FAQ

This FAQ is intended to answer questions about using our GLIMPS Malware Kiosk, GLIMPS Malware Expert and GLIMPS Malware Detect solutions

GLIMPS Malware is the detection core of our GLIMPS Malware Kiosk, Detect and Expert products, based on unique Deep Learning technology. Fast and powerful, it uses over 25 analysis engines (AI, Heuristics, AntiVirus, etc.) to quickly and accurately detect malware and other known and unknown threats

GLIMPS Malware can scan any type of file. Depending on the type of file, our orchestrator will select the most appropriate scanning engines. Our anti-phishing engine can also analyze URLs contained in files to detect more threats.

GLIMPS Malware works by simply submitting a file, either manually or automatically, and then analyzing the submitted files in depth to give a clear verdict on their malicious nature. This core technology is used in all our GLIMPS Malware products: Expert, Kiosk and Detect. They can be used to address various investigation, doubt removal and automation use cases, while guaranteeing the same analysis quality offered by our solution.

GLIMPS Malware Expert is an automatic digital investigation tool. It allows you to centralize and consult detailed and enriched analyses of all our products, whether they come from GLIMPS Malware Kiosk or GLIMPS Malware Detect, and offers additional features such as alerting or detailed reports giving an in-depth understanding of the threat with TTPs from the MITRE ATT&CK matrix, secure document visualization, CTI flows associated with the attacker family, …

Discover GLIMPS Malware Expert

GLIMPS Malware Detect is our REST API for automating file analysis and integrating the results into your existing security systems. Thanks to its integration capabilities, this API also makes it possible to integrate GLIMPS Malware‘s capabilities into various tools, not only for security, but also for collaboration, e-mail and much more

Discover GLIMPS Malware Detect

Designed with all users in mind, GLIMPS Malware Kiosk is the 1st sovereign file analysis portal empowering every employee in the doubt removal process, by enabling them to easily submit files via drag & drop for a fast, in-depth security analysis accessible directly from every employee’s browser

Discover GLIMPS Malware Kiosk

Today, traditional antivirus solutions are often ineffective against the most advanced threats. GLIMPS Malware overcomes these limitations by offering multi-engine analysis and accurate threat detection.

Here are the key benefits:

  • Unique, fast and accurate detection: uses over 25 analysis engines, including DeepEngine, a Deep Learning-based technology for detecting emerging or unknown threats
  • Automated analysis: recursive, automated in-depth analysis of submitted files
  • Proactive protection: detection and quarantine of malicious files via integration with SOARs
  • Real-time notifications: immediate alert when a threat is detected
  • Detailed reporting: comprehensive information for the investigation of security incidents
  • Seamless integration: robust API for easy integration with other security tools

By using multiple analysis engines, GLIMPS Malware reduces the risk of false positives and false negatives, offering more accurate and reliable results.

GLIMPS Malware features a robust API and connectors for easy integration with your existing security systems, including SOAR, SIEM and other security tools. You can automate analyses and integrate results directly into your workflows

Yes, GLIMPS Malware complies with data privacy and security standards. GLIMPS does not use customer data in any way to ensure the confidentiality of user data

You can visit our resource center for detailed guides, tutorials and case studies.
If you have any further questions, our support team is available to help you at: support@glimps.re

 

Discover ressources

GLIMPS Malware is designed to offer the same real-time scanning capabilities as traditional antivirus solutions. It is designed to scan, in a matter of seconds, both individual files on demand and file streams automatically to detect potential threats

Yes, GLIMPS Malware can be deployed in both SaaS (Software as a Service) and On Premise modes. In SaaS mode, you benefit from a turnkey solution hosted in the cloud (SecNumCloud possible), offering accessibility and continuous updating without infrastructure management. In On Premise mode, you can integrate GLIMPS Malware directly into your local infrastructure, offering total control and product customization to your specific needs. This flexibility enables you to meet the diverse security and compliance requirements of your business

GLIMPS Malware is constantly evolving thanks to user feedback and new discoveries in cybersecurity. Our CTI and R&D teams are constantly working to improve our service and stay at the cutting edge of technology

GLIMPS Malware and sandboxes have complementary but distinct roles in cybersecurity. GLIMPS uses over 25 static scan engines to analyze files, offering a verdict in seconds on potential threats from a wide range of sources. This analysis method means that GLIMPS is not vulnerable to sandbox or EDR evasion techniques. In contrast, a sandbox executes a suspicious file in an isolated environment to observe its behavior in real time. While GLIMPS Malware provides multi-engine detection and detailed threat reports on file streams, a sandbox offers in-depth, multi-minute behavioral analysis of a single file or binary. Together, they provide a comprehensive view of threats. That’s why GLIMPS Malware includes an automated sandbox for in-depth investigation by SOC and CSIRT teams

Antivirus scanners are a first level of analysis to avoid classic virus attacks, but faced with the constant increase in sophisticated cyberattacks, a traditional approach to cybersecurity such as antivirus scanners is no longer sufficient: traditional signature-based antivirus scanners are unable to detect new viruses that are not registered in their database. So-called “next-generation” technologies such as GLIMPS Malware, based in particular on artificial intelligence algorithms, are needed to deal with advanced threats

Yes, we have compiled a glossary in which you can find the main acronyms

Discover our glossary