VALKYRIE

Cyber Threat Intelligence Platform

Subscripition Plan Feature Public
Free
Standard Extended Premium Enterprise

Daily Query limit (File)

7.500 25.000 50.000 100.000 1.000.000

Daily Query limit (URL/Domain/IP)

50.000 500.000 2.500.000 5.000.000 50.000.000

API request limit in 1 min. (File/URL/Domain/IP)

6 No Limit No Limit No Limit No Limit

Download File (Daily Limit)

2 250 500 1000 10.000

Human Analysis (Daily Limit)

0 5 10 25 250

%100 Trusted verdict for All Files

Yes Yes Yes Yes Yes

Containment of Unknown Files as a Service

No No No No Yes
Request Demo Request Demo Request Demo Request Demo Request Demo
Contact Contact Contact Contact Contact

    File Lookup Service (FLS)

  • The Valkyrie File Lookup Service is a lightweight, swift reply to integrations queries related to globally known bad processes or executables.

    Machine Learning (Ai)

  • Automated Verdict Driven Platform techniques include support vector machines, naive bayes, decision trees, neural networks and many more.

    Valkyrie Hunter

  • Lightweight file scanning application capable of identifying advanced persistent threats and zero-day threats in your network and devices.

    Application Whitelisting

  • Intelligence on known safely digitally signed applications and publishers on the web. The most robust whitelist on the market available to date.

    Static Analysis Detectors

  • 1,000+ static detectors include binary level analysis, libraries, system calls embedded in the code, extractable links, unpackers, and string analysis.

    Reputation Analysis

  • Analyzed malicious files receive a verdict score then embedded URLs are extracted, added and matched against known our url web blacklist.

    Dynamic Analysis

  • Behavioral and environmental analysis watching for evasion, VM escape attempts, mass sleep commands, registry changes, file system pollution,

    Expert Human Analysis

  • The industry’s only SLA backed, advanced malware analysis platform with human analysis to ensure 100% verdict on all unknown files.
Subscripition Plan Feature Public
Free
Standard Extended Premium

Daily Feed Count (Domain / URL Category)

84.600 100.000 1.000.000 5.000.000

API Request Limit in 1 min. (Domain / URL Category)

60 No Limit No Limit No Limit

DB Export (All Categories)

No No No Yes
Request Demo Request Demo Request Demo Request Demo
Contact Contact Contact Contact

    File Lookup Service (FLS)

  • The Valkyrie File Lookup Service is a lightweight, swift reply to integrations queries related to globally known bad processes or executables.

    Machine Learning (Ai)

  • Automated Verdict Driven Platform techniques include support vector machines, naive bayes, decision trees, neural networks and many more.

    Valkyrie Hunter

  • Lightweight file scanning application capable of identifying advanced persistent threats and zero-day threats in your network and devices.

    Application Whitelisting

  • Intelligence on known safely digitally signed applications and publishers on the web. The most robust whitelist on the market available to date.

    Static Analysis Detectors

  • 1,000+ static detectors include binary level analysis, libraries, system calls embedded in the code, extractable links, unpackers, and string analysis.

    Reputation Analysis

  • Analyzed malicious files receive a verdict score then embedded URLs are extracted, added and matched against known our url web blacklist.

    Dynamic Analysis

  • Behavioral and environmental analysis watching for evasion, VM escape attempts, mass sleep commands, registry changes, file system pollution,

    Expert Human Analysis

  • The industry’s only SLA backed, advanced malware analysis platform with human analysis to ensure 100% verdict on all unknown files.
Subscripition Plan Feature Public
Free
Standard Extended Premium

Daily Feed Count

All 1 10 All

Feed Record Count

50 (Weekly) No Limit No Limit No Limit

Update Period

Weekly Every Hour Every 30 Minutes Every 15 Minutes
Request Demo Request Demo Request Demo Request Demo
Contact Contact Contact Contact

    File Lookup Service (FLS)

  • The Valkyrie File Lookup Service is a lightweight, swift reply to integrations queries related to globally known bad processes or executables.

    Machine Learning (Ai)

  • Automated Verdict Driven Platform techniques include support vector machines, naive bayes, decision trees, neural networks and many more.

    Valkyrie Hunter

  • Lightweight file scanning application capable of identifying advanced persistent threats and zero-day threats in your network and devices.

    Application Whitelisting

  • Intelligence on known safely digitally signed applications and publishers on the web. The most robust whitelist on the market available to date.

    Static Analysis Detectors

  • 1,000+ static detectors include binary level analysis, libraries, system calls embedded in the code, extractable links, unpackers, and string analysis.

    Reputation Analysis

  • Analyzed malicious files receive a verdict score then embedded URLs are extracted, added and matched against known our url web blacklist.

    Dynamic Analysis

  • Behavioral and environmental analysis watching for evasion, VM escape attempts, mass sleep commands, registry changes, file system pollution,

    Expert Human Analysis

  • The industry’s only SLA backed, advanced malware analysis platform with human analysis to ensure 100% verdict on all unknown files.
Subscripition Plan Feature Multitenant Hosted On-Prem

Network Compatibility

e-Discovery of one or al users, along with your network’s Active Directory and LDAP integrations to facilitate users.

Check Icon Check Icon Check Icon

Inbox Housekeeping

Restores user productivity lost from years of poor inbox housekeping to keep emails to stay organized.

Check Icon Check Icon Check Icon

No Installation Required

Cloud based email security acting as your pre preimeter inbox defense against spam, phishing and virus sent via emails.

Check Icon Check Icon Check Icon

Email MX Spooling

Valkyrie Carrier can deliver your important business emails to the destination server if your MX server unavailable.

Check Icon Check Icon Check Icon

Webmail Continuity

Should your local mail-server be undergoing maintenance or not available you can continue business operations.

Check Icon Check Icon

Forensic Threat Audits

Protection for your business email accounts by auditing all mail management, domain configuration events, and filtering.

Check Icon

Multitenant Hosting Capability

Single instance of Carrier can run on multiple servers without distruption from cloud based transferring.

Check Icon

Email Disaster Recovery

Store all your sensitive email data into your own private cloud sector. In case anything happens.

Check Icon Check Icon

Granular Configurations

Fine-tune a single account or your entire network of user mailboxes by defining mail management settings and autoresponders.

Check Icon Check Icon

Secure Web Gateway Integration

Check Icon Check Icon

Alert Options: Dedicated Tech Support

Check Icon Check Icon Check Icon

Periodical Quarantine Reporting

Check Icon

Reporting in graphics and table formats

Check Icon Check Icon Check Icon

Host your own Secure Web Gateway Cloud

Check Icon
Request Demo Request Demo Request Demo
Contact Contact Contact
Subscripition Plan Feature Platinum Advanced Premium

Targeted Malware Monitoring

The Valkyrie Engine will sandbox and analyze new zero day botnets and determine if they are a threat to your industry.

Check Icon Check Icon Check Icon

Real Time Phising

Live updates on new phishing attacks – templates and alert capabilities to make your employees aware.

Check Icon Check Icon Check Icon

Malware 10 Day Historical Analysis

The Valkyrie Engine will sandbox and analyze new zero day botnets and determine if they are a threat to your industry.

Check Icon Check Icon Check Icon

Global Malware Real Time Analysis

See real time trends and data LIVE in your dashboard.

Check Icon Check Icon Check Icon

Stolen Credential Monitoring for your company and customers

On 500,000+ Crime Servers (includes direct threats & 3rd party attacks)

Check Icon Check Icon

Stolen Credential Monitoring on your vendors and partners

On 500,000+ Crime Servers (includes direct threats & 3rd party attacks)

Check Icon Check Icon

Executive User Credential Monitoring

Including personal Gmail, Yahoo, & Hotmail accounts, as well as prior job email accounts.

Check Icon

CISO Turnback the Clock™ Malware Verdicting

Get hours more of protection per day by having Comodo catch & report what your current AV isn't.

Check Icon Check Icon Check Icon

Global Blacklist API’s with Real Time Sync

Check Icon Check Icon

Alert Options: Email Notifications

Check Icon Check Icon

Alert Options: Phone Call + 24/7 CSOC Monitoring

Check Icon

8x5 Enterprise Support– Next Business Day SLA

Check Icon

8x5 Enterprise Support– 4 Hour SLA

Check Icon Check Icon

24/7 Enterprise Support – 4 Hour SLA

Check Icon
Request Demo Request Demo Request Demo
Contact Contact Contact
Subscripition Plan Feature Platinum Advanced Premium

Targeted Malware Monitoring

The Valkyrie Engine will sandbox and analyze new zero day botnets and determine if they are a threat to your industry.

Check Icon Check Icon Check Icon

Real Time Phising

Live updates on new phishing attacks – templates and alert capabilities to make your employees aware.

Check Icon Check Icon Check Icon

Malware 10 Day Historical Analysis

See what has happened on the web the past 10 days & how certain malware is spreading.

Check Icon Check Icon Check Icon

Global Malware Real Time Analysis

See real time trends and data LIVE in your dashboard.

Check Icon Check Icon Check Icon

Stolen Credential Monitoring for your company and customers

On 500,000+ Crime Servers (includes direct threats & 3rd party attacks)

Check Icon Check Icon

Stolen Credential Monitoring on your vendors and partners

On 500,000+ Crime Servers (includes direct threats & 3rd party attacks)

Check Icon

Executive User Credential Monitoring

Including personal Gmail, Yahoo, & Hotmail accounts, as well as prior job email accounts.

Check Icon

CISO Turnback the Clock Malware Verdicting

Get hours more of protection per day by having Comodo catch & report what your current AV isn't.

Check Icon Check Icon

Global Blacklist API’s with Real Time Sync

Check Icon Check Icon

Alert Options: Email Notifications

Check Icon Check Icon

Alert Options: Phone Call + 24/7 CSOC Monitoring

Check Icon Check Icon

8x5 Enterprise Support– Next Business Day SLA

Check Icon

8x5 Enterprise Support– 4 Hour SLA

Check Icon Check Icon Check Icon

24/7 Enterprise Support – 4 Hour SLA

Check Icon
Request Demo Request Demo Request Demo
Contact Contact Contact
Subscripition Plan Feature Platinum Advanced Premium

Targeted Malware Monitoring

The Valkyrie Engine will sandbox and analyze new zero day botnets and determine if they are a threat to your industry.

Check Icon Check Icon Check Icon

Real Time Phising

Live updates on new phishing attacks – templates and alert capabilities to make your employees aware.

Check Icon Check Icon Check Icon

Malware 10 Day Historical Analysis

See what has happened on the web the past 10 days & how certain malware is spreading.

Check Icon Check Icon Check Icon

Global Malware Real Time Analysis

See real time trends and data LIVE in your dashboard.

Check Icon Check Icon Check Icon

Stolen Credential Monitoring for your company and customers

On 500,000+ Crime Servers (includes direct threats & 3rd party attacks)

Check Icon Check Icon

Stolen Credential Monitoring on your vendors and partners

On 500,000+ Crime Servers (includes direct threats & 3rd party attacks)

Check Icon

Executive User Credential Monitoring

Including personal Gmail, Yahoo, & Hotmail accounts, as well as prior job email accounts.

Check Icon

CISO Turnback the Clock Malware Verdicting

Get hours more of protection per day by having Comodo catch & report what your current AV isn't.

Check Icon Check Icon

Global Blacklist API’s with Real Time Sync

Check Icon Check Icon

Alert Options: Email Notifications

Check Icon Check Icon

Alert Options: Phone Call + 24/7 CSOC Monitoring

Check Icon Check Icon

8x5 Enterprise Support– Next Business Day SLA

Check Icon

8x5 Enterprise Support– 4 Hour SLA

Check Icon Check Icon Check Icon

24/7 Enterprise Support – 4 Hour SLA

Check Icon
Request Demo Request Demo Request Demo
Contact Contact Contact
JOIN OUR THREAT INTELLIGENCE NEWSLETTER