Introducing G2.ai, the future of software buying.Try now

Best Enterprise Network Sandboxing Software

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Products classified in the overall Network Sandboxing category are similar in many regards and help companies of all sizes solve their business problems. However, enterprise business features, pricing, setup, and installation differ from businesses of other sizes, which is why we match buyers to the right Enterprise Business Network Sandboxing to fit their needs. Compare product ratings based on reviews from enterprise users or connect with one of G2's buying advisors to find the right solutions within the Enterprise Business Network Sandboxing category.

In addition to qualifying for inclusion in the Network Sandboxing Software category, to qualify for inclusion in the Enterprise Business Network Sandboxing Software category, a product must have at least 10 reviews left by a reviewer from an enterprise business.

Show More
Show Less

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

Coming Soon
Get Trending Network Sandboxing Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
1 filter applied
Clear All

3 Listings in Enterprise Network Sandboxing Software Available

(163)4.4 out of 5
2nd Easiest To Use in Network Sandboxing software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Zscaler Internet Access™ (ZIA) is the world’s leading cloud-native secure access solution that protects users, devices, and data by securing all internet traffic, regardless of location. Leveragin

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 51% Enterprise
    • 26% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Zscaler Internet Access is a cloud-based security tool that aims to secure and control internet traffic, eliminating security risks from web and cloud traffic.
    • Reviewers like the consistent performance, cloud-native security, and the robust security features of Zscaler Internet Access, which provide a seamless internet access experience and enhance their day-to-day internet activities.
    • Reviewers experienced slow performance and delays in internet access when starting their computers or waking them from sleep mode, and found the initial setup process not straightforward, which disrupts their workflow.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Zscaler Internet Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    35
    Internet Security
    33
    Protection
    29
    Ease of Use
    20
    Email Security
    19
    Cons
    Slow Performance
    20
    Connection Issues
    19
    Internet Connectivity
    16
    Complex Implementation
    15
    Complex Configuration
    14
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Zscaler Internet Access features and usability ratings that predict user satisfaction
    8.6
    Malware Probability Scores
    Average: 9.0
    8.9
    Has the product been a good partner in doing business?
    Average: 8.8
    9.0
    Malware Evaluation
    Average: 9.3
    8.8
    Sandbox
    Average: 9.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Zscaler
    Company Website
    Year Founded
    2008
    HQ Location
    San Jose, California
    Twitter
    @zscaler
    17,121 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    9,410 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Zscaler Internet Access™ (ZIA) is the world’s leading cloud-native secure access solution that protects users, devices, and data by securing all internet traffic, regardless of location. Leveragin

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 51% Enterprise
  • 26% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Zscaler Internet Access is a cloud-based security tool that aims to secure and control internet traffic, eliminating security risks from web and cloud traffic.
  • Reviewers like the consistent performance, cloud-native security, and the robust security features of Zscaler Internet Access, which provide a seamless internet access experience and enhance their day-to-day internet activities.
  • Reviewers experienced slow performance and delays in internet access when starting their computers or waking them from sleep mode, and found the initial setup process not straightforward, which disrupts their workflow.
Zscaler Internet Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
35
Internet Security
33
Protection
29
Ease of Use
20
Email Security
19
Cons
Slow Performance
20
Connection Issues
19
Internet Connectivity
16
Complex Implementation
15
Complex Configuration
14
Zscaler Internet Access features and usability ratings that predict user satisfaction
8.6
Malware Probability Scores
Average: 9.0
8.9
Has the product been a good partner in doing business?
Average: 8.8
9.0
Malware Evaluation
Average: 9.3
8.8
Sandbox
Average: 9.3
Seller Details
Seller
Zscaler
Company Website
Year Founded
2008
HQ Location
San Jose, California
Twitter
@zscaler
17,121 Twitter followers
LinkedIn® Page
www.linkedin.com
9,410 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Proofpoint Targeted Attack Protection (TAP) helps organizations efficiently detect, mitigate and respond to known and unknown advanced threats that target people and VIPs through email. TAP provides u

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 71% Enterprise
    • 24% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Proofpoint Targeted Attack Protection For Email features and usability ratings that predict user satisfaction
    8.7
    Malware Probability Scores
    Average: 9.0
    9.0
    Has the product been a good partner in doing business?
    Average: 8.8
    9.1
    Malware Evaluation
    Average: 9.3
    8.6
    Sandbox
    Average: 9.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Sunnyvale, CA
    Twitter
    @proofpoint
    31,075 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,801 employees on LinkedIn®
    Ownership
    NASDAQ: PFPT
Product Description
How are these determined?Information
This description is provided by the seller.

Proofpoint Targeted Attack Protection (TAP) helps organizations efficiently detect, mitigate and respond to known and unknown advanced threats that target people and VIPs through email. TAP provides u

Users
No information available
Industries
No information available
Market Segment
  • 71% Enterprise
  • 24% Mid-Market
Proofpoint Targeted Attack Protection For Email features and usability ratings that predict user satisfaction
8.7
Malware Probability Scores
Average: 9.0
9.0
Has the product been a good partner in doing business?
Average: 8.8
9.1
Malware Evaluation
Average: 9.3
8.6
Sandbox
Average: 9.3
Seller Details
Year Founded
2002
HQ Location
Sunnyvale, CA
Twitter
@proofpoint
31,075 Twitter followers
LinkedIn® Page
www.linkedin.com
4,801 employees on LinkedIn®
Ownership
NASDAQ: PFPT

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all netwo

    Users
    • Network & Security Engineer
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 39% Mid-Market
    • 31% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Check Point Infinity Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Centralized Management
    12
    Security
    11
    Easy Management
    10
    Features
    9
    Ease of Use
    8
    Cons
    Learning Curve
    10
    Complexity
    6
    Delays
    4
    Difficult Configuration
    4
    Expensive
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point Infinity Platform features and usability ratings that predict user satisfaction
    8.7
    Malware Probability Scores
    Average: 9.0
    8.8
    Has the product been a good partner in doing business?
    Average: 8.8
    9.2
    Malware Evaluation
    Average: 9.3
    8.8
    Sandbox
    Average: 9.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    70,962 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8,323 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all netwo

Users
  • Network & Security Engineer
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 39% Mid-Market
  • 31% Small-Business
Check Point Infinity Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Centralized Management
12
Security
11
Easy Management
10
Features
9
Ease of Use
8
Cons
Learning Curve
10
Complexity
6
Delays
4
Difficult Configuration
4
Expensive
4
Check Point Infinity Platform features and usability ratings that predict user satisfaction
8.7
Malware Probability Scores
Average: 9.0
8.8
Has the product been a good partner in doing business?
Average: 8.8
9.2
Malware Evaluation
Average: 9.3
8.8
Sandbox
Average: 9.3
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
70,962 Twitter followers
LinkedIn® Page
www.linkedin.com
8,323 employees on LinkedIn®
Ownership
NASDAQ:CHKP