{"id":8551,"date":"2024-08-08T08:37:42","date_gmt":"2024-08-08T08:37:42","guid":{"rendered":"\/cybersecurity-blog\/?p=8551"},"modified":"2024-08-08T08:37:42","modified_gmt":"2024-08-08T08:37:42","slug":"g2-titles-2024","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/g2-titles-2024\/","title":{"rendered":"ANY.RUN Recognized as a Leader in Multiple G2 Categories for 2024"},"content":{"rendered":"\n<p>We\u2019re excited to share that <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=g2_titles&amp;utm_term=080824&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a> has been honored with multiple recognitions from <a href=\"https:\/\/www.g2.com\/products\/any-run\/reviews\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">G2<\/a>, the world&#8217;s leading business software and services review platform! \u00a0<\/p>\n\n\n\n<p>As always, we\u2019re committed to providing top-tier malware analysis and system security solutions to all our customers, which is reflected in these titles ANY.RUN received on G2:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Momentum Leader<\/strong> in Malware Analysis Tools&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Leader in both <strong>Malware Analysis Tools <\/strong>and <strong>System Security<\/strong>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Users Love Us <\/strong>badge&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Here\u2019s what each title means:&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/08\/image-2.png\" alt=\"\" class=\"wp-image-8552\" width=\"193\" height=\"250\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/08\/image-2.png 770w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/08\/image-2-231x300.png 231w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/08\/image-2-768x997.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/08\/image-2-370x481.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/08\/image-2-270x351.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/08\/image-2-740x961.png 740w\" sizes=\"(max-width: 193px) 100vw, 193px\" \/><\/figure><\/div>\n\n\n<h2 class=\"wp-block-heading\">Momentum Leader in Malware Analysis Tools&nbsp;<\/h2>\n\n\n\n<p>Being named a Momentum Leader puts us in the top 25% of products in the Malware Analysis Tools category.<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\n14 days to try all PRO features of <span class=\"highlight\">ANY.RUN sandbox<\/span>&nbsp;\n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/any.run\/demo\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=g2_titles&#038;utm_term=080824&#038;utm_content=linktodemo\" rel=\"noopener\" target=\"_blank\">\nGet FREE trial\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<p>This title shows we&#8217;re growing quickly and making a big impact in the industry, as G2 assigns this title based on satisfaction scores and market presence.\u00a0<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/08\/image2-3.png\" alt=\"\" class=\"wp-image-8553\" width=\"193\" height=\"250\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/08\/image2-3.png 770w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/08\/image2-3-231x300.png 231w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/08\/image2-3-768x997.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/08\/image2-3-370x481.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/08\/image2-3-270x351.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/08\/image2-3-740x961.png 740w\" sizes=\"(max-width: 193px) 100vw, 193px\" \/><\/figure><\/div>\n\n\n<h2 class=\"wp-block-heading\">Leader in Malware Analysis Tools and System Security&nbsp;<\/h2>\n\n\n\n<p>ANY.RUN is recognized as a Leader in two categories: <strong>Malware Analysis Tools <\/strong>and <strong>System Security<\/strong>. This shows our platform&#8217;s &nbsp;holistic approach to cybersecurity \u2014 it can help you with both specific malware analysis needs and broader system security concerns. &nbsp;<\/p>\n\n\n\n<p>Products in the Leader quadrant are rated highly by G2 users and have substantial Satisfaction and Market Presence scores. \u00a0<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/08\/image3.png\" alt=\"\" class=\"wp-image-8554\" width=\"192\" height=\"250\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/08\/image3.png 769w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/08\/image3-231x300.png 231w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/08\/image3-370x481.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/08\/image3-270x351.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/08\/image3-740x962.png 740w\" sizes=\"(max-width: 192px) 100vw, 192px\" \/><\/figure><\/div>\n\n\n<h2 class=\"wp-block-heading\">Users Love Us&nbsp;<\/h2>\n\n\n\n<p>G2 has awarded us the <strong>Users Love Us<\/strong> badge after we received over 20 reviews with an average rating of 4.0 stars or higher. We&#8217;re very grateful for your positive feedback and appreciation!&nbsp;<\/p>\n\n\n\n<p>But we&#8217;re not stopping here &#8211; we remain committed to improving our existing products and pushing the boundaries of cloud malware analysis with new, innovative solutions. Exciting releases are coming soon!&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Our Users Say&nbsp;<\/h2>\n\n\n\n<p>Your feedback is extremely valuable to us \u2014 it helps us stay focused on your needs and move the products in the right direction. Here&#8217;s what some of our users have to say on G2:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>ANY.RUN is great for quick analysis of the files, emails, links, etc. What makes ANY.RUN better than the others is that you can interact with the sandbox client while analyzing potential threats. It highlights all potential threats and attack vectors and really helps to quickly understand whether there is a potential threat or not. Also, it provides great reporting. I would recommend it to everyone.<\/p>\n<cite><strong>Milo\u0161 K<\/strong>., CISO.\u00a0<\/cite><\/blockquote>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>I was using the any.run for a while now and I can tell that it is one of the best interactive online sandbox available in the market today. The analysis results are much better and deeper compared to other tools.<\/p>\n<cite><strong>Abin B<\/strong>., Lead Analyst.\u00a0<\/cite><\/blockquote>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>When considering competitive sandboxes, none of them can boast of a better system for tracking malicious activity. Also worth noting is the incredible list YARA rules. I think there are no downsides to it, it\u2019s an ideal service.<\/p>\n<cite><strong>John S<\/strong>., Malware Reverser.\u00a0<\/cite><\/blockquote>\n\n\n\n<h2 class=\"wp-block-heading\">What Makes ANY.RUN Stand Out\u00a0<\/h2>\n\n\n\n<p>In today&#8217;s landscape of constant cyber threats, robust and reliable tools are essential. Here&#8217;s what makes ANY.RUN unique:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Real-time, <a href=\"https:\/\/any.run\/cybersecurity-blog\/interactive-vs-automated-sandbox\/\" target=\"_blank\" rel=\"noreferrer noopener\">interactive malware analysis<\/a>.\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Comprehensive system security features.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-in-a-sandbox\/\" target=\"_blank\" rel=\"noreferrer noopener\">User-friendly interface<\/a> for both novice and experienced analysts.\u00a0<\/li>\n<\/ul>\n\n\n\n<p>We&#8217;re thrilled about these G2 recognitions, but we&#8217;re not slowing down. We\u2019re committed to innovation, and we\u2019re going to enhance our platform and stay ahead of the evolving threats.&nbsp;<\/p>\n\n\n\n<p>To our current users \u2014 a huge thank you for your trust and valuable feedback.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">About ANY.RUN&nbsp;&nbsp;<\/h2>\n\n\n\n<p>ANY.RUN helps more than 400,000 cybersecurity professionals worldwide. Our <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=g2_titles&amp;utm_term=080824&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">interactive sandbox<\/a> simplifies malware analysis of threats that target both Windows and <a href=\"https:\/\/any.run\/cybersecurity-blog\/linux-malware-analysis-cases\/\" target=\"_blank\" rel=\"noreferrer noopener\">Linux<\/a> systems. Our threat intelligence products, <a href=\"https:\/\/any.run\/cybersecurity-blog\/introducing-any-run-threat-intelligence-lookup\/\" target=\"_blank\" rel=\"noreferrer noopener\">TI Lookup<\/a>, <a href=\"https:\/\/any.run\/cybersecurity-blog\/yara-search\/\" target=\"_blank\" rel=\"noreferrer noopener\">Yara Search<\/a> and <a href=\"https:\/\/any.run\/cybersecurity-blog\/ti-feeds-integration\/\" target=\"_blank\" rel=\"noreferrer noopener\">Feeds<\/a>, help you find <a href=\"https:\/\/any.run\/cybersecurity-blog\/indicators-of-compromise\/\" target=\"_blank\" rel=\"noreferrer noopener\">IOCs<\/a> or files to learn more about the threats and respond to incidents faster.\u00a0\u00a0<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>With ANY.RUN you can:<\/strong>&nbsp;<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Detect malware in seconds.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Interact with samples in real time.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Save time and money on sandbox setup and maintenance&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Record and study all aspects of malware behavior.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Collaborate with your team&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Scale as you need.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p><a href=\"https:\/\/any.run\/demo\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=g2_titles&amp;utm_term=080824&amp;utm_content=linktodemo\" target=\"_blank\" rel=\"noreferrer noopener\">Try all features of ANY.RUN for FREE to see how it can benefit your team\u00a0\u2192<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We\u2019re excited to share that ANY.RUN has been honored with multiple recognitions from G2, the world&#8217;s leading business software and services review platform! \u00a0 As always, we\u2019re committed to providing top-tier malware analysis and system security solutions to all our customers, which is reflected in these titles ANY.RUN received on G2:&nbsp; Here\u2019s what each title [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":8557,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[57,10,34,56],"class_list":["post-8551","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-anyrun","tag-cybersecurity","tag-malware-analysis","tag-update"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>ANY.RUN Recognized as Leader in Multiple G2 Categories in 2024<\/title>\n<meta name=\"description\" content=\"See all ANY.RUN&#039;s recognitions from G2 for providing top-tier malware analysis and system security solutions to our customers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/g2-titles-2024\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/g2-titles-2024\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/g2-titles-2024\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"ANY.RUN Recognized as a Leader in Multiple G2 Categories for 2024\",\"datePublished\":\"2024-08-08T08:37:42+00:00\",\"dateModified\":\"2024-08-08T08:37:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/g2-titles-2024\/\"},\"wordCount\":712,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"cybersecurity\",\"malware analysis\",\"update\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/g2-titles-2024\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/g2-titles-2024\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/g2-titles-2024\/\",\"name\":\"ANY.RUN Recognized as Leader in Multiple G2 Categories in 2024\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2024-08-08T08:37:42+00:00\",\"dateModified\":\"2024-08-08T08:37:42+00:00\",\"description\":\"See all ANY.RUN's recognitions from G2 for providing top-tier malware analysis and system security solutions to our customers.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/g2-titles-2024\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/g2-titles-2024\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/g2-titles-2024\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"News\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/news\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"ANY.RUN Recognized as a Leader in Multiple G2 Categories for 2024\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ANY.RUN Recognized as Leader in Multiple G2 Categories in 2024","description":"See all ANY.RUN's recognitions from G2 for providing top-tier malware analysis and system security solutions to our customers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/g2-titles-2024\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/g2-titles-2024\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/g2-titles-2024\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"ANY.RUN Recognized as a Leader in Multiple G2 Categories for 2024","datePublished":"2024-08-08T08:37:42+00:00","dateModified":"2024-08-08T08:37:42+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/g2-titles-2024\/"},"wordCount":712,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","cybersecurity","malware analysis","update"],"articleSection":["News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/g2-titles-2024\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/g2-titles-2024\/","url":"https:\/\/any.run\/cybersecurity-blog\/g2-titles-2024\/","name":"ANY.RUN Recognized as Leader in Multiple G2 Categories in 2024","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2024-08-08T08:37:42+00:00","dateModified":"2024-08-08T08:37:42+00:00","description":"See all ANY.RUN's recognitions from G2 for providing top-tier malware analysis and system security solutions to our customers.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/g2-titles-2024\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/g2-titles-2024\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/g2-titles-2024\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"News","item":"https:\/\/any.run\/cybersecurity-blog\/category\/news\/"},{"@type":"ListItem","position":3,"name":"ANY.RUN Recognized as a Leader in Multiple G2 Categories for 2024"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/8551"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=8551"}],"version-history":[{"count":4,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/8551\/revisions"}],"predecessor-version":[{"id":8561,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/8551\/revisions\/8561"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/8557"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=8551"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=8551"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=8551"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}