Help the communities most affected by the California wildfires in only a few minutes. We'll donate $10 for every review you submit.

Best Network Sandboxing Software

Network sandboxing software provides a safe space for suspicious network traffic or objects can be evaluated against a database of known threats and assigned a malware probability score.

To qualify for inclusion in the Network Sandboxing category, a product must:

  • Provide an isolated space for threats to be evaluated
  • Maintain a library of known threats and assigned malware scores
  • Automatically submit suspicious objects to the sandbox for evaluation
Compare Network Sandboxing Software
Results: 15
    G2 Crowd takes pride in showing unbiased ratings on user satisfaction. G2 Crowd does not allow for paid placement in any of our ratings.
    Sort By:

    McAfee Advanced Threat Defense enhances protection from network edge to endpoint and enables investigation

    McAfee Network Security Platform is a next-generation intrusion prevention system (IPS) that redefines how organizations block advanced threats.

    Zscaler is a cloud-based web security software that inspects every byte of data, including SSL, for protection against hidden malware, botnets, and advanced threats.

    Forcepoint Advanced Malware Detection technology is unmatched in security efficacy. Even highly evasive threats are revealed through Deep Content Inspection of activity at multiple levels, dormant code, and other indicators often overlooked by traditional sandbox security technologies.

    A complete advanced threat protection solution that delivers fast, truly comprehensive endpoint and network protection against known and unknown malware, zero-day exploits, and targeted attacks

    Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyberattacks as well as future cyber threats across all networks, endpoint, cloud and mobile. The architecture is designed to resolve the complexities of growing connectiviity and inefficient security

    Cyphort's Anti-SIEM helps your security teams regain visibility and control, accelerate incident response, and ensure a stronger security posture for your organization. The bottom line: The Anti-SIEM saves your business time and money.

    Trend Micro Deep Discovery enables you to detect, analyze, and respond to today's stealthy ransomware, and targeted attacks in real time. Deep Discovery provides proven ransomware and advanced threat protection that interoperates and integrates with your security infrastructure. So you have a comprehensive defense tailored to protect your organization against targeted attacks, advanced threats, and ransomware.

    Malware Analysis (AX series) products provide a secure environment to test, replay, characterize, and document advanced malicious activities. Malware Analysis shows the cyber attack lifecycle, from the initial exploit and malware execution path to callback destinations and follow-on binary download attempts.

    The FortiGuard team develops effective countermeasures to protect more than 320,000 Fortinet customers around the world. These countermeasures include up-to-the-minute threat intelligence, delivered as a subscription service for Fortinet security products

    Fortinet’s top-rated FortiSandbox provides the on-site intelligence that enables the Fortinet Security Fabric to address the fast moving and more targeted threats across a broad attack surface. Specifically, it delivers real-time intelligence through the automated detection and response to previously unknown malware. Broad Coverage of the Attack Surface with Security Fabric – applies advanced inspection across the top attack vectors of network, email, web infrastructure and even individual endpoints Automated Zero-day, Detection and Mitigation - Native integration and open APIs enable the exchange of objects from, and return of intelligence to, Fortinet and third-party vendor products for immediate threat response Certified and Top Rated - Constantly undergoes rigorous, real-world independent testing and consistently earns top marks such as ICSA ATD Certification and NSS Labs Recommendation for Breach Detection and Prevention.

    Check Point IPS (Intrusion Prevention System) combines industry-leading IPS protection with breakthrough performance at a lower cost than traditional, stand-alone IPS software solutions. IPS delivers complete and proactive intrusion prevention, all with the deployment and management advantages of a unified and extensible Next Generation Firewall solution.

    Protect your email, web, or network traffic from malicious content engineered to evade your existing security controls. You can deploy Lastline Enterprise anywhere you need to improve your protection against advanced malware entering your network:

    Proofpoint Targeted Attack Protection (TAP) helps organizations efficiently detect, mitigate and respond to known and unknown advanced threats that target people and VIPs through email. TAP provides unparalleled effectiveness in stopping targeted attacks that use polymorphic malware, weaponized documents and credential-stealing phishing techniques to obtain sensitive information. TAP seamlessly integrates with the Proofpoint secure email gateway (Proofpoint Email Protection) to deliver best-in-class email security in a way that is cost effective and easy to use. TAP leverages the cloud to scale deployment, adapt analysis and protect people on any network or device. With Proofpoint Targeted Attack Protection (TAP), you can: • Provide sophisticated analysis to prevent threats from getting to a user's inbox. • Detect known and unknown threats using adaptable analysis capabilities. • Provide security teams detailed analysis and visibility about threats and threat campaigns. • Provide visibility into threats targeting the Very Attacked People (VAP) in an organization.

    Proofpoint Targeted Attack Protection SaaS Defense safeguards your organization against hidden threats in cloud-based file-storage apps.