We develop VxStream Sandbox, an automated malware analysis system for enterprises, governments, universities, SOCs, and IR teams. It comes with a cloud and on-premise offering.
VxStream Sandbox is a high-end malware analysis framework with a very agile architecture. It can be implemented as a large-scale system processing thousands of files automatically or as a web service for incident response and forensics. Due to its simple interface and numerous integration capabilities with other technology providers, it seamlessly enriches a SOCs incident response workflow and security stack. VxStream Sandbox is trusted by SOCs, CERTs, DFIR teams, IT-security forensic labs, researchers, and threat intelligence service providers all around the world. Multiple S&P 100, Fortune 500 and U.S. government agencies are using VxStream Sandbox every day.
The simple RESTful HTTP based API and open and agile architecture offers ready integrations into various platforms (e.g. Phantom, MISP) as well as interfaces into corporate systems (e.g. HP ArcSight, RSA NetWitness). The wide range of integrations combined with a user-centric report and advanced IR focused data correlation make VxStream Sandbox such a competitive player on the complex market today. VxStream Sandbox is a powerful engine and an effective incident response tool at the same time.
VxStream Sandbox currently scores 57/100 in the Cyber & Data Security category. This is based on press buzz (30/100), and other relevant information on VxStream Sandbox gathered from around the web.
The score for this software has stayed the same over the past month. What is this? |
VxStream Sandbox detonates file in an isolated environment.
VxStream Sandbox integrates with SIEM systems like HP ArcSight.
VxStream Sandbox is a fully automated malware analysis system.
VxStream Sandbox is available as a standalone and hosted offering.
Yes.
Yes.
Yes, e.g. Phantom (Orchestration Platform).
Yes.
VirusTotal, Metadefender, Suricata, AlienVault.
Incident response as well as automated processing of files captured from E-Mails, network traffic and other sources.
Ubuntu Server 14.04, 16.04 and Windows.
SOCs, CERTs, DFIR teams, IT-security forensic labs, researchers and threat intelligence service providers.