Best Software for 2025 is now live!
Show rating breakdown
Save to My Lists
Paid
Claimed

4 VMRay Reviews

4.4 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
4 VMRay Reviews
4.4 out of 5
4 VMRay Reviews
4.4 out of 5

VMRay Pros and Cons

How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cons
G2 reviews are authentic and verified.
Verified User in Information Technology and Services
II
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: Thank You page
What do you like best about VMRay?

VMware has always been a great threat intelligence tool which helps us to perform malware analysis, thread detection and incident response. My most favourite feature would be the dynamic thread detection which helps us to analyse threats on the go. It is also very useful in terms of automation has its API could be used to enable efficient automatic work flows.

The sandbox is one extremely useful feature which helps us in the threat analysis. Review collected by and hosted on G2.com.

What do you dislike about VMRay?

It could have an interface which is much more intuitive making it much more easy during a learning curve when starting with VMRay. Review collected by and hosted on G2.com.

Response from Fatih Cam of VMRay

Thank you for sharing your thoughtful and detailed review. We're happy to hear that you value our solution's capabilities, especially the depth of dynamic analysis. It's fantastic to know that our solution and automation via API integration have made a significant impact on your malware analysis and incident response workflows.

We also appreciate your feedback regarding our user interface. We are continuously working to enhance our platform and make it even more user-friendly. Your input helps guide these improvements, and we're committed to delivering an even better experience in the future.

Verified User in Pharmaceuticals
AP
Enterprise(> 1000 emp.)
Validated Reviewer
Review source: Seller invite
Incentivized Review
What do you like best about VMRay?

The VMRay platform is robust and capable at detecting a variety of threats, and is certainly a leader in malware sandbox tech. Their customer support has been stellar, as well. Review collected by and hosted on G2.com.

What do you dislike about VMRay?

Though possible to set up configurations around, VMRay occasionally fails to process specific samples with less-than-clear indicators of why no malicious behavior was detected. If the configurations to help illuminate this were made more easily accessible (and not kept behind their run scripts feature), it'd be stellar. Review collected by and hosted on G2.com.

Verified User in Financial Services
UF
Enterprise(> 1000 emp.)
Validated Reviewer
Verified Current User
Review source: Seller invite
Incentivized Review
What do you like best about VMRay?

Safe and secure sandbox with multiple ways to submit. Review collected by and hosted on G2.com.

What do you dislike about VMRay?

Every once in awhile, it misses a finding during a scan. Review collected by and hosted on G2.com.

Verified User in Hospital & Health Care
UH
Enterprise(> 1000 emp.)
Validated Reviewer
Review source: Seller invite
Incentivized Review
What do you like best about VMRay?

Integration with other security tools (Email, EDR). API integration is great and openes door for automation Review collected by and hosted on G2.com.

What do you dislike about VMRay?

Less sufficient on certain analysis. Sometimes, its verdict is malicious, but not sufficient information about why it's malicious Review collected by and hosted on G2.com.

There are not enough reviews of VMRay for G2 to provide buying insight. Below are some alternatives with more reviews:

1
ESET PROTECT Logo
ESET PROTECT
4.6
(834)
ESET PROTECT is a cutting-edge cybersecurity platform that leverages the latest in AI, state-of-the-art technologies, and human expertise to safeguard your organization from emerging threats and zero-day attacks. As a cloud-first XDR solution, it integrates unique threat intelligence to deliver next-gen prevention, detection, and proactive threat hunting capabilities. Complementing the platform is a comprehensive suite of services, including managed detection and response (MDR), ensuring robust and continuous protection.
2
Cloudflare Application Security and Performance Logo
Cloudflare Application Security and Performance
4.5
(530)
Cloudflare Application Security and Performance solutions provide performance, reliability, and security for all of your web applications and APIs, wherever they are hosted and wherever your users are.
3
Microsoft Defender for Cloud Logo
Microsoft Defender for Cloud
4.4
(302)
Azure Security Center provides security management and threat protection across your hybrid cloud workloads. It allows you to prevent, detect, and respond to security threats with increased visibility.
4
Mimecast Advanced Email Security Logo
Mimecast Advanced Email Security
4.4
(296)
Mimecast Email Security with Targeted Threat Protection solution that offers comprehensive, multi-layered email security and content controls.
5
CrowdStrike Falcon Endpoint Protection Platform Logo
CrowdStrike Falcon Endpoint Protection Platform
4.7
(288)
CrowdStrike Falcon endpoint protection unifies the technologies required to successfully stop breaches: next-generation antivirus, endpoint detection and response, IT hygiene, 24/7 threat hunting and threat intelligence. They combine to provide continuous breach prevention in a single agent.
6
ThreatLocker Logo
ThreatLocker
4.8
(265)
Get unprecedented visibility and control of your cybersecurity, quickly, easily, and cost-effectively. Schedule a free product demonstration and ThreatLocker will show you how.
7
Coro Cybersecurity Logo
Coro Cybersecurity
4.7
(205)
Monitors your cloud applications for data leaks, cyber-threats and regulatory violations that put your business at risk.
8
Intezer Logo
Intezer
4.5
(192)
Automate your malware analysis. Get answers quickly about any suspicious file, URL, endpoint or memory dump.
9
FortiGate NGFW Logo
FortiGate NGFW
4.7
(175)
FortiGate offers a network security platform, designed to deliver threat protection and performance with reduced complexity.
10
Resolver Logo
Resolver
4.3
(160)
All implementations include training and advice on the most effective way to manage your processes within the application.
Show More