Thanks to our AI based technology, GLIMPS detects, correlates and analyzes new threats in the glimpse of an eye.
Detect
GLIMPS-Malware automatically detects malware affecting standard IT systems, manufacturing systems, IOT or automotive domains. We support many different architectures including x86, x64, ARM, POWERPC and MIPS.
Correlate
Thanks to our proprietary AI based technology, malware are automatically correlated with known APT families.. An essential tool for your Threat-Intel analyses !
Document
GLIMPS identifies and documents more than 500 000 families of libraries, both open-source and proprietary, and retrieves information about already identified malware belonging to the same family.
Our Products
Previous
Next
GLIMPS Audit
Secure critical systems and accelerate your certification process
Want to assess your systems? Need to evaluate products delivered by your contractors? Search and evaluate vulnerabilities? GLIMPS-Audit allows you to analyze them and helps you understand the critical parts of any binary that you come accross.
Connected to your company’s web and email proxies, deployed in your SOC or as a centralized file analysis tool for your employees, GLIMPS-Malware discovers malware on the fly, even new or not yet observed samples, providing precious data on malware identity. Your security team gets instant clues about the threat families (APTxx) of malware attacking your company.
Comparison of the ransomware used against Enel and Honda François did an internship with us between April and August. He worked on the development of a tool that extracts symbols…
Email protection with GLIMPS Malware In the last few weeks, following the covid-19 crisis and the generalization of teleworking, there has been a very strong resurgence of phishing attacks. Concerning…
Detection and characterization of an unknown malware thanks to GLIMPS Malware As for the Threat-Intel use case, we have taken back our mirai source code, this time with some modifications…
Reverse-engineering with GLIMPS-Audit What could be more tedious, when starting the reverse engineering of a binary, whether for a vulnerability search or a malware scan for example, to have to…
Contact
Digital Square
1137A Avenue des Champs Blancs,
35510 Cesson-Sévigné