Intezer Analyze™ - Intezer

Intezer Analyze™

Your organization isn’t immune

Dealing with hundreds of unknown files and many false-positives, performing memory analysis, and protecting against fileless malware represent some of the biggest challenges organizations are facing today. Danger lurks in your blind spots. Diagnose your biggest security challenges using the most comprehensive level of detail available.

Intezer Analyze™

The future of malware detection and analysis

A smart line of defense for any company, Intezer Analyze™ is a subscription-based SaaS product that provides rapid malware detection and analysis. With a simple online API access, it functions as a plug-and-play solution for any process within your organization’s incident response plans or daily cyber security monitoring, requiring no onsite deployment. Its intuitive, easy-to-use interface and simple deployment means you’ll be up and running in no time.

Download a Brochure

See it in action

Click on below example to see live results in action

Try it now

Enterprise edition plans

FeatureCommunity EditionEnterprise Edition
Core FeaturesFile DNA mapping: detect code reuse to trusted and malicious software using Intezer's Code Intelligence™ technology
Private analyses (analysis reports cannot be seen publicly)
IDA Pro plugin for viewing genes’ assembly code
Analyze more than 10 files per day
Download samples
Full API access
Private indexing and categorizing of custom software/malware into the code database

Customers subscribing to Intezer Analyze™ benefit from:

APT Detection

Identify any reused code within your organization that appears in known malware.

Rapid File Investigation

Fully understand any unknown binary without having an experienced reverse-engineer analyzing your code.

Memory Analysis

Analyze entire memory dumps, process dumps, or even fileless code dumped from memory.

Reduce False Positives

Minimize other systems’ erroneous flags by recognizing code from legitimate software sources.

Accelerate Reverse Engineering

Prevent the re-analysis of code already identified in previously seen software or malware.

Threat Actor Classification

Pinpoint the author of new malware by detecting code reuse across previous attacks.

Simple Integration

Integrate quickly and easily with your existing automation processes.

© 2018 All rights reserved