Are you missing dangerous malware and ransomware?
This is a higher-level service that detects malware that traditional signature matching techniques could not capture, distinguishing it from conventional antivirus and sandbox solutions, either on a file-by-file basis or for the entire system. This detection service is carried out through the following methods: 1) Explicitly moving files to the detection server. 2) Moving all files from the target system (or all files within a specific folder) to the detection server to check for the presence of unauthorized files. 3) After performing step 2, preparing scripts or agents on the target system to regularly (e.g., once a day) move new files to the detection server to verify the integrity of the files.
Inquire About This Product
basic information
This detection server operates in the following four steps: 1) Surface Analysis: It determines whether a file is malware by comparing the hash values of files already registered as malware with the hash value of the file to be inspected, as well as conducting similarity analysis using an AI engine. For files determined to be malware in steps 2 to 4, their hash values will be newly registered in the database to improve detection speed for subsequent checks. 2) Semantic Analysis: It performs source analysis of the file to detect suspicious languages, annotations, and malicious snippets, and labels them accordingly. 3) IP Address and URL Analysis: It assesses whether there are attempts to connect to suspicious sites or IPs by cross-referencing with a proprietary IP reputation database. 4) Dynamic Analysis: It analyzes the risk by inducing malicious behavior through dynamic execution in a sandbox as well as interactive simulations with programs via AI technology. This service is provided through the lending of appliances and access to our owned detection servers. For more details, please contact us.
Price range
Delivery Time
※Prices and delivery times may vary depending on the target system, duration, and scope, so please feel free to contact us.
Applications/Examples of results
This system is optimal for the following cases: a) In cases where there is an increase in emails with suspicious files attached due to targeted attacks, simply sending the relevant files to this detection server allows for immediate assessment of their danger. b) If there is recently suspicious traffic flowing outward, there may be malware lurking somewhere. c) In cases where there seems to have been an intrusion from the outside, it is recommended to use this service to check for any potentially dangerous files that may have been embedded, just to be safe.
Company information
We are concerned about the current situation where various systems, including web systems, are exposed to threats from malicious hackers and organizations. Aiming to improve the security level, especially in Japan, we are offering a short-term, high-quality vulnerability assessment service at an affordable flat-rate fee (per FQDN), making it accessible to everyone, as the previous services were expensive and difficult to understand. For specific details, please feel free to contact us through the "Contact Us" section.