Best Network Sandboxing Software

Network sandboxing software provides a safe space for suspicious network traffic or objects can be evaluated against a database of known threats and assigned a malware probability score.

To qualify for inclusion in the Network Sandboxing category, a product must:

  • Provide an isolated space for threats to be evaluated
  • Maintain a library of known threats and assigned malware scores
  • Automatically submit suspicious objects to the sandbox for evaluation
Star Rating

Network Sandboxing reviews by real, verified users. Find unbiased ratings on user satisfaction, features, and price based on the most reviews available anywhere.

Compare Network Sandboxing Software

Results: 16
G2 takes pride in showing unbiased ratings on user satisfaction. G2 does not allow for paid placement in any of our ratings.
Results: 16
Filter Results
Filter by:
Sort by
Star Rating
Sort By:

    Proofpoint Targeted Attack Protection (TAP) helps organizations efficiently detect, mitigate and respond to known and unknown advanced threats that target people and VIPs through email. TAP provides unparalleled effectiveness in stopping targeted attacks that use polymorphic malware, weaponized documents and credential-stealing phishing techniques to obtain sensitive information. TAP seamlessly integrates with the Proofpoint secure email gateway (Proofpoint Email Protection) to deliver best-in-class email security in a way that is cost effective and easy to use. TAP leverages the cloud to scale deployment, adapt analysis and protect people on any network or device. With Proofpoint Targeted Attack Protection (TAP), you can: • Provide sophisticated analysis to prevent threats from getting to a user's inbox. • Detect known and unknown threats using adaptable analysis capabilities. • Provide security teams detailed analysis and visibility about threats and threat campaigns. • Provide visibility into threats targeting the Very Attacked People (VAP) in an organization.

    McAfee Advanced Threat Defense enhances protection from network edge to endpoint and enables investigation

    Fortinet’s top-rated FortiSandbox provides the on-site intelligence that enables the Fortinet Security Fabric to address the fast moving and more targeted threats across a broad attack surface. Specifically, it delivers real-time intelligence through the automated detection and response to previously unknown malware. Broad Coverage of the Attack Surface with Security Fabric – applies advanced inspection across the top attack vectors of network, email, web infrastructure and even individual endpoints Automated Zero-day, Detection and Mitigation - Native integration and open APIs enable the exchange of objects from, and return of intelligence to, Fortinet and third-party vendor products for immediate threat response Certified and Top Rated - Constantly undergoes rigorous, real-world independent testing and consistently earns top marks such as ICSA ATD Certification and NSS Labs Recommendation for Breach Detection and Prevention.

    McAfee Network Security Platform is a next-generation intrusion prevention system (IPS) that redefines how organizations block advanced threats.

    The FortiGuard team develops effective countermeasures to protect more than 320,000 Fortinet customers around the world. These countermeasures include up-to-the-minute threat intelligence, delivered as a subscription service for Fortinet security products

    Zscaler Internet Access delivers the complete security stack as a service from the cloud.

    Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyberattacks as well as future cyber threats across all networks, endpoint, cloud and mobile. The architecture is designed to resolve the complexities of growing connectiviity and inefficient security

    Check Point IPS (Intrusion Prevention System) combines industry-leading IPS protection with breakthrough performance at a lower cost than traditional, stand-alone IPS software solutions. IPS delivers complete and proactive intrusion prevention, all with the deployment and management advantages of a unified and extensible Next Generation Firewall solution.

    Falcon Sandbox performs deep analysis of evasive and unknown threats, enriches the results with threat intelligence and delivers actionable indicators of compromise (IOCs), enabling your security team to better understand sophisticated malware attacks and strengthen their defenses.

    A complete advanced threat protection solution that delivers fast, truly comprehensive endpoint and network protection against known and unknown malware, zero-day exploits, and targeted attacks

    Cyphort's Anti-SIEM helps your security teams regain visibility and control, accelerate incident response, and ensure a stronger security posture for your organization. The bottom line: The Anti-SIEM saves your business time and money.

    Trend Micro Deep Discovery enables you to detect, analyze, and respond to today's stealthy ransomware, and targeted attacks in real time. Deep Discovery provides proven ransomware and advanced threat protection that interoperates and integrates with your security infrastructure. So you have a comprehensive defense tailored to protect your organization against targeted attacks, advanced threats, and ransomware.

    Cloud Sandbox delivers a unique, advanced threat detection platform that can emulate the execution environment and analyze all activities related to malicious files, identify advanced threats and collaborate with existing solutions to provide rapid remediation.

    Protect your email, web, or network traffic from malicious content engineered to evade your existing security controls. You can deploy Lastline Enterprise anywhere you need to improve your protection against advanced malware entering your network:

    Proofpoint Targeted Attack Protection SaaS Defense safeguards your organization against hidden threats in cloud-based file-storage apps.

    SandBlast Threat Emulation is a CPU-level threat detection software that prohibits network's infections from malware and targeted attacks.