{"id":9755,"date":"2018-08-13T23:50:44","date_gmt":"2018-08-13T15:50:44","guid":{"rendered":"https:\/\/www.microdium.net\/public\/valkyrie-real-time-threat-identification-service\/"},"modified":"2018-08-13T23:50:44","modified_gmt":"2018-08-13T15:50:44","slug":"valkyrie-real-time-threat-identification-service","status":"publish","type":"post","link":"https:\/\/www.microdium.com\/public\/2018\/08\/13\/valkyrie-real-time-threat-identification-service\/","title":{"rendered":"Valkyrie: Real Time Threat Identification Service"},"content":{"rendered":"<p>Verdict Driven, File Analysis Platform<\/p>\n<p>Valkyrie is a cloud based file analysis platform providing static, dynamic and even human expert analysis for submitted known and unknown files, providing the file analysis platform for all Comodo 360 solutions. Valkyrie\u2019s verdict driven, file analysis platform, processes over 200 million unknown file submissions each day, uncovering more than 300 million unknown files every year \u2013 through tightly integrated Comodo solutions, partnerships and our active global community of threat researchers.<\/p>\n<p>For More Information: <\/p>\n<p>Subscribe for The Latest In Cybersecurity \u25ba\u25ba <a target=\"_blank\" href=\"http:\/\/www.youtube.com\/subscription_center?add_user=ComodoDesktop\" rel=\"noopener\">http:\/\/www.youtube.com\/subscription_center?add_user=ComodoDesktop<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Verdict Driven, File Analysis Platform Valkyrie is a cloud based file analysis platform providing static, dynamic and even human expert analysis for submitted known and unknown files, providing the file analysis platform for all Comodo 360 solutions. Valkyrie\u2019s verdict driven,&hellip;<\/p>\n","protected":false},"author":1,"featured_media":9756,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14],"tags":[569,570,571,572,573,574,575,576,577,578,579,580,581],"class_list":["post-9755","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-videos","tag-comodo","tag-comodo-cybersecurity","tag-cyber","tag-cyber-threats","tag-cybersecurity","tag-hacker","tag-hacking","tag-malware","tag-threat-intelligence","tag-threats","tag-valkyrie","tag-virus","tag-viruses"],"_links":{"self":[{"href":"https:\/\/www.microdium.com\/public\/wp-json\/wp\/v2\/posts\/9755","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microdium.com\/public\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microdium.com\/public\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microdium.com\/public\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microdium.com\/public\/wp-json\/wp\/v2\/comments?post=9755"}],"version-history":[{"count":0,"href":"https:\/\/www.microdium.com\/public\/wp-json\/wp\/v2\/posts\/9755\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microdium.com\/public\/wp-json\/wp\/v2\/posts\/9756"}],"wp:attachment":[{"href":"https:\/\/www.microdium.com\/public\/wp-json\/wp\/v2\/media?parent=9755"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.microdium.com\/public\/wp-json\/wp\/v2\/categories?post=9755"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microdium.com\/public\/wp-json\/wp\/v2\/tags?post=9755"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}