SecondWrite brings deep learning and forced code-execution to the battle against advanced malware. Our dynamic analysis malware detector uses patented technology to find, execute and characterize hidden code paths that other malware detectors miss.

SecondWrite's Malware DeepView

SecondWrite Sandbox Dashboard

YOUR ENTERPRISE
Improve the productivity of your enterprise Security Operations Center (SOC) and Incidence Response (IR) teams.

SECURITY COMPANIES
Improve your IDS, SOC, IR, and Threat Intelligence product offerings.

DOES YOUR PRESENT MALWARE DETECTOR OR SANDBOX:

  • Force execution of all hidden code paths?
  • Give you too many false positives?
  • Miss a lot of actual malware?
  • Capture program level behaviors in a sample?

RECOGNIZED BY

1 of 40 featured startups

1 of 3 winning companies among 30 applicants

How it works

We eliminate blind spots in automated malware analysis solutions by performing deep program introspection.

SecondWrite’s Malware DeepView™ is the answer.

Files, Attachments, URLs

Are sent to SecondWrite’s Malware DeepView™ in the cloud 

Patented Technology

SecondWrite’s Malware DeepView™ leverages patented technology and performs a complete code exploration forcing malware to be revealed 

Report & Score

A report and probability score is automatically generated providing detailed analysis and a list of indicators of compromise (IOCs) 

Latest Blog Posts


Ed Jaehne passes away
| 2 January

It is with profound sadness that we share the news that SecondWrite’s CEO Edwin (Ed) Jaehne passed away suddenly on 31st December 2018, after a brief illness. We are deeply shocked and saddened. Our thoughts are with Ed‘s family at this difficult time. Ed was instrumental in executing our business

Read More
SECONDWRITE’S MALWARE DEEPVIEW CAUGHT WANNA CRY MALWARE WITH NO SIGNATURES
| 9 April

WannaCry, a recent ransomware attack, is impacting organizations worldwide, with losses estimated at $4B in more than 150 countries. The combination of a ransomware executable along with worm like propagation using vulnerability exploitation makes it a very deadly cyberattack. Modern zero-day and evasive malware require a new approach to detect.

Read More