Introducing G2.ai, the future of software buying.Try now
ReversingLabs
Sponsored
ReversingLabs
Visit Website
Product Avatar Image
M&SET

By Stacks Software

0 out of 5 stars

How would you rate your experience with M&SET?

ReversingLabs
Sponsored
ReversingLabs
Visit Website
This product hasn't been reviewed yet! Be the first to share your experience.
Leave a Review

M&SET Reviews & Product Details

Profile Status

This profile is currently managed by M&SET but has limited features.

Are you part of the M&SET team? Upgrade your plan to enhance your branding and engage with visitors to your profile!

M&SET Media

M&SET Demo - M&SET - Enterprise Tier
Includes all Scanners No Data Caps, Useful for heavy program analysis $40 Per Additional Seat No rate limiting 8:00-5:00 Phone Support
M&SET Demo - M&SET - User Tier
Includes all Scanners 10MB upload Limit Best for documents, deep fakes, and URL analysis. No API access Email Support
Product Avatar Image

Have you used M&SET before?

Answer a few questions to help the M&SET community

M&SET Reviews (0)

G2 reviews are authentic and verified.

There are not enough reviews of M&SET for G2 to provide buying insight. Below are some alternatives with more reviews:

1
ESET PROTECT Logo
ESET PROTECT
4.6
(914)
ESET PROTECT is a cutting-edge cybersecurity platform that leverages the latest in AI, state-of-the-art technologies, and human expertise to safeguard your organization from emerging threats and zero-day attacks. As a cloud-first XDR solution, it integrates unique threat intelligence to deliver next-gen prevention, detection, and proactive threat hunting capabilities. Complementing the platform is a comprehensive suite of services, including managed detection and response (MDR), ensuring robust and continuous protection.
2
Coro Cybersecurity Logo
Coro Cybersecurity
4.7
(217)
Monitors your cloud applications for data leaks, cyber-threats and regulatory violations that put your business at risk.
3
Intezer Logo
Intezer
4.5
(193)
Automate your malware analysis. Get answers quickly about any suspicious file, URL, endpoint or memory dump.
4
ANY.RUN Sandbox Logo
ANY.RUN Sandbox
4.7
(179)
ANY.RUN Sandbox is an interactive online malware analysis service created for dynamic as well as static research of multiple types of cyber threats.
5
Cloud-Delivered Security Services Logo
Cloud-Delivered Security Services
4.4
(106)
Our Cloud-Delivered Security Services are natively integrated, offering consistent best-in-class protection everywhere. Backed by our world-renowned Unit 42® Threat Research team, this one-of-a-kind protection uses the network effect of 65,000 global customers to share intelligence from all threat vectors to stop known, unknown and zero-day threats 180X faster than any other platform or point solution.
6
OPSWAT Filescan Logo
OPSWAT Filescan
4.5
(48)
FileScan.IO is a free malware analysis service that offers rapid in-depth file assesments, threat intelligence and indicator of compromise (IOCs) extraction for a wide range of executable files, documents and scripts. Key Benefits: - Perform detection and IOC extraction for all common files in a single platform - Rapidly identify threats, their capabilities and update your security systems - Search your corporate network for compromised endpoints - Analyze files at scale without actually executing them - Easy reporting for entry level analysts and executive summary - Easy deployment and maintenance
7
VIPRE Integrated Email Security Logo
VIPRE Integrated Email Security
4.4
(39)
VIPRE Integrated Email Security provides Multi-layered security package for the best protection
8
VirusTotal Logo
VirusTotal
4.7
(35)
VirusTotal is a service that analyzes suspicious files and facilitates real-time detection of viruses, worms, trojans and malware content.
9
Symantec Content Analysis and Sandboxing Logo
Symantec Content Analysis and Sandboxing
4.6
(30)
Detect and block advanced threats that elude traditional analysis with multiple-layer inspection and customizable sandboxing
10
Trellix Intelligent Virtual Execution (IVX) Logo
Trellix Intelligent Virtual Execution (IVX)
3.8
(30)
Malware Analysis (AX series) products provide a secure environment to test, replay, characterize, and document advanced malicious activities. Malware Analysis shows the cyber attack lifecycle, from the initial exploit and malware execution path to callback destinations and follow-on binary download attempts.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
M&SET
View Alternatives