Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

Norman Updates Malware Analysis Platform

Norman ASA has updated its Malware Analyzer G2 platform to enhance its ability to fight malware.

The Malware Analyzer G2 platform is designed to help analysts inspect malware effectively. In version 3, Norman has included multiple IntelliVM modules to enable multiple pieces of malware to be inspected in parallel as well as the ability to analyze almost any Windows application or file. The product delivers IntelliVM plugins in Python scripts for development and extension of each analysis, according to the company.

Norman ASA has updated its Malware Analyzer G2 platform to enhance its ability to fight malware.

The Malware Analyzer G2 platform is designed to help analysts inspect malware effectively. In version 3, Norman has included multiple IntelliVM modules to enable multiple pieces of malware to be inspected in parallel as well as the ability to analyze almost any Windows application or file. The product delivers IntelliVM plugins in Python scripts for development and extension of each analysis, according to the company.

“Under Norman’s Advanced Threat Management framework, the automated Malware Analyzer G2 has been powerfully architected to be configured to solve the most pressing security issues facing enterprises or government agencies today,” said Christophe Birkeland, Norman ASA’s Chief Technology Officer, in a statement.

Norman’s solution also takes advantage of what the company calls Hybrid SandBoxing, which means analysts can run malware samples through the emulated Norman SandBox while analyzing the code in the virtualized IntelliVM modules.

In addition to the update to Malware Analyzer G2, the company today also announced the availability of Norman Network Threat Discovery with Advanced Threat Discovery Engine, which can be integrated into the Norman Malware Analyzer G2 architecture. The appliance is a cyber-attack discovery system that sits at the perimeter and detects malicious files that may have slipped past other defenses. Working with Malware Analyzer G2, the appliance then rates the suspicious files using a risk score and alerts the organization of the problem, the company said.

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.

Register

Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.

Register

Expert Insights

Related Content

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Cybercrime

No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.