Best Software for 2025 is now live!
Show rating breakdown
Save to My Lists
Unclaimed
Unclaimed

Top Rated FireEye Malware Analysis Alternatives

FireEye Malware Analysis Reviews & Product Details

GS
IT Support Engineer
Information Technology and Services
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about FireEye Malware Analysis?

I like the most about this tool is it's advanced threat detection system. It also provides total visibility across all endpoints. Review collected by and hosted on G2.com.

What do you dislike about FireEye Malware Analysis?

I don't think I dislike anything of this tool. Review collected by and hosted on G2.com.

What problems is FireEye Malware Analysis solving and how is that benefiting you?

This tool continuously monitoring and inspecting the devices and helps in finding malicious content embeded softwares, applications different kinds of files. It's single management console helps to monitor the activities. Review collected by and hosted on G2.com.

FireEye Malware Analysis Overview

What is FireEye Malware Analysis?

Malware Analysis (AX series) products provide a secure environment to test, replay, characterize, and document advanced malicious activities. Malware Analysis shows the cyber attack lifecycle, from the initial exploit and malware execution path to callback destinations and follow-on binary download attempts.

FireEye Malware Analysis Details
Show LessShow More
Product Description

Malware Analysis (AX series) products provide a secure environment to test, replay, characterize, and document advanced malicious activities. Malware Analysis shows the cyber attack lifecycle, from the initial exploit and malware execution path to callback destinations and follow-on binary download attempts.


Seller Details
Seller
Trellix
Year Founded
2004
HQ Location
Milpitas, CA
Twitter
@Trellix
253,754 Twitter followers
LinkedIn® Page
www.linkedin.com
836 employees on LinkedIn®

Recent FireEye Malware Analysis Reviews

GS
Gunavant S.Mid-Market (51-1000 emp.)
5.0 out of 5
"Best tool for malware analysis"
I like the most about this tool is it's advanced threat detection system. It also provides total visibility across all endpoints.
Verified User
A
Verified UserEnterprise (> 1000 emp.)
4.0 out of 5
""Fireeye" - Enhanced email security solution for anti spam and malware analysis"
Fireeye has advanced threat intelligence and user friendly features. It supports dynamic analysis, sandbox capabilities and the tool is easy to im...
Manjula R.
MR
Manjula R.Enterprise (> 1000 emp.)
3.0 out of 5
"FireEye Malware Analysis Review"
Detailed File Analysis,Works like IDS/IPS, In depth forensics of malware, Prevent attacks from occuring
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

FireEye Malware Analysis Media

Answer a few questions to help the FireEye Malware Analysis community
Have you used FireEye Malware Analysis before?
Yes

2 out of 3 Total Reviews for FireEye Malware Analysis

4.0 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
G2 reviews are authentic and verified.
Verified User in Pharmaceuticals
AP
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about FireEye Malware Analysis?

Fireeye has advanced threat intelligence and user friendly features.

It supports dynamic analysis, sandbox capabilities and the tool is easy to implement and integrate with existing

Email infrastructure (Microsoft O365, G-suite, etc)

It has zero-day exploit detection and defence against unknown vulnerabilities.

Fireeye tool is backed up by responsive customer support system for any on demand assistance. Review collected by and hosted on G2.com.

What do you dislike about FireEye Malware Analysis?

Cost of implementation: its advanced features and capabilities may come with a higher cost

Due to its comprehensive features and analytics it has a steep learning curve for the cybersecurity team. Review collected by and hosted on G2.com.

What problems is FireEye Malware Analysis solving and how is that benefiting you?

Zero day exploit detection and for email scanning filter for anti spam and malware threat analysis Review collected by and hosted on G2.com.

Manjula R.
MR
Security Analyst
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about FireEye Malware Analysis?

Detailed File Analysis,Works like IDS/IPS, In depth forensics of malware, Prevent attacks from occuring Review collected by and hosted on G2.com.

What do you dislike about FireEye Malware Analysis?

Should include threat intell features also apart from file , memory,linux, registry analysis Review collected by and hosted on G2.com.

Recommendations to others considering FireEye Malware Analysis:

good analysis tool for org level forensics Review collected by and hosted on G2.com.

What problems is FireEye Malware Analysis solving and how is that benefiting you?

Malware Analysis , Investigation, Remediation Review collected by and hosted on G2.com.

There are not enough reviews of FireEye Malware Analysis for G2 to provide buying insight. Below are some alternatives with more reviews:

1
ESET PROTECT Logo
ESET PROTECT
4.6
(834)
ESET PROTECT is a cutting-edge cybersecurity platform that leverages the latest in AI, state-of-the-art technologies, and human expertise to safeguard your organization from emerging threats and zero-day attacks. As a cloud-first XDR solution, it integrates unique threat intelligence to deliver next-gen prevention, detection, and proactive threat hunting capabilities. Complementing the platform is a comprehensive suite of services, including managed detection and response (MDR), ensuring robust and continuous protection.
2
Palo Alto Cortex XSIAM Logo
Palo Alto Cortex XSIAM
4.3
(474)
3
Intezer Logo
Intezer
4.5
(192)
Automate your malware analysis. Get answers quickly about any suspicious file, URL, endpoint or memory dump.
4
Coro Cybersecurity Logo
Coro Cybersecurity
4.7
(206)
Monitors your cloud applications for data leaks, cyber-threats and regulatory violations that put your business at risk.
5
ANY.RUN Sandbox Logo
ANY.RUN Sandbox
4.6
(88)
ANY.RUN Sandbox is an interactive online malware analysis service created for dynamic as well as static research of multiple types of cyber threats.
6
Cloud-Delivered Security Services Logo
Cloud-Delivered Security Services
4.5
(82)
Our Cloud-Delivered Security Services are natively integrated, offering consistent best-in-class protection everywhere. Backed by our world-renowned Unit 42® Threat Research team, this one-of-a-kind protection uses the network effect of 65,000 global customers to share intelligence from all threat vectors to stop known, unknown and zero-day threats 180X faster than any other platform or point solution.
7
ExtraHop Logo
ExtraHop
4.6
(67)
ExtraHop Reveal(x) provides cloud-native visibility, detection, and response for the hybrid enterprise.
8
Magnet Forensics Logo
Magnet Forensics
4.7
(57)
Magnet Forensics finds, analyzes and reports on the digital evidence from computers, smartphones and tablets.
9
Belkasoft Logo
Belkasoft
4.7
(68)
Belkasoft X is a complete digital forensic and incident response solution for conducting in-depth investigations on all types of digital media devices and data sources, including computers, mobile devices, RAM, and the cloud. Designed for government and commercial organizations with in-house DFIR teams or those providing DFIR services, it ensures fast and reliable evidence collection, examination, and analysis.
10
Parrot Security OS Logo
Parrot Security OS
4.5
(52)
Parrot Security (ParrotSec) is a Security GNU/Linux distribution designed for the Cyber-Security (InfoSec) field. It includes a full portable laboratory for security and digital forensics experts.
Show More