1 / 7

Advanced File Analysis System | Valkyrie

Scan Files Online using Comodo File Verdict Service that runs tens of different methods to analyze a file and display the detailed results in seconds

jecobjoel
Download Presentation

Advanced File Analysis System | Valkyrie

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Introduction to Comodo Valkyrie Valkyrie is an online document decision framework that tests obscure records with a scope of static and behavioral checks so as to distinguish those that are pernicious. Since Valkyrie breaks down the whole run-time conduct of a record, it is more successful at identifying zero-day dangers missed by the mark based identification frameworks of exemplary antivirus items. The Valkyrie support enables clients to transfer new documents for examination and to see check brings about a scope of dashboards and reports. Clients additionally have the choice to forward records Comodo Labs for top to bottom, human master checks. The Comodo Unknown File Hunter apparatus enables clients to locally check whole systems for obscure documents at that point transfer them to Valkyrie for investigation. Read More : https://valkyrie.comodo.com/?af=10110

  2. Features • No installation required, just upload files for analysis • Automated and human expert analysis (optional) of submitted files • Comprehensive reporting and dashboards Overview of the Technologies Valkyrie investigation frameworks comprise of numerous systems to guarantee every last record submitted is broke down altogether before giving the decision. Keeping in mind the end goal to do that Valkyrie sends two sorts of advances - Automatic investigation and Human Expert examination. The methods utilized for programmed investigation incorporate Static Analysis, Dynamic Analysis, Valkyrie Plugins and Embedded Detectors, Signature Based Detection, Trusted Vendor and Certificate Validation, Reputation System and Big Data VirusScope Analysis System.

  3. Static Analysis This strategy includes extraction and examination of different twofold highlights and static behavioral derivations of an executable, for example, API headers, alluded DLLs, PE areas and all the more such assets. Any deviation from the normal outcomes are recorded in the static investigation comes about and the decision given as needs be. Dynamic Analysis The dynamic examination method incorporate concentrate the run time conduct of a record to recognize malware designs that can't be distinguished through static investigation.

  4. Valkyrie Plugins and Embedded Detectors Valkyrie modules uses the distinctive malware examination strategies created by different groups and instructive foundations and sent by them on their frameworks as RESTful Web Services. Valkyrie incorporates these outcomes additionally to register a last general decision. Inserted finders in Valkyrie utilizes new strategies for malware location created by Comodo AV lab to process a general last decision of a document. Signature Based Detection Valkyrie utilizes diverse mark based discovery sources with a specific end goal to distinguish a given example in any case. Mark based identification just checks SHA1 hash of documents from signature sources to decide whether there is any match in database.

  5. Trusted Vendor and Certificate Validation Valkyrie checks seller subtle elements of a document with Trusted Vendor database that are consistently refreshed. In the event that the merchant is whitelisted, at that point authentication approval is done to guarantee that endorsement chain is legitimate and not repudiated or lapsed. Reputation System Notoriety information of documents that are gathered from a great many endpoints through Comodo system and items are assessed on a major information stage and changed over to knowledge frame to be utilized by Valkyrie.

  6. Big Data VirusScope Analysis System VirusScope, a piece of Comodo Security items, is a dynamic application analyzer framework that distinguishes vindictive conduct of a record, squares and inverts those activities when essential. The distinguished malware are accounted for to Comodo servers and this information is additionally utilized by Valkyrie. Human Expert Analysis Valkyrie framework incorporates accommodation of documents by clients for manual examination. Comodo master examination, which comprises of the most modern investigation of a record and gives a definitive decision of the document.

More Related