Product Overview

[et_pb_section fb_built=”1″ next_background_color=”#ffffff” admin_label=”Hero Section” _builder_version=”3.19.14″ use_background_color_gradient=”on” background_color_gradient_start=”rgba(0,0,0,0.4)” background_color_gradient_end=”rgba(0,0,0,0.4)” background_color_gradient_overlays_image=”on” background_image=”https://www.secondwrite.com/wp-content/uploads/2019/02/ai-artificial-intelligence-code-34676.jpg” background_position=”center_right” custom_padding=”6%||6%|” bottom_divider_style=”slant” bottom_divider_height=”60px” background_color_gradient_direction__hover=”180deg” background_color_gradient_direction__hover_enabled=”180deg” background_color_gradient_start_position__hover=”0%” background_color_gradient_start_position__hover_enabled=”0%” background_color_gradient_end_position__hover=”100%” background_color_gradient_end_position__hover_enabled=”100%”][et_pb_row admin_label=”Page Title Area” _builder_version=”3.0.89″][et_pb_column type=”4_4″ _builder_version=”3.0.47″][et_pb_text _builder_version=”3.19.14″ header_font=”Montserrat|600|||||||” header_text_align=”center” header_text_color=”#ffffff” header_font_size=”48px”]

Product Overview

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”About Me Section” _builder_version=”3.0.89″ custom_padding=”110px||70px||false|false”][et_pb_row admin_label=”About Me Area” _builder_version=”3.0.89″][et_pb_column type=”4_4″ _builder_version=”3.0.47″][et_pb_text _builder_version=”3.19.14″ text_font=”||||||||” text_text_color=”#000000″ text_font_size=”16px” text_line_height=”1.8em” header_font=”||||||||” max_width=”90%” custom_margin=”|||” animation_style=”flip” animation_direction=”left” animation_intensity_flip=”30%” animation_starting_opacity=”100%”]

SecondWrite’s Malware DeepViewTM is a sandbox replacement product that not only contains a dynamic analysis sandbox, but also advanced technologies not present in other sandboxes. These include forced code execution to achieve complete code coverage, detection of program-level anti-analysis behavior, and deep learning using automatic signature generation and neural networks.

[/et_pb_text][et_pb_image src=”https://www.secondwrite.com/wp-content/uploads/2019/02/DeepView-Architect.jpeg” _builder_version=”3.19.14″][/et_pb_image][et_pb_text _builder_version=”3.19.14″ text_font=”||||||||” text_text_color=”#000000″ text_font_size=”16px” text_line_height=”1.8em” header_font=”||||||||” max_width=”90%” custom_margin=”|||” animation_style=”flip” animation_direction=”left” animation_intensity_flip=”30%” animation_starting_opacity=”100%”]

Malware DeepViewTM adds new dimensions to malware analysis by adding forced code-execution, deep program analysis at run time, automatic detection of program-level features, and automatic sequence detection with deep learning to identify advanced malware. This pushes the envelope of malware detection and delivers deep, actionable insight into malware quickly with a lower total cost of ownership than competitive tools.

[/et_pb_text][et_pb_image src=”https://www.secondwrite.com/wp-content/uploads/2019/02/Iceberg.jpg” _builder_version=”3.19.14″][/et_pb_image][et_pb_text _builder_version=”3.19.14″ text_font=”||||||||” text_text_color=”#000000″ text_font_size=”16px” text_line_height=”1.8em” header_font=”||||||||” max_width=”90%” custom_margin=”|||” animation_style=”flip” animation_direction=”left” animation_intensity_flip=”30%” animation_starting_opacity=”100%”]

Other solutions allow malware is able to hide itself using ever more creative evasive techniques.  Our patented technology acts as a lie detector that analyzes all the code in the malware by using complete code exploration. Other malware detectors handle evasion after the fact. Our technology is independent of the underlying evasive mechanism and proactively defeats any known or unknown zero-day evasion techniques.

Other solutions achieve only partial visibility into malware by examining its OS-level behavior only.  SecondWrite’s Malware DeepViewTM achieves complete visibility into malware by examining Program-level behavior in addition to OS-level behavior.  This can be used to detect anti-analysis malware. Anti-analysis malware is malware that hides from a variety of detection tools, such as anti-virus (AV), endpoint, debugging, sandbox, and reverse engineering tools. Other tools cannot detect this anti-analysis behavior since it cannot be detected using OS-level monitoring alone. We can detect such behavior by combining OS-level and Program-level behavior. When present, such anti-analysis behavior is a good indicator of malicious intent.

SecondWrite uses Artificial Intelligence and deep learning at two levels in Malware DeepViewTM. We use machine learning to identify novel features by automatically generating code sequences that are commonly associated with malware versus benign programs using Convolutional Neural Networks. Thereafter our solution observes whether there is match (approximate or exact) of these sequences with any given file sample. The degree of the match is then fed into a second level neural network where we use deep learning to give us the final verdict on whether a particular sample is malicious or benign.

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”3.19.14″][et_pb_column type=”4_4″ _builder_version=”3.19.14″][et_pb_text _builder_version=”3.19.14″ header_font=”Montserrat|600|||||||” header_text_align=”center” header_text_color=”#ffffff” header_font_size=”48px” header_2_font=”||||||||” header_2_text_color=”#000000″]

Product Features

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row custom_padding=”27px|0px|0|0px|false|false” _builder_version=”3.19.14″][et_pb_column type=”1_2″ _builder_version=”3.19.14″][et_pb_text _builder_version=”3.19.14″ text_font=”||||||||” text_text_color=”#000000″ text_font_size=”16px” text_line_height=”1.8em” header_font=”||||||||” max_width=”90%” custom_margin=”|||” animation_style=”flip” animation_direction=”left” animation_intensity_flip=”30%” animation_starting_opacity=”100%”]

DETECTS EVASIVE MALWARE

 

Zero-day evasions, Targeted attacks, Stalling code, Anti-VM malware, time bombs and others.

[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”3.19.14″][et_pb_text _builder_version=”3.19.14″ text_font=”||||||||” text_text_color=”#000000″ text_font_size=”16px” text_line_height=”1.8em” header_font=”||||||||” max_width=”90%” custom_margin=”|||” animation_style=”flip” animation_direction=”left” animation_intensity_flip=”30%” animation_starting_opacity=”100%”]

CAPTURE ANTI-ANALYSIS IOCS

 

These include internal program structure, anti-debugger, anti-endpoint, anti-binary analyzer, and obfuscation.

[/et_pb_text][et_pb_text _builder_version=”3.19.14″ text_font=”||||||||” text_text_color=”#000000″ text_font_size=”16px” text_line_height=”1.8em” header_font=”||||||||” max_width=”90%” custom_margin=”|||” animation_style=”flip” animation_direction=”left” animation_intensity_flip=”30%” animation_starting_opacity=”100%”][/et_pb_text][et_pb_text _builder_version=”3.19.14″ text_font=”||||||||” text_text_color=”#000000″ text_font_size=”16px” text_line_height=”1.8em” header_font=”||||||||” max_width=”90%” custom_margin=”|||” animation_style=”flip” animation_direction=”left” animation_intensity_flip=”30%” animation_starting_opacity=”100%”]

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row custom_padding=”27px|0px|0|0px|false|false” _builder_version=”3.19.14″][et_pb_column type=”1_2″ _builder_version=”3.19.14″][et_pb_text _builder_version=”3.19.14″ text_font=”||||||||” text_text_color=”#000000″ text_font_size=”16px” text_line_height=”1.8em” header_font=”||||||||” max_width=”90%” custom_margin=”|||” animation_style=”flip” animation_direction=”left” animation_intensity_flip=”30%” animation_starting_opacity=”100%”]

EASY-TO-USE API

 

Integrates easily with other security solutions.

[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”3.19.14″][et_pb_text _builder_version=”3.19.14″ text_font=”||||||||” text_text_color=”#000000″ text_font_size=”16px” text_line_height=”1.8em” header_font=”||||||||” max_width=”90%” custom_margin=”|||” animation_style=”flip” animation_direction=”left” animation_intensity_flip=”30%” animation_starting_opacity=”100%”]

HANDLES ALL FILE TYPES

 

  • Windows executables (32-bit and 64-bit)
  • Windows DLLs (32-bit and 64-bit)
  • .NET executables (32-bit and 64-bit)
  • .NET DLLs (32-bit and 64-bit)
  • PDF
  • MS Word (.DOC and .DOCX)
  • Flash files
  • MS Excel (XLS and XLSX)
  • Archives (.zip, .rar, 7z, .iso, .tar, .gz,.bz2)
  • ELF executables (32-bit and 64-bit)
  • Mach-O (32-bit and 64-bit)
  • DMG (32-bit and 64-bit)
[/et_pb_text][et_pb_text _builder_version=”3.19.14″ text_font=”||||||||” text_text_color=”#000000″ text_font_size=”16px” text_line_height=”1.8em” header_font=”||||||||” max_width=”90%” custom_margin=”|||” animation_style=”flip” animation_direction=”left” animation_intensity_flip=”30%” animation_starting_opacity=”100%”]

[/et_pb_text][et_pb_text _builder_version=”3.19.14″ text_font=”||||||||” text_text_color=”#000000″ text_font_size=”16px” text_line_height=”1.8em” header_font=”||||||||” max_width=”90%” custom_margin=”|||” animation_style=”flip” animation_direction=”left” animation_intensity_flip=”30%” animation_starting_opacity=”100%”][/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row admin_label=”About Me Area” _builder_version=”3.0.89″][et_pb_column type=”4_4″ _builder_version=”3.0.47″][et_pb_text _builder_version=”3.19.14″ text_font=”||||||||” text_text_color=”#000000″ text_font_size=”16px” text_line_height=”1.8em” header_font=”||||||||” max_width=”90%” custom_margin=”|||” animation_style=”flip” animation_direction=”left” animation_intensity_flip=”30%” animation_starting_opacity=”100%”]

SecondWrite’s advanced malware detector, Malware DeepViewTM, detects and stops all types of malware including advanced evasive malware. Malware DeepViewTM is designed for use by  the following customer segments:

  • Security operations centers (SOCs) at enterprises
  • Incidence response (IR) teams
  • Computer Emergency Response Teams (CERT)
  • Managed security service providers (MSSPs)
  • Threat intelligence vendors
  • Network security companies
  • Endpoint security vendors

In each of these segments, the customer submits files to Malware DeepViewTM for evaluation. Malware DeepViewTM then returns a report for each file describing its dynamic behavior.

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.19.14″ background_color=”#101C1F”][et_pb_row _builder_version=”3.19.14″][et_pb_column type=”4_4″ _builder_version=”3.19.14″][et_pb_text _builder_version=”3.19.14″ text_font=”||||||||” header_font=”Montserrat|600|||||||” header_text_align=”center” header_text_color=”#ffffff” header_font_size=”48px” header_2_font=”||||||||” header_2_text_color=”#ffffff”]

Advantages

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”3.19.14″][et_pb_column type=”1_3″ _builder_version=”3.19.14″][et_pb_text _builder_version=”3.19.14″ text_font=”||||||||” text_text_color=”#ffffff” text_font_size=”16px” text_line_height=”1.8em” header_font=”||||||||” max_width=”90%” custom_margin=”|||” animation_style=”flip” animation_direction=”left” animation_intensity_flip=”30%” animation_starting_opacity=”100%”]

70% MORE INDICATORS OF COMPROMISE DETECTED ON RANDOMLY SELECTED MALWARE DATA SETS THAN A LEADING SANDBOX CONTAINING AD-HOC ANTI-EVASIVE TECHNIQUES.

[/et_pb_text][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.19.14″][et_pb_text _builder_version=”3.19.14″ text_font=”||||||||” text_text_color=”#ffffff” text_font_size=”16px” text_line_height=”1.8em” header_font=”||||||||” max_width=”90%” custom_margin=”|||” animation_style=”flip” animation_direction=”left” animation_intensity_flip=”30%” animation_starting_opacity=”100%”]

HANDLES ALL KINDS OF EVASIVE MALWARE. OTHER BARE-METAL OR FULL-SYSTEM EMULATION ONLY HANDLE ANTI-VM MALWARE.

[/et_pb_text][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.19.14″][et_pb_text _builder_version=”3.19.14″ text_font=”||||||||” text_text_color=”#ffffff” text_font_size=”16px” text_line_height=”1.8em” header_font=”||||||||” max_width=”90%” custom_margin=”|||” animation_style=”flip” animation_direction=”left” animation_intensity_flip=”30%” animation_starting_opacity=”100%”]

HANDLES ZERO-DAY OR PREVIOUSLY UNKNOWN EVASIONS. AD-HOC TECHNIQUES USED IN OTHER SANDBOXES ARE EASILY CIRCUMVENTED BY ADVANCED MALWARE.

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.19.14″][et_pb_row _builder_version=”3.19.14″][et_pb_column type=”1_2″ _builder_version=”3.19.14″][et_pb_text _builder_version=”3.19.14″ text_font=”||||||||” header_font=”Montserrat|600|||||||” header_text_align=”center” header_text_color=”#ffffff” header_font_size=”48px” header_2_font=”||||||||” header_2_text_color=”#000000″]

Want to try SecondWrite?

[/et_pb_text][et_pb_button button_url=”https://webportal.secondwrite.com/register/” url_new_window=”on” button_text=”Try Malware Deepview Free” button_alignment=”center” _builder_version=”3.19.15″ custom_button=”on” button_text_color=”#ffffff” button_bg_color=”#101C1F” button_border_color=”#101C1F” button_font=”||||||||” button_icon=”%%3%%”][/et_pb_button][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”3.19.14″][et_pb_text _builder_version=”3.19.14″ text_font=”||||||||” header_font=”Montserrat|600|||||||” header_text_align=”center” header_text_color=”#ffffff” header_font_size=”48px” header_2_font=”||||||||” header_2_text_color=”#000000″]

See how Malware Deepview Works

[/et_pb_text][et_pb_button button_url=”https://www.secondwrite.com/wp-content/uploads/2018/12/SecondWrite-product-sheet-v6.pdf” url_new_window=”on” button_text=”Download Our Product Data Sheet” button_alignment=”center” _builder_version=”3.19.15″ custom_button=”on” button_text_color=”#ffffff” button_bg_color=”#101C1F” button_border_color=”#101C1F” button_font=”||||||||” button_icon=”%%3%%”][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.19.14″ background_color=”#f2f2f2″ saved_tabs=”all”][et_pb_row _builder_version=”3.19.14″][et_pb_column type=”4_4″ _builder_version=”3.0.47″][et_pb_image src=”https://www.secondwrite.com/wp-content/uploads/2018/04/SeconWrite-Logo-on-White-200×29.png” align=”center” _builder_version=”3.19.14″][/et_pb_image][et_pb_text _builder_version=”3.19.14″ text_font=”||||||||” text_font_size=”10px” text_orientation=”center”]

Copyright © SecondWrite Inc.

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section]