Quickly analyze files and devices to immediately understand the What, Who, & How of a potential cyber incident, by identifying even the smallest pieces of code reuse
Automate endpoint triage and memory analysis, by analyzing every single piece of code running in memory
Automate file analysis, detecting even the smallest fragments of code similarities to classify malware affecting Linux and windows systems and prioritize alerts
Advanced tools, including IDA pro plugin, for accelerating reverse engineering and improving threat hunting capabilities
Intezer Analyze is offered as a cloud-based service with a simple API, functioning as a plug-and-play solution for your incident response team and daily cybersecurity monitoring. Use this powerful analysis through an intuitive GUI, automatic API or in our many integrations to other security products such as SIEM and SOAR systems.
Intezer introduces a Genetic Software Mapping solution, based on the evolutionary principle that all software is comprised of previously written code.
Intezer Analyze automates the investigation of alerts by comparing code similarities with previously seen threats.
Detecting even the smallest fragments of code reuse between legitimate and malicious software, Intezer reduces false positives, recognizes malicious files, classifies threats to their relevant malware families, and enables security teams to prioritize alerts according to risk and severity.
with automated reverse engineering, malware classification and actionable remediation
using automated processes that cover 100% of alerts. Accurately identify threats based on Genetic Software Mapping, revealing even evasive threats
analyzing entire memory dumps, process dumps, or even fileless code dumped from memory
with visibility into the entire threat and full attack storyline
to ensure your organisation no longer spends resources or miss critical incidents because alerts are sporadically investigated
with accurate context-based analysis of threats and relevant actionable intelligence
facilitating SOC operations and enhancing the defense ecosystem
using genetic code-based vaccines against any future threat that uses similar code
|File DNA mapping: Detect code reuse to trusted and malicious software using Intezer's Genetic Software Mapping technology|
|Endpoint Analysis: Scan the memory of entire endpoints using Genetic Software Mapping technology|
|Private analyses (analysis reports cannot be seen publicly)|
|IDA Pro plugin for viewing genes’ assembly code|
|Analyze more than 10 files per day|
|Scan more than 1 endpoint per day|
|Private indexing and categorizing of custom software and malware into the code database|