Volexity was founded on the belief that the future of cybersecurity will depend on the industry’s ability to master the data found in volatile memory. This mastery includes building tools that provide unprecedented visibility into the state of systems, the context required to disposition the overwhelming onslaught of false positives, and confidence that systems are functioning as intended. It also means leveraging memory analysis to dramatically improve the way organizations perform cybersecurity services, including hunting, incident response, and malware analysis. Memory analysis is a disruptive capability that helps organizations move beyond the assumptions and limitations built into traditional cybersecurity products and services.
We believe that the future of cybersecurity will depend on the industry’s ability to master the data found in volatile memory.
Volexity is a Washington, D.C.-based cyber security firm with a global reach. It is led by some of the most respected subject matter experts in the commercial, open source, government, and defense industries, who have pioneered the field of memory forensics (i.e., Volatility), written best-selling security books, and developed groundbreaking tools and technology.
The highly skilled, proven Volexity team has a decade-long history of successfully helping both public and private sector organizations worldwide to deal with myriad modern information security challenges. Our collective experience has enabled our team to deliver the highest caliber lectures, publications, and training in incident response, malware analysis, reverse engineering, network hunting, digital forensics, and investigating cyber espionage.
Introduced in 2007, Volatility provides a cross-platform, modular, and extensible framework designed not only to analyze the runtime state of a system using the data found in volatile storage (RAM), but also to encourage further work into this exciting area of research, leveraging collaboration, innovation, and accessibility to common knowledge.
Based on years of published academic research into advanced memory analysis and forensics, its unique platform enables cutting edge research to be immediately transitioned into the hands of digital investigators. As a result, research built on top of Volatility has appeared at the top academic conferences, and Volatility has been used on some of the most critical investigations of the past decade. It continues to be supported by one of the largest and most active communities in the forensics industry.
The Volatility Framework is supported and maintained by the Volatility Foundation.
Noted publications co-authored by several members of Volexity’s founding members are below. We have also published numerous white papers on groundbreaking memory forensics research; you can find some more recently published whitepapers here.
A computer forensics “how-to” for fighting malicious code and analyzing incidents, Malware Analyst’s Cookbook offers “recipes” that present both the ingredients and the steps you take to resolve a specific problem or research a given threat. Written by well-known malware experts, this practical guide reveals solutions to numerous problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. It includes a DVD of supporting files and original custom programs and tools that illustrate the concepts, enhancing readers’ skills as IT security administrators, incident responders, forensic analysts, and malware researchers.
As a follow-up to Malware Analyst’s Cookbook, The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory is based on a 5-day training course presented to hundreds of students. The Art of Memory Forensics explains the latest technological innovations in digital forensics, and is the only book on the market that focuses exclusively on memory forensics and how to deploy its techniques in a forensically sound manner. Beginning with introductory concepts and moving toward the advanced, the book covers proper investigative steps for detecting stealth malware and advanced threats and how to use free, open source tools for conducting thorough memory forensics.
Working with our elite development or services teams, you’ll protect organizations worldwide from the most advanced cyber threats.
Extend your organization’s defensive capabilities. Volexity offers thorough, agile incident response and suppression; customized, interactive threat intelligence with advanced analytics; and protection for your most important data assets through proactive threat assessment and comprehensive network monitoring.