Latka logo

Top 9 Malware Analysis Tools SaaS Companies in May 2026

As of May 2026, there are 9 SaaS companies in Malware Analysis Tools. They have combined revenues of $64M and employ 574 people. They have raised $50M and serve - customers combined.

Malware Analysis Tools are specialized software designed to identify, examine, and mitigate the effects of malicious software. These tools support various analysis methods, including static and dynamic analysis, reverse engineering, and behavioral analysis, allowing security professionals to understand the functionality and impact of malware. Common use cases include threat detection, vulnerability assessments, and forensic investigations, making them essential for cybersecurity teams and IT professionals tasked with protecting networks and systems from cyber threats. Typical features of malware analysis tools include automated sandbox environments for safe execution of malware samples, detailed reporting on malware behavior, and integration with threat intelligence databases. The target users often include cybersecurity analysts, system administrators, and incident response teams. These professionals rely on malware analysis tools to enhance their security protocols and respond effectively to incidents involving malware infections.

Companies
9
Revenue
$64M
Funding
$50M
Employees
574

Filters

Sorting: Highest -> Lowest

Filters

Top Malware Analysis Tools Companies

Showing 10 of 9 companies ranked by annual revenue.

1
Garrison Technology

London, England, United Kingdom

Developer of anti-malware products designed to revolutionize enterprise cyber-security. The company's anti-malware products offer highly effective fundamental security challenges for enterprise and cloud computing, enabling its users to access all content on the web without any risk of exposing their organization to cyber-attack.

Revenue
$23.6M
Customers
-
Year founded
2014
Funding
$49M
Team size
184
Growth
63.93%
2
ANY.RUN - Interactive Malware Analysis Service

United States

ANY.RUN is an interactive online malware analysis service created for dynamic and static research of multiple types of cyber threats. One of the major competitive advantages of ANY.RUN is that the service is developed as an interactive analysis tool. The company aims to provide all the information by executing the task. ANY.RUN displays the creation of various processes in real time, allowing the researcher to see the whole picture during simulation. While automated analysis can be fooled by some of the modern malicious programs, ANY.RUN strives to provide a robust way of interactive testing with real-time access to the sandbox simulation.

Revenue
$22.9M
Customers
-
Year founded
2016
Funding
-
Team size
208
Growth
-
3
VMRay

United States

Sandboxing reinvented to uncover the threats of today & tomorrow. At VMRay, our purpose is to liberate the world from undetectable digital threats. Led by reputable cyber security pioneers, we develop best-in-class technologies to help organizations distinguish genuine threats from the noise and obtain additional context and insights into those threats. Based on the world's most advanced malware and phishing analysis platform, we enable enterprises, government organizations, and MSSPs to automate security operations, accelerate analysis and response, and build reliable threat intelligence. In times of uncertainty and complexity, we create room for clarity and productivity to help security teams thrive.

Revenue
$12.9M
Customers
-
Year founded
2013
Funding
-
Team size
117
Growth
-
4
Cyberstanc

United States

Cyberstanc is a technology-driven company, that uses a signatureless approach to protect against zero-day malware, exploit variants, known and unknown ransomware, suspicious behavior in pre-attack scenarios with New-Age anti-malware (Scrutiny) and Simulated intelligence first sandbox (Swatbox). 🌪️ Introducing Vortex, the ultimate platform designed specifically for SOC teams, Threat Hunters, and Researchers. With Vortex, you'll have all the tools you need to combat cyber threats at your fingertips. Experience its power with a 30-day freemium access, allowing you to explore its full capabilities. But that's not all! Vortex offers an exciting co-build opportunity. Join forces with our team to shape the future of cybersecurity technology.

Revenue
$1.7M
Customers
-
Year founded
-
Funding
-
Team size
15
Growth
-
5
Cythereal Inc.

Lafayette, Louisiana, United States

Cythereal’s mission is to predict, prevent & investigate zero-day malware attacks by malware analysis & machine learning.

Revenue
$1.5M
Customers
-
Year founded
2016
Funding
$1M
Team size
12
Growth
18.28%
6
Brosix

Wilmington, Delaware, United States

Offers an easy-to-use, affordable enterprise instant messenger featuring advanced security, privacy, and customization. Our award winning im client installs in minutes and offers unparalled scalability and support. A 30 days free trial is available with no obligations and all the features activated. About BROSIX Instant Messenger for companies and organizations that helps teams improve productivity by having the best collaboration features delivered in a single package. Features With Brosix, you can send text messages to your contacts fast, securely and easily. All messages sent with Brosix are encrypted and secured. Chat groups Offline Messages Chat history Voice chat Video chat File transfer Co-browsing Whiteboard Screenshot Screen sharing Automatic update User status Connect with external IM networks - Yahoo Messenger Malware and virus protection Real time monitoring for typos in the chat window Multiple chats into a single window

Revenue
$550K
Customers
-
Year founded
-
Funding
-
Team size
5
Growth
-
7
AdSecure

Dublin, Dublin, Ireland

AdSecure is an ad verification system built around a custom-made crawler capable of simulating a wide array of devices and GEOs. It allows the user to automatically scan ad tags and landing pages for non-compliance and malware in real-time. As soon as our system detects a threat in a project, an alert notification is sent to the advertising operation team, giving them access to a comprehensive report listing all malicious links and allowing them to take the appropriate actions. Malvertising poses a very serious threat for the online community and for the entire online advertising ecosystem. Malware distributed through the digital advertising supply chain degrades overall trust in this ecosystem. Cyber criminals are taking advantage of the open system which relies on multiple parties including advertisers, ad networks, ad exchanges and site publishers. The boom in programmatic advertising offers attackers advanced targeting options making their malicious campaigns extremely effective and difficult to detect. Keep your advertising safe with AdSecure

Revenue
$440K
Customers
-
Year founded
2016
Funding
-
Team size
4
Growth
-
8
Offensive 360

Amsterdam, North Holland, Netherlands

Offensive 360 is the world's first static code analysis technology that attacks the source code to find security flaws and vulnerabilities that are even difficult to security experts to find. Offensive 360 is an all-in-one technology that does deep source code analysis, software composition analysis, Malware analysis and licence analysis. Made by world's class security researchers.

Revenue
$440K
Customers
-
Year founded
-
Funding
-
Team size
4
Growth
-
9
ODI

Rosh Haain, Israel

Developer of a content disarm and reconstruct platform intended to specialize in infrastructure protection, encryption and network security. The company's platform prevents the insertion of malware to organizational networks by removing all malicious code from a wide range of file types, enabling clients to continuously analyze various threats, attack vectors and patterns in a hassle free manner.

Revenue
$60.9K
Customers
-
Year founded
1990
Funding
-
Team size
25
Growth
26.5%

Inclusion Criteria

- Must provide capabilities for both static and dynamic malware analysis - Should include features like sandboxing for safe execution of malware samples - Must offer detailed reporting on malware behavior and capabilities - Should integrate with threat intelligence platforms for context enrichment - Must be usable by cybersecurity analysts and IT security teams - Not just focused on detection; must also enable thorough analysis and remediation of malware