About UsBlog

Sandbox

Sandbox

In computer security, a "sandbox" is a security mechanism for separating running programs, usually in an effort to mitigate system failures or software vulnerabilities from spreading. It is often used to execute untested or untrusted programs or code, possibly from unverified or untrusted third parties, suppliers, users or websites, without risking harm to the host machine or operating system. A sandbox typically provides a tightly controlled set of resources for guest programs to run in, such as scratch space on disk and memory. Network access, the ability to inspect the host system or read from input devices are usually disallowed or heavily restricted.

In the sense of providing a highly controlled environment, sandboxes may be seen as a specific example of virtualization. Sandboxing is frequently used to test unverified programs that may contain a virus or other malicious code, without allowing the software to harm the host device.

The most popular products in category Sandbox All category products

Fortinet FortiSandbox
14
4
Check Point SandBlast
3
12
Palo Alto Networks WildFire
0
9
McAfee Advanced Threat Defense
1
2
Cisco Advanced Malware Protection (Cisco AMP for Endpoints)
1
2
Forcepoint Advanced Malware Detection
15
2
Trend Micro Deep Discovery Analyzer
12
5
Blue Coat Systems Advanced Threat Protection
20
15
FireEye Malware Analysis (AX)
0
19
Proofpoint Targeted Attack Protection
2
7
Zscaler Cloud Sandbox
17
11
Digital Guardian Advanced Threat Protection
9
16

Compare of products in the category Sandbox

Please turn the screen for optimal content display

Compare: Network Sandboxing

Characteristics

Web traffic scan

Email scan

Endpoint protection

Mobile protection

Malware Detection in files

Encrypted traffic scan

Network shares scan

YARA files scanning

YARA implementation by customer

Malware blocking by protocols

CPU-level detection

OS kernel level detection

Malware Samples

Zero-day threats protection

Detecting C&C server

Hardware Applience

Working in in-band/out-of-band modes

Cloud

Threat Intelligence Feeds

SIEM Integration

Vulnerability manager

Uploading "Golden Image"

Using Multiple OSes

Multiple Versions of Sandbox App

Payload detonation

Auto-uploading files

URL analysis

Analyst console

Security Reports

Alerts via Email

Central Policy Management for Data Protection

Forensic analysis of data history

Automated remediation capabilities

Auto Update of Signatures

Trial

N/A
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes (must be integrated with FortiMail for threats blocking)
N/A
Yes
N/A
Yes
N/A
N/A
N/A
N/A
Yes
N/A
N/A
N/A
Yes
N/A
Yes (with FortiGate and FortiWeb integrations)
N/A
N/A
Yes
N/A
Yes (using a third-party solutions)
Yes
  • N/A
  • Periodic reports
  • Contextual reports on threats
  • Periodic reports
  • Contextual reports on threats
  • Periodic reports
  • Contextual reports on threats
  • Periodic reports
  • Contextual reports on threats
  • N/A
  • Periodic reports
  • Contextual reports on threats
  • N/A
  • Periodic reports
  • Contextual reports on threats
  • Periodic reports
  • Contextual reports on threats
  • Periodic reports
  • Contextual reports on threats
  • Periodic reports
  • Contextual reports on threats
  • N/A
  • Periodic reports
  • Contextual reports on threats
  • Periodic reports
  • Contextual reports on threats
N/A
Yes
Yes
Yes
Yes
Yes
Yes
Yes
N/A
Yes
Yes
Yes
Yes (30 days)
N/A
Yes
Found mistake? Write us.