Automated malware analysis for businesses
GFI released GFI SandBox 3.4 (formerly CWSandBox), the latest update to their malware analysis tool that helps security professionals assess suspected files and URLs for potential threats within a controlled environment.
The solution is a tool for security professionals who need to quickly and safely analyze suspected files or URLs for malicious behavior. It enables users to see how potential malware applications execute, what system changes were made, what network traffic was generated and more, without risking loss of data or compromising a network.
Enhancements to the solution include:
- In-depth file analysis – Kernel-level monitoring provides greater confidence when analyzing any file or URL for malicious activity whether in a native or virtual environment.
- Digital behavior traits – At-a-glance summary of a file’s behavior across multiple platforms alerts users to malicious behavior they need to address. Users also can customize testing platforms within the solution to replicate any system configuration they have deployed throughout their operations.
- Easier collaboration – Admins can grant access to GFI SandBox to anyone in the organization to review and compare the Digital Behavior Traits of suspected files.
- Fast malware assessments – Quicker file submissions and shorter analysis times.
- Detailed reports – Security teams can instantly generate high-level summaries or comprehensive, in-depth analysis reports to share throughout an organization.
“Until now, the effective deployment and use of sandbox technology has mostly been limited to government agencies, threat researchers and large enterprises with their own highly skilled security teams,” said Julian Waits, vice president, Advanced Technology Group, GFI Software. “While GFI SandBox 3.4 delivers stronger and quicker malware analysis, our focus for the new product is to make advanced malware analysis more accessible to organizations with limited in-house malware expertise, especially in the financial services sector where we see a lot of malware activity.”