Unified Security for Fast Response: All ANY.RUN Integrations for SIEM, SOAR, EDR, and More
好的,我现在需要帮用户总结一篇文章,控制在100字以内。用户的要求是直接写描述,不需要开头语。首先,我得仔细阅读文章内容,找出主要信息。 文章主要介绍ANY.RUN的恶意软件分析和威胁情报产品,用户包括15,000个SOC和500,000名分析师。产品通过灵活的API/SDK和预设连接器与现有安全软件无缝集成,提升威胁覆盖率,减少MTTR,并优化性能。 接下来是具体功能:交互式沙盒用于检测规避性钓鱼和恶意软件,提供实时云环境分析可疑文件、URL和脚本。威胁情报 feeds 提供99%独特的IOC,实时更新。威胁情报Lookup则为40多种IOC提供上下文。 最后提到API/SDK支持自定义集成,并强调这些解决方案如何帮助SOC提升可见性、速度和效率。 现在要将这些信息浓缩到100字以内。关键点包括ANY.RUN的产品、用户数量、功能模块(交互式沙盒、威胁情报feeds、Lookup)、以及带来的好处(提升检测率、减少响应时间)。 可能的结构:ANY.RUN提供恶意软件分析和威胁情报产品,服务于大量用户。交互式沙盒检测威胁,feeds提供独特IOC,Lookup丰富上下文。API/SDK支持集成,帮助提升安全能力。 确保语言简洁明了,不遗漏核心功能。 </think> ANY.RUN提供恶意软件分析和威胁情报工具,服务于15,000个SOC和500,000名分析师。其交互式沙盒可实时检测规避性钓鱼和恶意软件;威胁情报 feeds 提供独特IOC;Lookup为40多种指标提供上下文。API/SDK支持自定义集成,提升安全效率与检测能力。 2025-11-5 08:6:25 Author: any.run(查看原文) 阅读量:44 收藏

ANY.RUN’s malware analysis and threat intelligence products are used by 15K SOCs and 500K analysts. Thanks to flexible API/SDK and read-made connectors, they seamlessly integrate with security teams’ existing software to expand threat coverage, reduce MTTR, and streamline performance. 

Here’s how ANY.RUN’s solutions can transform your security. 

Interactive Sandbox: Detect Evasive Phishing & Malware 

Interactive Sandbox provides SOCs with fast threat detection capabilities  

ANY.RUN’s Interactive Sandbox provides a real-time, cloud-based environment for detonating and analyzing suspicious files, URLs, and scripts across Windows, Linux, and Android systems. It lets analysts perform user actions like launching executables or opening links needed to trigger kill chains and force hidden payloads to reveal themselves, enabling faster detection and response.  

The sandbox integrates with other solutions like SOAR platforms in an automated mode, which means it can fully detonate complex phishing and malware attacks on its own, including by solving CAPTCHAs and scanning QR codes. 

The sandbox delivers immediate, actionable insights into the most evasive threats without risking production systems. 

  • Real-Time Threat Visibility: Observe attack chains as they unfold, with 90% of threats detected within 60 seconds, accelerating mean time to detect (MTTD). 
  • Higher Detection Rates: Uncover low-detection attacks (e.g., multi-stage malware, CAPTCHA-protected phishing) with up to 58% more threats identified, reducing missed incidents. 
  • Automated Efficiency: Cut manual analysis time with automated interactivity, reducing Tier 1 workload by 20% and enabling junior analysts to handle complex cases independently. 

Connectors and integrations for Interactive Sandbox 

If your solution is not on the list, you can easily set up a custom integration using ANY.RUN’s API or Python-based SDK (see docs on GitHub or PyPi). 

Threat Intelligence Feeds: Expand Threat Coverage 

TI Feeds offer 99% unique IOCs to identify the latest threats early 

Threat Intelligence Feeds deliver real-time, high-confidence malicious indicators (IPs, domains, URLs) supplied in STIX/TAXII. The indicators are sourced from analyses of the latest malware and phishing attacks performed by 15,000 organizations and 500,000 analysts in ANY.RUN’s Interactive Sandbox.  

Thanks to being powered by one of the largest malware analysis communities, these feeds provide 99% unique IOCs, not found in other sources, that are updated in real time. 

As a result, they give SOCs up-to-date visibility into threats almost as soon as they emerge. With TI Feeds, security teams can: 

  • Catch new attacks early: Live intel is streamed soon after the sandbox detection. 
  • Respond faster: IOCs come with sandbox reports with full context.  
  • Reduce workload: Filtering ensures only high-risk indicators are added. 

Connectors and integrations for TI Feeds 

If your solution is not on the list, you can easily set up a custom integration using ANY.RUN’s API or Python-based SDK (see docs on GitHub or PyPi). 

Threat Intelligence Lookup: Contextualize Alerts 

TI Lookup lets SOC teams get instant context for 40 types of indicators 

Threat Intelligence Lookup is a powerful solution designed to streamline and accelerate malware investigations, from proactive monitoring to incident response.  

SOC teams can use it to quickly get actionable context for over 40 different types of Indicators of Compromise (IOCs), Attack (IOAs), and Behavior (IOBs), from an IP address and a domain to a mutex and a process name.  

TI Lookup provides fresh indicators for the most active malware families 

Each indicator in TI Lookup’s database is linked to a sandbox session, where it was observed, providing analysts with a complete view of the attack, including its TTPs. 

  • Triage alerts faster: Two-second access to millions of past analyses confirms if an IOC belongs to a threat, cutting triage time. 
  • Shorten response time: Indicator enrichment with behavioral context and TTPs guide precise containment strategies. 
  • Reduce unnecessary escalations: Provides Tier 1 analysts with the info to make decisions independently, reducing escalations to Tier 2. 

Connectors and integrations for TI Lookup 

If your solution is not on the list, you can easily set up a custom integration using ANY.RUN’s API or Python-based SDK (see docs on GitHub or PyPi). 

Integrate ANY.RUN’s Solutions in Your SOC 

Whether you want to uncover hidden threats in seconds, catch emerging attacks, or enrich alerts with actionable context, ANY.RUN equips your SOC with the visibility, speed, and efficiency needed to stay ahead.  

With flexible API/SDK and ready-made connectors for leading platforms, implementation is smooth, and the impact is immediate: faster MTTR, higher detection rates, and a stronger defense posture. 

Feel free to reach out to us about integrating ANY.RUN’s products in your SOC at [email protected].  

About ANY.RUN 

Trusted by over 500,000 cybersecurity professionals and 15,000+ organizations in finance, healthcare, manufacturing, and other critical industries, ANY.RUN helps security teams investigate threats faster and with greater accuracy.    

Our Interactive Sandbox accelerates incident response by allowing you to analyze suspicious files in real time, watch behavior as it unfolds, and make confident, well-informed decisions.    

Our Threat Intelligence Lookup and Threat Intelligence Feeds strengthen detection by providing the context your team needs to anticipate and stop today’s most advanced attacks.    

Ready to see the difference?   

Start your 14-day trial of ANY.RUN today →        


文章来源: https://any.run/cybersecurity-blog/all-integrations-and-connectors/
如有侵权请联系:admin#unsafe.sh