Digital Forensics & Incident Response
Joe Sandbox is the platform for SOCs, CIRTS, CERTS and security teams. Based on Deep Malware Analysis Joe Sandbox automatically generates very detailed reports describing the malware behavior, its payload and installation. By using the detailed reports security teams can accelerate their Digital Forensics & Incident Response and do no longer need manual analysis. Extracted IOCs, OpenIOC and MISP report can be easily shared with customers and the security community.
Joe Sandbox is the platform to be integrated into Threat Intelligence Platforms. Based on Deep Malware Analysis Joe Sandbox automatically generates very detailed reports describing the malware behavior, its payload and installation. Those reports can be used to augment existing intelligence data and help to give "context" about IPs, domains, file names and hashes.
Joe Sandbox is a dynamic malware analysis system which detects malware based on its behavior. Compared to static signature detection Joe Sandbox has a much better detection rate. Security Professionals use Joe Sandbox to generically detect malware targeting Windows, Android, Mac OS X and iOS-based system.
Joe Sandbox is the platform to be integrated into Firewall-, Gateway-, AV-, Next-Gen Endpoint-, Threat Intelligence- and Automated Incident solutions. Joe Sandbox analyzes any malware on Windows, Mac OS X, Android and iOS. Vendors get a very flexible tool running on Linux they can integrate easily via various APIs. Joe Security offers flexible license options with features such as Source Code ESCROW, Source Code licensing, white label branding and SLA's.