VMRay Analyzer, agentless malware analysis and rapid incident response: A SANS Product Review

  • Webcast Aired Wednesday, March 14, 2018 at 1:00 pm EST (2018-03-14 17:00:00 UTC)
  • Speakers: Chad Loeven, Matt Bromiley

Incident response cases move fast. Analysts typically collect data from all corners of the enterprise, from registry hives to logs to malware samples. And while teams are good at collecting malware samples, many don't have dedicated reverse engineers to turn those samples into actionable intelligence. It's time to change course.

VMRay wants to transform automated malware analysis with its agentless hypervisor-based approach. SANS analyst, instructor, and incident responder Matt Bromiley has tested VMRay Analyzer and put it through its paces. In this webcast and paper, he shares his experience with the product, including:

  • Ease of use, including product layout and barriers to success
  • Efficiency of the rapid reputation engine to determine file maliciousness
  • Integration with IR team workflows and third-party products
  • How VMRay Analyzer handles multiple malware samples to provide quick and actionable answers to incident responders.

Attend this webcast to see how VMRay Analyzer can become an integral part of your incident response team and be among the first to receive the associated white paper.

View the associated white paper here.