Intezer - Genetic Software Mapping

Technology

Harness the Power of Genetic Software Mapping

By detecting even the smallest fragments of code similarities, security teams can identify malicious code, classify threats to their relevant malware families, and prioritize alerts according to risk and severity.

Intezer's unique platform combines this proprietary Genetic Analysis technology to spot reused code fragments or attack techniques, alongside trusted tools for detection and malware analysis (like sandboxing). Intezer's approach simulates the knowledge and decision-making process of experienced threat analysts and reverse engineers, to accelerate and automate alert triage, incident response, and threat hunting.

How it Works: DNA Mapping for Software

Intezer’s Genetic Software Mapping technology is an industry first, applying biological immune system concepts to cybersecurity. Operating under the evolutionary principle that all software (whether legitimate or malicious) contains some previously written code, Intezer’s technology can identify false positives as trusted code, classify new variations of previously seen malware, and analyze new threats.

Identifying the origins of every tiny piece of code within seconds, Genetic Software Mapping offers an unparalleled level of understanding of any potential threat. The technology dissects any given file or binary into thousands of small fragments, or genes, and then compares them to Intezer’s Genome Database, containing billions of code pieces (genes) from legitimate and malicious software.

Unknown File

Gene Extraction

Code Genome Database Comparison

Identification

Proven technology

Intezer’s Genetic Software Mapping is an award winning technology that combats modern threats. Time after time, it was the first to identify the most sophisticated cyber attacks.

See What Intezer Can DoAbout Intezer

HiddenWasp Malware Stings Targeted Linux Systems

Read more

How We Seized 15 Active Ransomware Campaigns Targeting Linux File Storage Servers

Read more

McAfee and Intezer Find Links among North Korea’s Malware Families

Read more

Technology Capabilities

APT detection

Identify unknown attacks, from known malware variants to the most sophisticated APTs

Handle in-memory threats

Mitigate fileless malware and other in-memory threats quickly and efficiently

Threat actor classification

Pinpoint the author behind any new malware by detecting code reuse seen in previous attacks

Intezer’s Code Database

Intezer’s ever expanding database contains billions of code pieces from legitimate applications and malware. This enables users to identify code from trusted vendors, as well as from malicious threat actors and malware authors, within seconds.

Intezer's database highlights unique code that has never been seen before, critical for detecting never-before-seen threats with code written from scratch.

Try Intezer

Start Now for Free
© Intezer.com 2022 All rights reserved
Launching Autonomous SecOps: Your Virtual, Algorithm-Driven Tier 1 SOC TeamLaunching Autonomous SecOps: Your Virtual, Algorithm-Driven Tier 1 SOC Team Learn more