ReversingLabs Titanium Platform OverviewUNIXBusinessApplication

ReversingLabs Titanium Platform is the #2 ranked solution in our list of top Threat Intelligence Platforms. It is most often compared to VirusTotal: ReversingLabs Titanium Platform vs VirusTotal

What is ReversingLabs Titanium Platform?

ReversingLabs delivers advanced malware analysis and insights into destructive files and objects that address the the latest attacks, advanced persistent threats and polymorphic malware. These threats routinely defeat current anti-virus scanner, white list, behavioral and sandbox technology thus requiring tedious, manual analysis by highly skilled experts

Through its automated static analysis and file reputation platform, it delivers the fastest and most accurate insights in the industry, finding the hidden objects that are armed to destroy enterprise business value.

The hybrid cloud platform provides connectors that integrate with existing security investments such as EDR, email gateways, IDS, SIEM, threat intelligence platforms and sandboxes, reducing incident response time for SOC analysts, while providing high priority and detailed threat information for hunters to take quick action through advanced search and YARA rule tooling.

ReversingLabs has become an essential threat solution across the most advanced security companies in the industry, while supporting all industries searching for a better way to get at the root of the web, mobile, email, cloud, app development and supply chain threat problem, of which files and objects have become major risk contributors.

https://www.reversinglabs.com

ReversingLabs Titanium Platform is also known as ReversingLabs Titanium.

Buyer's Guide

Download the Anti-Malware Tools Buyer's Guide including reviews and more. Updated: August 2021

ReversingLabs Titanium Platform Customers

Financial services, healthcare, government, manufacturing, oil & gas, telecommunications, information technology

ReversingLabs Titanium Platform Video

Archived ReversingLabs Titanium Platform Reviews (more than two years old)

Filter by:
Filter Reviews
Industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
Rating
Loading...
Filter Unavailable
Considered
Loading...
Filter Unavailable
Order by:
Loading...
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Search:
Showingreviews based on the current filters. Reset all filters
SS
Information Security Engineer IV at a financial services firm with 1,001-5,000 employees
Real User
Gives us a more in-depth analysis and better reporting on a larger number of file types

What is our primary use case?

We haven't finished building it out fully but we want to use it as a pre-filter before samples go to anything else for analysis. Things are going to be coming to it and we're going to get a score regarding what ReversingLabs thinks of any file samples and, if it's a score that says it's a high threat level, we'll send it on for further analysis in other automated platforms.

Pros and Cons

  • "It offers reports on a great many more file types than the other analysis solutions we have. It can give us a more in-depth analysis and better reporting on a larger number of file types. It also gives us a more comprehensive score on a number of things as well, and that's why we're using it as a front-end filter. It gives us more information... It's valuable because of its depth of information, as well as the breadth it gives us. There aren't a lot of tools that cover all of the different file types."
  • "We would really like further integration with our threat intelligence platform, which is called ThreatConnect. We would also really like further integrations with an endpoint protection product we use called Tanium. The reason I mentioned both of these is that ReversingLabs claims to have extensive integrations with both of them, but they did not work for us."

What other advice do I have?

Anything we've pumped at this thing, it seems that it's just fine handling it. That's one of the big reasons we want it to be the funnel that everything comes through first. We want that determination of good, bad, or suspicious. We have complete faith that it can do that for us, and can do it at scale. It's stellar. I would easily give it a nine out of ten. I've had a great experience with it.
SV
CSO - Information Security at a financial services firm with 1,001-5,000 employees
Real User
We use the product for data enrichment or downloading malicious programs that we are otherwise unable to find

What is our primary use case?

The primary use case is static analysis and retrieval of malware relevant indicators. We have multiple products in use. As far as the onsite product is concerned, we use the latest version of the product. The other version is a cloud-based solution, so I assume this is always the latest version. We are not integrating the solution with our bank technologies directly since we are employing the solution in a special infrastructure, which is isolated from the rest of the production network for security reasons. However, we do integrate the solution with a number of other analysis technologies… more »

Pros and Cons

  • "As far as the malware repository is concerned, it's extensive. It's a good source for finding samples, where we are unable to find them on other channels or by leveraging other sources."
  • "As far as static analysis information is concerned, we use most of the information that is available in order to determine whether or not we might be dealing with a malware variant. This includes information that is related to Java rules. This is also related to malware families indicated or specific malicious software variants that are labeled by name."
  • "The product support could be better at times. Sometimes, the resources that they provide could be of higher quality."
  • "While the company is very helpful, it would be very much appreciated to have extensive proof of concept scripts for the different APIs available, though not for all the APIs that we have purchased. Respective scripts are available, but those scripts which are available are typically not of very high quality."

What other advice do I have?

It's definitely a technical product. Some expertise and experience with malware analysis and anti-malware operations is required. Only purchasing the static analysis parts, as well as the APIs, this typically requires some maturity in the Security Operations Center (in respect to CERTs). If this is not the case, then respective teams should opt for the graphical user interface, which provides more guided support. Other than that, it's a good product. I would rate it approximately seven and a half to eight. One of the problems is currently that the company offers three different types of…