In-the-Cloud Sandboxing. Sandbox analysis is difficult to perform in real time, since malware samples can take a few minutes to activate. The ThreatSeeker Network can generate many different online sandbox environments to simulate various target platforms.
The ThreatSeeker Network collects content in all its online forms: web pages, documents, executables, streaming media, emails, mobile applications and other Internet traffic. It processes this massive amount of data to identify trends in online threats. In turn, this intelligence informs further types of content to collect.
The ThreatSeeker Network:
Assesses popular websites to see if they’ve been hijacked.
Uses hot news and social media topics to identify additional websites to assess.
Monitors viral sites and content.
Tracks geographical hot spots.