Zero Threat Analysis: Binary Analysis Suite
Zero Threat Malware Analysis System utilizes a secure virtualization environment developed with the same pedigree used in a EAL6+ certified hypervisor. This system can analyze unknown code and malicious code in documents, files, web objects, browsers, applications and operating systems. Specifically our Zero Threat Execution (ZTx) proprietary system seeks unauthorized system changes, exploitation attempts, and any indicators of malicious behavior.
ZTx detonates files such as PDF, office documents, browser attacks, and malware to detect for the presence of targeted or drive by attacks. Once a malicious file is detonated using ZTx, it is monitored for any system changes using a security delta to determine if any file system changes, registry keys, hooks, or shellcode has been executed. Upon completion of analysis, the data is logged into a repository and can be used in conjunction with our Intrusion Management System (ZTIMS) to detect and trace any other attack attempts against your network.
This analysis technology is for organizations seeking a security level which goes beyond traditional defenses such as virus scanners and next-generation firewalls. It can reduce the time and cost of analysis in incident response, forensics, and overall risk management.