Symantec Content & Malware Analysis

Detect and block advanced threats that elude traditional analysis with multiple-layer inspection and customizable sandboxing

Read the solution Brief Download the Data Sheet

Analyze all content automatically to block advanced threats

Symantec Content and Malware Analysis automatically escalates and brokers zero-day threats for dynamic sandboxing and validation before sending content to users. Analyze unknown content from one central location. With a unique multi-layer inspection and dual-sandboxing approach, reveal malicious behavior and expose zero-day threats, and safely detonate suspicious files and URLs.

  • Block all known threats
  • Deploy multi-step analysis to inspect only suspicious files
  • Detain unknown files
  • Send IOCs to endpoint detection technologies
  • Integrate with Symantec Endpoint Protection Manager

Read the Solution Brief

Analyze all content automatically to block advanced threats

Improve threat detection and sandboxing performance

Even with the benefit of expensive sandboxing technologies, incident response teams are inundated with alerts. Because they can’t tell what’s urgent and what’s not, they often ignore alarms, leaving your enterprise exposed to risk. Symantec Content Analysis ensures that only truly unknown content is brokered to sandboxes so incident response focuses on real threats, not false alarms.

  • Analyze all content before it’s sandboxed
  • Prefilter and block all malicious content
  • Use proxy inspection and dual malware detection engines
  • Centralize and consolidate sandboxes for cost savings
  • Focus on real threats, not false alarms

Download the Data Sheet

Improve threat detection and sandboxing performance

Block malicious threats with flexible sandboxing

While many sandboxes are passive and can only report incoming threats, Symantec Malware Analysis coordinates with inline technologies, delivering real-time sandboxing, discovery, and protection before malware ever reaches a user. A powerful combination of virtualization and emulation captures more malicious behavior across a wider range of custom environments than typical single-method sandboxes.

  • Customize sandbox profiles to represent your ‘gold’ images
  • Create custom behavioral patterns to detect unique IOCs
  • Detect malware that is crafted to avoid sandbox detection
  • Delay file delivery until analysis is complete
  • Mimic user activity so malware thinks it is being activated

Download the Data Sheet

Block malicious threats with flexible sandboxing

Related Products

Resources