2026 Best Software Awards are here!See the list

Best Enterprise Network Sandboxing Software

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Products classified in the overall Network Sandboxing category are similar in many regards and help companies of all sizes solve their business problems. However, enterprise business features, pricing, setup, and installation differ from businesses of other sizes, which is why we match buyers to the right Enterprise Business Network Sandboxing to fit their needs. Compare product ratings based on reviews from enterprise users or connect with one of G2's buying advisors to find the right solutions within the Enterprise Business Network Sandboxing category.

In addition to qualifying for inclusion in the Network Sandboxing Software category, to qualify for inclusion in the Enterprise Business Network Sandboxing Software category, a product must have at least 10 reviews left by a reviewer from an enterprise business.

Show More
Show Less

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

1 filter applied
Clear All

3 Listings in Enterprise Network Sandboxing Software Available

(172)4.4 out of 5
1st Easiest To Use in Network Sandboxing software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Zscaler Internet Access™ (ZIA) is the world’s leading cloud-native secure access solution that protects users, devices, and data by securing all internet traffic, regardless of location. Leveragin

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 49% Enterprise
    • 27% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Zscaler Internet Access is a cloud-based security solution that allows users to safely access the internet from anywhere without needing a VPN, providing threat protection by blocking malware, ransomware, phishing attempts, and malicious websites in real time.
    • Users like the product's cloud-native security approach, its strong protection against threats, good performance, centralized management, and the ability to enforce consistent security policies across all users and devices.
    • Users reported that the initial setup and policy configuration can be complex, especially for new users, and occasional latency may be noticed when traffic is routed through the cloud, and licensing and pricing can be expensive for smaller organizations.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Zscaler Internet Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Internet Security
    40
    Security
    40
    Protection
    33
    Ease of Use
    23
    Email Security
    22
    Cons
    Slow Performance
    22
    Complex Implementation
    19
    Connection Issues
    19
    Complex Configuration
    16
    Internet Connectivity
    16
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Zscaler Internet Access features and usability ratings that predict user satisfaction
    8.6
    Malware Probability Scores
    Average: 9.0
    8.9
    Has the product been a good partner in doing business?
    Average: 8.8
    9.0
    Malware Evaluation
    Average: 9.3
    8.9
    Sandbox
    Average: 9.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Zscaler
    Company Website
    Year Founded
    2008
    HQ Location
    San Jose, California
    Twitter
    @zscaler
    17,250 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    9,540 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Zscaler Internet Access™ (ZIA) is the world’s leading cloud-native secure access solution that protects users, devices, and data by securing all internet traffic, regardless of location. Leveragin

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 49% Enterprise
  • 27% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Zscaler Internet Access is a cloud-based security solution that allows users to safely access the internet from anywhere without needing a VPN, providing threat protection by blocking malware, ransomware, phishing attempts, and malicious websites in real time.
  • Users like the product's cloud-native security approach, its strong protection against threats, good performance, centralized management, and the ability to enforce consistent security policies across all users and devices.
  • Users reported that the initial setup and policy configuration can be complex, especially for new users, and occasional latency may be noticed when traffic is routed through the cloud, and licensing and pricing can be expensive for smaller organizations.
Zscaler Internet Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Internet Security
40
Security
40
Protection
33
Ease of Use
23
Email Security
22
Cons
Slow Performance
22
Complex Implementation
19
Connection Issues
19
Complex Configuration
16
Internet Connectivity
16
Zscaler Internet Access features and usability ratings that predict user satisfaction
8.6
Malware Probability Scores
Average: 9.0
8.9
Has the product been a good partner in doing business?
Average: 8.8
9.0
Malware Evaluation
Average: 9.3
8.9
Sandbox
Average: 9.3
Seller Details
Seller
Zscaler
Company Website
Year Founded
2008
HQ Location
San Jose, California
Twitter
@zscaler
17,250 Twitter followers
LinkedIn® Page
www.linkedin.com
9,540 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Proofpoint Targeted Attack Protection (TAP) helps organizations efficiently detect, mitigate and respond to known and unknown advanced threats that target people and VIPs through email. TAP provides u

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 71% Enterprise
    • 24% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Proofpoint Targeted Attack Protection For Email features and usability ratings that predict user satisfaction
    8.7
    Malware Probability Scores
    Average: 9.0
    9.0
    Has the product been a good partner in doing business?
    Average: 8.8
    9.1
    Malware Evaluation
    Average: 9.3
    8.6
    Sandbox
    Average: 9.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Sunnyvale, CA
    Twitter
    @proofpoint
    31,080 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,020 employees on LinkedIn®
    Ownership
    NASDAQ: PFPT
Product Description
How are these determined?Information
This description is provided by the seller.

Proofpoint Targeted Attack Protection (TAP) helps organizations efficiently detect, mitigate and respond to known and unknown advanced threats that target people and VIPs through email. TAP provides u

Users
No information available
Industries
No information available
Market Segment
  • 71% Enterprise
  • 24% Mid-Market
Proofpoint Targeted Attack Protection For Email features and usability ratings that predict user satisfaction
8.7
Malware Probability Scores
Average: 9.0
9.0
Has the product been a good partner in doing business?
Average: 8.8
9.1
Malware Evaluation
Average: 9.3
8.6
Sandbox
Average: 9.3
Seller Details
Year Founded
2002
HQ Location
Sunnyvale, CA
Twitter
@proofpoint
31,080 Twitter followers
LinkedIn® Page
www.linkedin.com
5,020 employees on LinkedIn®
Ownership
NASDAQ: PFPT
G2 Advertising
Sponsored
G2 Advertising
Get 2x conversion than Google Ads with G2 Advertising!
G2 Advertising places your product in premium positions on high-traffic pages and on targeted competitor pages to reach buyers at key comparison moments.
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all netwo

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 41% Mid-Market
    • 33% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Check Point Infinity Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Centralized Management
    12
    Security
    11
    Easy Management
    10
    Features
    9
    Ease of Use
    8
    Cons
    Learning Curve
    10
    Complexity
    6
    Delays
    4
    Difficult Configuration
    4
    Expensive
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point Infinity Platform features and usability ratings that predict user satisfaction
    8.7
    Malware Probability Scores
    Average: 9.0
    8.8
    Has the product been a good partner in doing business?
    Average: 8.8
    9.2
    Malware Evaluation
    Average: 9.3
    8.8
    Sandbox
    Average: 9.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    70,930 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8,356 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all netwo

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 41% Mid-Market
  • 33% Small-Business
Check Point Infinity Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Centralized Management
12
Security
11
Easy Management
10
Features
9
Ease of Use
8
Cons
Learning Curve
10
Complexity
6
Delays
4
Difficult Configuration
4
Expensive
4
Check Point Infinity Platform features and usability ratings that predict user satisfaction
8.7
Malware Probability Scores
Average: 9.0
8.8
Has the product been a good partner in doing business?
Average: 8.8
9.2
Malware Evaluation
Average: 9.3
8.8
Sandbox
Average: 9.3
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
70,930 Twitter followers
LinkedIn® Page
www.linkedin.com
8,356 employees on LinkedIn®
Ownership
NASDAQ:CHKP