has a very simple and understandable UI. It lets you test files and URLs, extract IoCs, it generates a dependency graph where you can see... Read review
Verified User in Accounting
AA
ANY.RUN is a handy tool for analysing malware, offering real-time observation of threats. Its easy-to-use interface and interactive features make... Read review
Seller Details
Seller
ANY.RUN
Company Website
Year Founded
2016
HQ Location
Dubai, United Arab Emirates
Twitter
@anyrun_app
27,431 Twitter followers
LinkedIn® Page
www.linkedin.com
198 employees on LinkedIn®
(205)4.7 out of 5
Optimized for quick response
2nd Easiest To Use in Malware Analysis Tools software
Save to My Lists
Entry Level Price:Starting at $3.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Coro is a new breed of cybersecurity platform. A single platform that secures your entire company. When you use Coro, you protect email, data, endpoint devices, cloud apps, and even user activity.

    Users
    • IT Manager
    • IT Director
    Industries
    • Non-Profit Organization Management
    • Financial Services
    Market Segment
    • 57% Mid-Market
    • 38% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Coro Cybersecurity is a product designed to meet security requirements and monitor network activity.
    • Reviewers appreciate the product's user-friendly interface, efficient management processes, and the dedicated customer success team that provides ongoing support.
    • Reviewers experienced issues with email features not working after moving to a secure platform, slow response on data downloads, lack of features in newer modules, and difficulty in removing some viruses.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Coro Cybersecurity features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 8.8
    9.3
    Malware Evaluation
    Average: 8.8
    9.6
    Malware Detection
    Average: 8.9
    9.4
    File Analysis
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Coronet
    Company Website
    Year Founded
    2014
    HQ Location
    Chicago, IL
    Twitter
    @coro_cyber
    1,944 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    407 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Coro is a new breed of cybersecurity platform. A single platform that secures your entire company. When you use Coro, you protect email, data, endpoint devices, cloud apps, and even user activity.

Users
  • IT Manager
  • IT Director
Industries
  • Non-Profit Organization Management
  • Financial Services
Market Segment
  • 57% Mid-Market
  • 38% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Coro Cybersecurity is a product designed to meet security requirements and monitor network activity.
  • Reviewers appreciate the product's user-friendly interface, efficient management processes, and the dedicated customer success team that provides ongoing support.
  • Reviewers experienced issues with email features not working after moving to a secure platform, slow response on data downloads, lack of features in newer modules, and difficulty in removing some viruses.
Coro Cybersecurity features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 8.8
9.3
Malware Evaluation
Average: 8.8
9.6
Malware Detection
Average: 8.9
9.4
File Analysis
Average: 8.8
Seller Details
Seller
Coronet
Company Website
Year Founded
2014
HQ Location
Chicago, IL
Twitter
@coro_cyber
1,944 Twitter followers
LinkedIn® Page
www.linkedin.com
407 employees on LinkedIn®
By odix
(21)4.9 out of 5
3rd Easiest To Use in Malware Analysis Tools software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    FileWall is a must-have native security solution for Microsoft 365 and provides the ultimate protection against file-based cyber-attacks for Microsoft 365 business applications. Leveraging odix’s pate

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 90% Small-Business
    • 10% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FileWall for Microsoft 365 features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.8
    0.0
    No information available
    10.0
    Malware Detection
    Average: 8.9
    10.0
    File Analysis
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Levan K.
    LK
    It is really easy to configure, user-friendly environment, easy to setup users and global policies, very easy to manage and for users to see if... Read review
    Sudeep J.
    SJ
    Considering the increased security threats these days specially in terms of malware sent as attachments in various formats it is imperative to have... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    odix
    Year Founded
    2012
    HQ Location
    Rosh Haain, Israel
    Twitter
    @odix
    10 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    18 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

FileWall is a must-have native security solution for Microsoft 365 and provides the ultimate protection against file-based cyber-attacks for Microsoft 365 business applications. Leveraging odix’s pate

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 90% Small-Business
  • 10% Mid-Market
FileWall for Microsoft 365 features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.8
0.0
No information available
10.0
Malware Detection
Average: 8.9
10.0
File Analysis
Average: 8.8
Levan K.
LK
It is really easy to configure, user-friendly environment, easy to setup users and global policies, very easy to manage and for users to see if... Read review
Sudeep J.
SJ
Considering the increased security threats these days specially in terms of malware sent as attachments in various formats it is imperative to have... Read review
Seller Details
Seller
odix
Year Founded
2012
HQ Location
Rosh Haain, Israel
Twitter
@odix
10 Twitter followers
LinkedIn® Page
www.linkedin.com
18 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Threat.Zone is a a holistic malware platform that is hypervisor-based, automated and interactive tool for analyzing malware, so you can fight new generation malwares by conducting: Real-time behaviora

    Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 57% Mid-Market
    • 29% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Threat Zone features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 8.8
    8.7
    Malware Evaluation
    Average: 8.8
    8.8
    Malware Detection
    Average: 8.9
    9.2
    File Analysis
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Rahul J.
    RJ
    I liked the simple user interface and ease with which I could get things started on the website. The static and dynamic options are beneficial and... Read review
    Daniel E.
    DE
    I like that threat zone has a free plan to help people decide whether or not it is good an theyd like to use it Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Malwation
    Year Founded
    2020
    HQ Location
    Delaware, US
    Twitter
    @malwation
    930 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    19 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Threat.Zone is a a holistic malware platform that is hypervisor-based, automated and interactive tool for analyzing malware, so you can fight new generation malwares by conducting: Real-time behaviora

Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 57% Mid-Market
  • 29% Small-Business
Threat Zone features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 8.8
8.7
Malware Evaluation
Average: 8.8
8.8
Malware Detection
Average: 8.9
9.2
File Analysis
Average: 8.8
Rahul J.
RJ
I liked the simple user interface and ease with which I could get things started on the website. The static and dynamic options are beneficial and... Read review
Daniel E.
DE
I like that threat zone has a free plan to help people decide whether or not it is good an theyd like to use it Read review
Seller Details
Seller
Malwation
Year Founded
2020
HQ Location
Delaware, US
Twitter
@malwation
930 Twitter followers
LinkedIn® Page
www.linkedin.com
19 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Todays zero-day threats, polymorphic malware and weaponized attachments demand a sophisticated multi-layered approach to keep businesses safe. VIPRE Email Security and suite of add-on solutions, del

    Users
    • IT Manager
    Industries
    • Information Technology and Services
    Market Segment
    • 49% Mid-Market
    • 44% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • VIPRE Email Security features and usability ratings that predict user satisfaction
    7.6
    Has the product been a good partner in doing business?
    Average: 8.8
    10.0
    Malware Evaluation
    Average: 8.8
    8.3
    Malware Detection
    Average: 8.9
    8.3
    File Analysis
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Automotive
    AA
    Removes the headache of having to manage on-prem spam filter. Read review
    RW
    You can call support and get a real person. Whether or not they know what they are talking about that is the question! It's a mixed bag as always. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1994
    HQ Location
    Clearwater, FL
    Twitter
    @VIPRESecurity
    8,646 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    209 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Todays zero-day threats, polymorphic malware and weaponized attachments demand a sophisticated multi-layered approach to keep businesses safe. VIPRE Email Security and suite of add-on solutions, del

Users
  • IT Manager
Industries
  • Information Technology and Services
Market Segment
  • 49% Mid-Market
  • 44% Small-Business
VIPRE Email Security features and usability ratings that predict user satisfaction
7.6
Has the product been a good partner in doing business?
Average: 8.8
10.0
Malware Evaluation
Average: 8.8
8.3
Malware Detection
Average: 8.9
8.3
File Analysis
Average: 8.8
Verified User in Automotive
AA
Removes the headache of having to manage on-prem spam filter. Read review
RW
You can call support and get a real person. Whether or not they know what they are talking about that is the question! It's a mixed bag as always. Read review
Seller Details
Year Founded
1994
HQ Location
Clearwater, FL
Twitter
@VIPRESecurity
8,646 Twitter followers
LinkedIn® Page
www.linkedin.com
209 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    State-of-the-art server security with an all-in-one platform BitNinja offers an advanced server security solution with a proactive and unified system designed to effectively defend against a wide ran

    Users
    No information available
    Industries
    • Information Technology and Services
    • Internet
    Market Segment
    • 88% Small-Business
    • 8% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BitNinja features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 8.8
    6.7
    Malware Evaluation
    Average: 8.8
    8.3
    Malware Detection
    Average: 8.9
    8.3
    File Analysis
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Alessandro C.
    AC
    It require almost no modification in your current software and infrastructure, very little impact on performance during normal operation Read review
    OM
    Firewalls are a primary line of defense for networked environments. With multiple modules Bitninja offers the best defense currently on the market.... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2014
    HQ Location
    Debrecen
    Twitter
    @bitninjaio
    1,117 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    25 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

State-of-the-art server security with an all-in-one platform BitNinja offers an advanced server security solution with a proactive and unified system designed to effectively defend against a wide ran

Users
No information available
Industries
  • Information Technology and Services
  • Internet
Market Segment
  • 88% Small-Business
  • 8% Mid-Market
BitNinja features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 8.8
6.7
Malware Evaluation
Average: 8.8
8.3
Malware Detection
Average: 8.9
8.3
File Analysis
Average: 8.8
Alessandro C.
AC
It require almost no modification in your current software and infrastructure, very little impact on performance during normal operation Read review
OM
Firewalls are a primary line of defense for networked environments. With multiple modules Bitninja offers the best defense currently on the market.... Read review
Seller Details
Year Founded
2014
HQ Location
Debrecen
Twitter
@bitninjaio
1,117 Twitter followers
LinkedIn® Page
www.linkedin.com
25 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ReversingLabs is the trusted authority in software and file security. We provide the modern cybersecurity platform to verify and deliver safe binaries. Trusted by the Fortune 500 and leading cybersecu

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ReversingLabs features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 8.8
    9.2
    Malware Evaluation
    Average: 8.8
    8.8
    Malware Detection
    Average: 8.9
    8.3
    File Analysis
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Shefali K.
    SK
    1. Excellent customer service and support ensures issues get resolved with reliable techs. 2. Has advanced threat detection and cyber... Read review
    Ramil M.
    RM
    Titanium Platform is a user-friendly open-source mobile application development framework. It provides tools and APIs that help developers create... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2009
    HQ Location
    Cambridge, US
    Twitter
    @ReversingLabs
    6,329 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    314 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ReversingLabs is the trusted authority in software and file security. We provide the modern cybersecurity platform to verify and deliver safe binaries. Trusted by the Fortune 500 and leading cybersecu

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
ReversingLabs features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 8.8
9.2
Malware Evaluation
Average: 8.8
8.8
Malware Detection
Average: 8.9
8.3
File Analysis
Average: 8.8
Shefali K.
SK
1. Excellent customer service and support ensures issues get resolved with reliable techs. 2. Has advanced threat detection and cyber... Read review
Ramil M.
RM
Titanium Platform is a user-friendly open-source mobile application development framework. It provides tools and APIs that help developers create... Read review
Seller Details
Year Founded
2009
HQ Location
Cambridge, US
Twitter
@ReversingLabs
6,329 Twitter followers
LinkedIn® Page
www.linkedin.com
314 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sandboxing reinvented against the threats of today - and tomorrow. At VMRay, our purpose is to liberate the world from undetectable digital threats. Led by reputable cyber security pioneers, we dev

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • VMRay features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.8
    8.3
    Malware Evaluation
    Average: 8.8
    8.9
    Malware Detection
    Average: 8.9
    8.3
    File Analysis
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Information Technology and Services
    II
    VMware has always been a great threat intelligence tool which helps us to perform malware analysis, thread detection and incident response. My most... Read review
    Verified User in Hospital & Health Care
    UH
    Integration with other security tools (Email, EDR). API integration is great and openes door for automation Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    VMRay
    Company Website
    Year Founded
    2013
    HQ Location
    Bochum, Germany
    Twitter
    @vmray
    3,631 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    115 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Sandboxing reinvented against the threats of today - and tomorrow. At VMRay, our purpose is to liberate the world from undetectable digital threats. Led by reputable cyber security pioneers, we dev

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
VMRay features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.8
8.3
Malware Evaluation
Average: 8.8
8.9
Malware Detection
Average: 8.9
8.3
File Analysis
Average: 8.8
Verified User in Information Technology and Services
II
VMware has always been a great threat intelligence tool which helps us to perform malware analysis, thread detection and incident response. My most... Read review
Verified User in Hospital & Health Care
UH
Integration with other security tools (Email, EDR). API integration is great and openes door for automation Read review
Seller Details
Seller
VMRay
Company Website
Year Founded
2013
HQ Location
Bochum, Germany
Twitter
@vmray
3,631 Twitter followers
LinkedIn® Page
www.linkedin.com
115 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Domain and IP Threat Intelligence feeds enable cybersecurity vendors and security operations to make their products and teams faster and more secure. By utilizing machine learning to assess the risk a

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Domain and IP Intelligence Feeds features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Adam B.
    AB
    The team were friendly, easy to work with and the intelligence feed works well, providing reliable, high quality output. We compared the web... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2020
    HQ Location
    Draper, UT
    Twitter
    @alphamountainai
    32 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Domain and IP Threat Intelligence feeds enable cybersecurity vendors and security operations to make their products and teams faster and more secure. By utilizing machine learning to assess the risk a

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Domain and IP Intelligence Feeds features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.8
0.0
No information available
0.0
No information available
0.0
No information available
Adam B.
AB
The team were friendly, easy to work with and the intelligence feed works well, providing reliable, high quality output. We compared the web... Read review
Seller Details
Year Founded
2020
HQ Location
Draper, UT
Twitter
@alphamountainai
32 Twitter followers
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    DOCGuard is a cutting-edge cybersecurity solution specializing in detecting and analyzing malicious documents. Utilizing advanced structural analysis techniques, DOCGuard identifies threats in Office

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DOCGUARD Groundbreaking Malware Analysis Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2022
    HQ Location
    Wilmington, US
    Twitter
    @doc_guard
    6,348 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

DOCGuard is a cutting-edge cybersecurity solution specializing in detecting and analyzing malicious documents. Utilizing advanced structural analysis techniques, DOCGuard identifies threats in Office

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
DOCGUARD Groundbreaking Malware Analysis Platform features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2022
HQ Location
Wilmington, US
Twitter
@doc_guard
6,348 Twitter followers
LinkedIn® Page
www.linkedin.com
4 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    VIPRE Endpoint Detection & Response (EDR) provides powerful endpoint threat detection with intuitive and actionable incident management and threat visualization in the console. Built on top of our

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • VIPRE Endpoint Detection & Response features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1994
    HQ Location
    Clearwater, FL
    Twitter
    @VIPRESecurity
    8,646 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    209 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

VIPRE Endpoint Detection & Response (EDR) provides powerful endpoint threat detection with intuitive and actionable incident management and threat visualization in the console. Built on top of our

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
VIPRE Endpoint Detection & Response features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1994
HQ Location
Clearwater, FL
Twitter
@VIPRESecurity
8,646 Twitter followers
LinkedIn® Page
www.linkedin.com
209 employees on LinkedIn®