Incident response cases move fast. Analysts typically collect data from all corners of the enterprise, from registry hives to logs to malware samples. And while teams are good at collecting malware samples, many don't have dedicated reverse engineers to turn those samples into actionable intelligence. It's time to change course.
VMRay wants to transform automated malware analysis with its agentless hypervisor-based approach. SANS analyst, instructor, and incident responder Matt Bromiley has tested VMRay Analyzer and put it through its paces. In this webcast and paper, he shares his experience with the product, including:
Attend this webcast to see how VMRay Analyzer can become an integral part of your incident response team and be among the first to receive the associated white paper.
View the associated white paper here.