Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Cofense Triage™ enhances the speed at which phishing emails are recognized and dealt with effectively. By leveraging integration and automation, you can significantly reduce your response time. Utilizing Cofense Intelligence™ rules alongside a top-tier spam engine, we automatically detect and assess threats with precision. Our comprehensive read/write API enables you to incorporate intelligent phishing defense seamlessly into your existing workflow, allowing your team to concentrate on safeguarding your organization. We recognize that combating phishing can be complex; therefore, Cofense Triage™ provides immediate access to expert assistance with just a single click, available at any moment. Our Threat Intelligence and Research Teams are dedicated to continuously expanding our collection of YARA rules, facilitating the identification of new campaigns and enhancing your response efficiency. Furthermore, the Cofense Triage Community Exchange empowers you to collaboratively analyze phishing emails and gather threat intelligence, ensuring you're well-supported in your efforts to combat these threats. This collaborative approach not only strengthens your defenses but also fosters a community of shared knowledge and experience.

Description

YARA serves as a resource primarily designed for malware analysts to discover and categorize malware samples effectively. This powerful tool enables users to develop representations of various malware families or other entities by utilizing either textual or binary patterns. Each representation, known as a rule, comprises a collection of strings paired with a boolean expression that dictates its operational logic. Additionally, YARA-CI can enhance your toolkit by offering a GitHub application that facilitates continuous testing of your rules, which aids in detecting frequent errors and minimizing false positives. In essence, the specified rule directs YARA to flag any file that contains one of the three designated strings as a silent_banker, thereby streamlining the identification process. By incorporating YARA and YARA-CI, researchers can significantly improve their malware detection capabilities and overall efficiency in their work.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Anomali
Betterscan.io
Chronicle SOAR
Cisco Umbrella
Filigran
Libraesva Email Security
LimaCharlie
LogRhythm SIEM
OpenText Content Management (Extended ECM)
Palo Alto Networks AutoFocus
SentinelOne Singularity
Splunk Enterprise
Symantec Network Forensics
Tenzir
Threat.Zone
Trellix Endpoint Security (HX)
Trend Micro Web Security
Uptycs

Integrations

Anomali
Betterscan.io
Chronicle SOAR
Cisco Umbrella
Filigran
Libraesva Email Security
LimaCharlie
LogRhythm SIEM
OpenText Content Management (Extended ECM)
Palo Alto Networks AutoFocus
SentinelOne Singularity
Splunk Enterprise
Symantec Network Forensics
Tenzir
Threat.Zone
Trellix Endpoint Security (HX)
Trend Micro Web Security
Uptycs

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Cofense

Founded

2011

Country

United States

Website

cofense.com/product-services/cofense-triage/

Vendor Details

Company Name

YARA

Website

virustotal.github.io/yara/

Product Features

Incident Response

Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Security Orchestration
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management

Product Features

Alternatives

Alternatives

THOR Reviews

THOR

Nextron Systems