# Best Network Sandboxing Software

  *By [Brandon Summers-Miller](https://research.g2.com/insights/author/brandon-summers-miller)*

   Network sandboxing software provides a safe space for suspicious network traffic or objects can be evaluated against a database of known threats and assigned a malware probability score.

To qualify for inclusion in the Network Sandboxing category, a product must:

- Provide an isolated space for threats to be evaluated
- Maintain a library of known threats and assigned malware scores
- Automatically submit suspicious objects to the sandbox for evaluation





## Best Network Sandboxing Software At A Glance

- **Leader:** [Zscaler Internet Access](https://www.g2.com/products/zscaler-internet-access/reviews)
- **Highest Performer:** [Kaspersky Next Optimum](https://www.g2.com/products/kaspersky-next-optimum/reviews)
- **Easiest to Use:** [Zscaler Internet Access](https://www.g2.com/products/zscaler-internet-access/reviews)
- **Top Trending:** [Check Point Infinity Platform](https://www.g2.com/products/check-point-infinity-platform/reviews)
- **Best Free Software:** [Kaspersky Next Optimum](https://www.g2.com/products/kaspersky-next-optimum/reviews)


## Top-Rated Products (Ranked by G2 Score)
  ### 1. [Zscaler Internet Access](https://www.g2.com/products/zscaler-internet-access/reviews)
  Zscaler Internet Access™ (ZIA) is the world’s leading cloud-native secure access solution that protects users, devices, and data by securing all internet traffic, regardless of location. Leveraging cloud native, AI-powered cyberthreat protection and zero trust access to the internet and SaaS apps, ZIA ensures fast, direct, and secure connections to the internet and SaaS applications, eliminating the need for traditional on-premises security hardware. With ZIA, you can optimize internet security and user experience while aligning with Zero Trust principles through Zscaler Internet Access. ZIA&#39;s advanced features like Secure Web Gateways, DNS Security, Cloud Access Security Broker (CASB), Data Loss Prevention (DLP), Secure Enterprise Browsing, and Cloud Sandboxing provide comprehensive protection against advanced threats such as malware, ransomware, and phishing while safeguarding sensitive corporate data. It combines robust threat prevention with granular policy enforcement to ensure secure, seamless access for users across remote, branch, or hybrid environments. With ZIA, organizations can embrace cloud transformation while leveraging simplified management, reduced complexity, and consistent security across global teams. Key Features and Benefits: • Prevent cyberthreats and data loss with AI: Protect your organization against advanced threats with a suite of AI-powered cyberthreat and data protection services, enriched by real-time updates sourced from 500 trillion daily threat signals from the world’s largest security cloud. • Get an unmatched user experience: Get the world’s fastest internet and SaaS experience—up to 40% faster than legacy security architectures—to boost productivity and increase business agility. • Reduce costs and complexity: Realize 139% ROI with Zscaler by replacing 90% of your costly, complex, and slow appliances with a fully cloud-native zero trust platform. • Secure your hybrid workforce: Empower employees, customers, and third parties to securely access web apps and cloud services from anywhere, on any device—with a great digital experience. • Unify SecOps and NetOps Efforts: Drive faster, more collaborative security outcomes with shared tooling like real-time traffic insights, API-first integrations, and granular RBAC. • Achieve Total Data and Content Sovereignty: Enforce compliance for secure and localized access without performance tradeoffs using Egress NAT, geolocalized content, and in-country data logging. • Secure AI in Your Environment: Enable the secure use of Microsoft Copilot and other AI applications. • Protect Developer Environments at Scale: Automate SSL/TLS inspection for 30+ developer tools while sandboxing code and unknown or large files with instant AI-verdicts—all without slowing innovation. Zscaler Internet Access is trusted by organizations worldwide to ensure secure, reliable, and fast internet connectivity that supports both modern workflows and digital transformation initiatives.&quot;


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 182

**User Satisfaction Scores:**

- **Malware Probability Scores:** 8.6/10 (Category avg: 9.0/10)
- **Has the product been a good partner in doing business?:** 8.9/10 (Category avg: 8.8/10)
- **Malware Evaluation:** 9.0/10 (Category avg: 9.4/10)
- **Sandbox:** 8.9/10 (Category avg: 9.3/10)


**Seller Details:**

- **Seller:** [Zscaler](https://www.g2.com/sellers/zscaler)
- **Company Website:** https://www.zscaler.com/
- **Year Founded:** 2008
- **HQ Location:** San Jose, California
- **Twitter:** @zscaler (17,464 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/234625/ (9,540 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 47% Enterprise, 29% Mid-Market


#### Pros & Cons

**Pros:**

- Security (48 reviews)
- Internet Security (47 reviews)
- Protection (41 reviews)
- Cloud Services (26 reviews)
- Email Security (26 reviews)

**Cons:**

- Slow Performance (27 reviews)
- Complex Implementation (24 reviews)
- Complex Configuration (22 reviews)
- Connection Issues (22 reviews)
- Internet Connectivity (18 reviews)

  ### 2. [FortiSandbox](https://www.g2.com/products/fortisandbox/reviews)
  Fortinet’s top-rated FortiSandbox provides the on-site intelligence that enables the Fortinet Security Fabric to address the fast moving and more targeted threats across a broad attack surface. Specifically, it delivers real-time intelligence through the automated detection and response to previously unknown malware. Broad Coverage of the Attack Surface with Security Fabric – applies advanced inspection across the top attack vectors of network, email, web infrastructure and even individual endpoints Automated Zero-day, Detection and Mitigation - Native integration and open APIs enable the exchange of objects from, and return of intelligence to, Fortinet and third-party vendor products for immediate threat response Certified and Top Rated - Constantly undergoes rigorous, real-world independent testing and consistently earns top marks such as ICSA ATD Certification and NSS Labs Recommendation for Breach Detection and Prevention.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 22

**User Satisfaction Scores:**

- **Malware Probability Scores:** 8.6/10 (Category avg: 9.0/10)
- **Has the product been a good partner in doing business?:** 8.8/10 (Category avg: 8.8/10)
- **Malware Evaluation:** 9.2/10 (Category avg: 9.4/10)
- **Sandbox:** 9.5/10 (Category avg: 9.3/10)


**Seller Details:**

- **Seller:** [Fortinet](https://www.g2.com/sellers/fortinet)
- **Year Founded:** 2000
- **HQ Location:** Sunnyvale, CA
- **Twitter:** @Fortinet (151,247 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/6460/ (16,112 employees on LinkedIn®)
- **Ownership:** NASDAQ: FTNT

**Reviewer Demographics:**
  - **Top Industries:** Computer &amp; Network Security
  - **Company Size:** 58% Mid-Market, 29% Small-Business


  ### 3. [Proofpoint Targeted Attack Protection For Email](https://www.g2.com/products/proofpoint-targeted-attack-protection-for-email/reviews)
  Proofpoint Targeted Attack Protection (TAP) helps organizations efficiently detect, mitigate and respond to known and unknown advanced threats that target people and VIPs through email. TAP provides unparalleled effectiveness in stopping targeted attacks that use polymorphic malware, weaponized documents and credential-stealing phishing techniques to obtain sensitive information. TAP seamlessly integrates with the Proofpoint secure email gateway (Proofpoint Email Protection) to deliver best-in-class email security in a way that is cost effective and easy to use. TAP leverages the cloud to scale deployment, adapt analysis and protect people on any network or device. With Proofpoint Targeted Attack Protection (TAP), you can: • Provide sophisticated analysis to prevent threats from getting to a user&#39;s inbox. • Detect known and unknown threats using adaptable analysis capabilities. • Provide security teams detailed analysis and visibility about threats and threat campaigns. • Provide visibility into threats targeting the Very Attacked People (VAP) in an organization.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 36

**User Satisfaction Scores:**

- **Malware Probability Scores:** 8.7/10 (Category avg: 9.0/10)
- **Has the product been a good partner in doing business?:** 9.0/10 (Category avg: 8.8/10)
- **Malware Evaluation:** 9.1/10 (Category avg: 9.4/10)
- **Sandbox:** 8.6/10 (Category avg: 9.3/10)


**Seller Details:**

- **Seller:** [Proofpoint](https://www.g2.com/sellers/proofpoint)
- **Year Founded:** 2002
- **HQ Location:** Sunnyvale, CA
- **Twitter:** @proofpoint (31,120 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/proofpoint (5,020 employees on LinkedIn®)
- **Ownership:** NASDAQ: PFPT

**Reviewer Demographics:**
  - **Company Size:** 71% Enterprise, 24% Mid-Market


  ### 4. [Check Point SandBlast Advanced Network Threat Prevention](https://www.g2.com/products/check-point-sandblast-advanced-network-threat-prevention/reviews)
  Check Point SandBlast Advanced Network Threat Prevention is a comprehensive security solution designed to protect organizations from sophisticated cyber threats, including zero-day attacks and advanced malware. By integrating real-time threat intelligence with advanced AI technologies, SandBlast delivers proactive defense mechanisms that prevent unknown cyber threats while maintaining seamless business operations. Key Features and Functionality: - Zero-Day Threat Prevention: Utilizes powerful threat intelligence and AI-based engines to detect and block previously unknown cyber threats before they can infiltrate the network. - Threat Emulation and Extraction: Employs CPU-level inspection and threat emulation to analyze suspicious files in a virtualized environment, identifying and mitigating potential threats without impacting network performance. - Streamlined Security Management: Offers single-click setup with out-of-the-box security policy profiles optimized for various business needs, reducing administrative overhead and ensuring up-to-date protection. - Seamless Productivity: Delivers a prevention-first strategy that does not compromise user experience, allowing uninterrupted business operations even when dealing with suspicious files. Primary Value and User Solutions: SandBlast Advanced Network Threat Prevention addresses the critical need for organizations to defend against evolving cyber threats without disrupting daily operations. By providing real-time threat intelligence, automated response mechanisms, and seamless integration with existing network infrastructure, SandBlast enhances security posture, minimizes security incidents, and ensures robust defense against malware, ransomware, and advanced persistent threats. Its intuitive management and comprehensive threat protection enable security teams to maintain high levels of protection with reduced complexity and administrative effort.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 17

**User Satisfaction Scores:**

- **Malware Probability Scores:** 7.9/10 (Category avg: 9.0/10)
- **Has the product been a good partner in doing business?:** 9.4/10 (Category avg: 8.8/10)
- **Malware Evaluation:** 9.3/10 (Category avg: 9.4/10)
- **Sandbox:** 9.5/10 (Category avg: 9.3/10)


**Seller Details:**

- **Seller:** [Check Point Software Technologies](https://www.g2.com/sellers/check-point-software-technologies)
- **Year Founded:** 1993
- **HQ Location:** Redwood City, CA
- **Twitter:** @CheckPointSW (70,927 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/check-point-software-technologies/ (8,356 employees on LinkedIn®)
- **Ownership:** NASDAQ:CHKP

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 67% Mid-Market, 28% Enterprise


#### Pros & Cons

**Pros:**

- Ease of Use (2 reviews)
- Easy Integrations (2 reviews)
- Features (1 reviews)
- Installation Ease (1 reviews)
- Integrations (1 reviews)

**Cons:**

- Cost (1 reviews)
- Expensive (1 reviews)
- High Resource Usage (1 reviews)
- Incomplete Information (1 reviews)
- Limited Features (1 reviews)

  ### 5. [Kaspersky Next Optimum](https://www.g2.com/products/kaspersky-next-optimum/reviews)
  Kaspersky Next Optimum is the ideal choice for small and mid-sized businesses with lean cybersecurity teams. The offering is uniting in itself with strong endpoint protection, essential detection and response capabilities (EDR), and a seamless upgrade to XDR and MXDR for sophisticated cybersecurity. Layers of Kaspersky Next Optimum: • Kaspersky Next EDR Foundations – Powerful ML-based EPP, flexible security controls and EDR root cause analysis tools equip you with the most straightforward way to build a strong foundation for your cybersecurity. • Kaspersky Next EDR Optimum – Combines strong endpoint protection with enhanced controls, patch and encryption management, training for IT staff, cloud security and more – all boosted by essential EDR functionality to help you deflect attacks rapidly, with minimal demand on your resources. • Kaspersky Next XDR Optimum – In addition to exceptional EPP and automatic response capabilities that help identify, analyze and neutralize evasive threats, the solution gives you affordable, user-friendly detection and response tools that go beyond endpoints, as well as access to our online learning platform to raise the security awareness of your employees. • Kaspersky Next MXDR Optimum – Get expert-managed protection against sophisticated threats, delivered by Kaspersky’s globally renowned SOC experts with 24/7 infrastructure monitoring – while keeping essential XDR capabilities in-house.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 194

**User Satisfaction Scores:**

- **Malware Probability Scores:** 8.6/10 (Category avg: 9.0/10)
- **Has the product been a good partner in doing business?:** 8.2/10 (Category avg: 8.8/10)
- **Malware Evaluation:** 9.0/10 (Category avg: 9.4/10)
- **Sandbox:** 9.0/10 (Category avg: 9.3/10)


**Seller Details:**

- **Seller:** [Kaspersky](https://www.g2.com/sellers/kaspersky-bce2dc7f-2586-4e87-96da-114de2c40584)
- **Year Founded:** 1997
- **HQ Location:** Moscow
- **Twitter:** @kasperskylabind (1,293 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/kaspersky/ (4,494 employees on LinkedIn®)
- **Phone:** 1-866-328-5700

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 47% Mid-Market, 33% Small-Business


#### Pros & Cons

**Pros:**

- Blocking (5 reviews)
- Ease of Use (5 reviews)
- Threat Protection (5 reviews)
- Protection (4 reviews)
- Threat Detection (4 reviews)

**Cons:**

- High Resource Usage (6 reviews)
- Slow Performance (5 reviews)
- Compatibility Issues (2 reviews)
- Complex Setup (2 reviews)
- Difficult Configuration (2 reviews)

  ### 6. [FortiGuard Labs Outbreak Alerts](https://www.g2.com/products/fortiguard-labs-outbreak-alerts/reviews)
  The FortiGuard team develops effective countermeasures to protect more than 320,000 Fortinet customers around the world. These countermeasures include up-to-the-minute threat intelligence, delivered as a subscription service for Fortinet security products


  **Average Rating:** 4.2/5.0
  **Total Reviews:** 12

**User Satisfaction Scores:**

- **Malware Probability Scores:** 9.2/10 (Category avg: 9.0/10)
- **Has the product been a good partner in doing business?:** 8.8/10 (Category avg: 8.8/10)
- **Malware Evaluation:** 9.4/10 (Category avg: 9.4/10)
- **Sandbox:** 8.8/10 (Category avg: 9.3/10)


**Seller Details:**

- **Seller:** [Fortinet](https://www.g2.com/sellers/fortinet)
- **Year Founded:** 2000
- **HQ Location:** Sunnyvale, CA
- **Twitter:** @Fortinet (151,247 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/6460/ (16,112 employees on LinkedIn®)
- **Ownership:** NASDAQ: FTNT

**Reviewer Demographics:**
  - **Company Size:** 69% Mid-Market, 15% Enterprise


#### Pros & Cons

**Pros:**

- Malware Protection (1 reviews)
- Ransomware Protection (1 reviews)
- Security (1 reviews)
- Software Updates (1 reviews)

**Cons:**

- Lack of Updates (1 reviews)
- Poor Customer Support (1 reviews)
- Poor Detection Performance (1 reviews)
- Software Bugs (1 reviews)

  ### 7. [Check Point Infinity Platform](https://www.g2.com/products/check-point-infinity-platform/reviews)
  Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all networks, endpoint, cloud and mobile. The architecture is designed to resolve the complexities of growing connectivity and inefficient security.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 46

**User Satisfaction Scores:**

- **Malware Probability Scores:** 8.7/10 (Category avg: 9.0/10)
- **Has the product been a good partner in doing business?:** 8.8/10 (Category avg: 8.8/10)
- **Malware Evaluation:** 9.2/10 (Category avg: 9.4/10)
- **Sandbox:** 8.8/10 (Category avg: 9.3/10)


**Seller Details:**

- **Seller:** [Check Point Software Technologies](https://www.g2.com/sellers/check-point-software-technologies)
- **Year Founded:** 1993
- **HQ Location:** Redwood City, CA
- **Twitter:** @CheckPointSW (70,927 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/check-point-software-technologies/ (8,356 employees on LinkedIn®)
- **Ownership:** NASDAQ:CHKP

**Reviewer Demographics:**
  - **Top Industries:** Computer &amp; Network Security, Information Technology and Services
  - **Company Size:** 41% Mid-Market, 33% Small-Business


#### Pros & Cons

**Pros:**

- Centralized Management (12 reviews)
- Security (11 reviews)
- Easy Management (10 reviews)
- Features (9 reviews)
- Ease of Use (8 reviews)

**Cons:**

- Learning Curve (10 reviews)
- Complexity (6 reviews)
- Delays (4 reviews)
- Difficult Configuration (4 reviews)
- Expensive (4 reviews)

  ### 8. [Deep Discovery Inspector](https://www.g2.com/products/trend-micro-deep-discovery-inspector/reviews)
  Deep Discovery Analyzer Extend the value of your security investments with custom sandboxing


  **Average Rating:** 4.2/5.0
  **Total Reviews:** 10

**User Satisfaction Scores:**

- **Malware Probability Scores:** 8.8/10 (Category avg: 9.0/10)
- **Has the product been a good partner in doing business?:** 8.3/10 (Category avg: 8.8/10)
- **Malware Evaluation:** 8.8/10 (Category avg: 9.4/10)
- **Sandbox:** 8.3/10 (Category avg: 9.3/10)


**Seller Details:**

- **Seller:** [Trend Micro](https://www.g2.com/sellers/trend-micro)
- **Year Founded:** 1988
- **HQ Location:** Tokyo
- **LinkedIn® Page:** https://www.linkedin.com/company/4312/ (8,090 employees on LinkedIn®)
- **Ownership:** OTCMKTS:TMICY
- **Total Revenue (USD mm):** $1,515

**Reviewer Demographics:**
  - **Company Size:** 50% Mid-Market, 30% Enterprise


  ### 9. [Intezer](https://www.g2.com/products/intezer-intezer/reviews)
  Intezer automates the entire alert triage process, like an extension of your team handling Tier 1 SOC tasks for every alert at machine-speed. Intezer monitors incoming incidents from endpoint, reported phishing pipelines, or SIEM tools, then autonomously collects evidence, investigates, makes triage decisions, and escalates only the serious threats to your team for human intervention. Power your SOC with artificial intelligence that makes sure every alert is deeply analyzed (including every single artifact like files, URLs, endpoint memory, etc.), detecting malicious code in memory and other evasive threats. Fast set up and integrations with your SOC team&#39;s workflows (EDR, SOAR, SIEM, etc.) means Intezer&#39;s AI can immediately start filtering out false positives, giving you detailed analysis about every threat, and speeding up your incident response time. With Intezer: • Reduce Tier 1 escalation, sending only 4% of alerts on average to your team for immediate action. • Identify up to 97% of false positive alerts without taking any time from your analysts. • Reduce average triage time to 5 minutes or less, while giving your analysts deep context about every alert to prioritize critical treats and respond faster.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 187

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.6/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Intezer](https://www.g2.com/sellers/intezer)
- **Year Founded:** 2015
- **HQ Location:** New York
- **Twitter:** @IntezerLabs (10,215 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/10656303/ (88 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Software Engineer, Student
  - **Top Industries:** Computer &amp; Network Security, Information Technology and Services
  - **Company Size:** 54% Small-Business, 23% Mid-Market


#### Pros & Cons

**Pros:**

- Detection Accuracy (3 reviews)
- Ease of Use (3 reviews)
- Malware Protection (3 reviews)
- Security (3 reviews)
- Security Protection (3 reviews)

**Cons:**

- Complex Interface (2 reviews)
- Poor Interface Design (2 reviews)
- UX Improvement (2 reviews)
- Access Control (1 reviews)
- Data Privacy (1 reviews)

  ### 10. [Symantec Content Analysis and Sandboxing](https://www.g2.com/products/symantec-content-analysis-and-sandboxing/reviews)
  Detect and block advanced threats that elude traditional analysis with multiple-layer inspection and customizable sandboxing


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 29

**User Satisfaction Scores:**

- **Malware Probability Scores:** 10.0/10 (Category avg: 9.0/10)
- **Has the product been a good partner in doing business?:** 10.0/10 (Category avg: 8.8/10)
- **Malware Evaluation:** 10.0/10 (Category avg: 9.4/10)
- **Sandbox:** 10.0/10 (Category avg: 9.3/10)


**Seller Details:**

- **Seller:** [Broadcom](https://www.g2.com/sellers/broadcom-ab3091cd-4724-46a8-ac89-219d6bc8e166)
- **Year Founded:** 1991
- **HQ Location:** San Jose, CA
- **Twitter:** @broadcom (62,960 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/broadcom/ (55,707 employees on LinkedIn®)
- **Ownership:** NASDAQ: CA

**Reviewer Demographics:**
  - **Top Industries:** Computer &amp; Network Security, Information Technology and Services
  - **Company Size:** 37% Mid-Market, 37% Enterprise


  ### 11. [Trend Micro Deep Discovery](https://www.g2.com/products/trend-micro-trend-micro-deep-discovery/reviews)
  Deep Discovery Inspector is available as a physical or virtual network appliance. It&#39;s designed to quickly detect advanced malware that typically bypasses traditional security defenses and exfiltrates sensitive data. Specialized detection engines and custom sandbox analysis detect and prevent breaches.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 16

**User Satisfaction Scores:**

- **Malware Probability Scores:** 8.9/10 (Category avg: 9.0/10)
- **Has the product been a good partner in doing business?:** 9.2/10 (Category avg: 8.8/10)
- **Malware Evaluation:** 10.0/10 (Category avg: 9.4/10)
- **Sandbox:** 8.9/10 (Category avg: 9.3/10)


**Seller Details:**

- **Seller:** [Trend Micro](https://www.g2.com/sellers/trend-micro)
- **Year Founded:** 1988
- **HQ Location:** Tokyo
- **LinkedIn® Page:** https://www.linkedin.com/company/4312/ (8,090 employees on LinkedIn®)
- **Ownership:** OTCMKTS:TMICY
- **Total Revenue (USD mm):** $1,515

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 41% Mid-Market, 35% Enterprise


  ### 12. [MetaDefender Managed File Transfer™ (MFT)](https://www.g2.com/products/metadefender-managed-file-transfer-mft/reviews)
  MetaDefender Managed File Transfer™ (MFT) is OPSWAT’s security-focused managed file transfer solution that unifies automation, usability, and compliance into a single, trusted platform. Secure file analysis is embedded directly into the solution, leveraging AI-based malware detection to deliver a premium MFT experience for both IT and OT environments. This approach provides adaptive zero-day protection by combining real-time file analysis with predictive AI that evaluates file structure and anticipates malicious behavior prior to execution, without detonation. Whether evaluating secure file transfer solutions, exploring MFT automation for workflow efficiency, or seeking MFT compliance to meet stringent standards, OPSWAT&#39;s secure MFT solution delivers comprehensive protection with industry-standard protocols and industry-leading file security technologies. With centralized governance, intuitive workflows, and real-time visibility across all security domains, MetaDefender Managed File Transfer simplifies compliance readiness through detailed audit trails, extensive reporting, and policy enforcement aligned with zero-trust architecture. It ensures business continuity by keeping secure file transfers reliable, uninterrupted, and protected from emerging threats while integrating seamlessly with OPSWAT’s ecosystem – including optical diodes, endpoint protection, portable media security, and kiosks – to enable secure, automated workflows


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 29

**User Satisfaction Scores:**

- **Malware Probability Scores:** 9.2/10 (Category avg: 9.0/10)
- **Has the product been a good partner in doing business?:** 9.1/10 (Category avg: 8.8/10)
- **Malware Evaluation:** 10.0/10 (Category avg: 9.4/10)
- **Sandbox:** 10.0/10 (Category avg: 9.3/10)


**Seller Details:**

- **Seller:** [OPSWAT](https://www.g2.com/sellers/opswat)
- **Company Website:** https://www.opswat.com
- **Year Founded:** 2002
- **HQ Location:** Tampa, Florida
- **Twitter:** @OPSWAT (7,227 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/opswat/ (1,124 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 59% Mid-Market, 28% Enterprise


#### Pros & Cons

**Pros:**

- Security (13 reviews)
- Secure Transfer (10 reviews)
- Reliability (9 reviews)
- File Transfer (7 reviews)
- Compliance Standards (5 reviews)

**Cons:**

- Complexity (4 reviews)
- Integration Issues (2 reviews)
- Difficult Learning (1 reviews)
- Expensive Licensing (1 reviews)
- Pricing Issues (1 reviews)

  ### 13. [AhnLab MDS](https://www.g2.com/products/ahnlab-mds/reviews)
  AhnLab MDS is a sandbox solution that provides advanced threat detection, analysis, and response capabilities without compromising end-user systems. Why AhnLab MDS • Advanced Threat Detection The multi-engine of AhnLab MDS is the backbone of its unrivaled file analysis technology, applying the most suitable analysis technique aligned with the characteristics of each file. It runs files in an isolated environment (sandbox) and performs a comprehensive analysis of behavior, file/process creation, network traffic, and URL access to determine the maliciousness of files. • No Execution Until Proven Safe AhnLab MDS never lets suspicious files executed in the end-user system. Once unanalyzed files are detected, it instantly holds execution, triggers analysis, and performs response measures, including file removal and system quarantine if a file is convicted of being malicious. • AI-Powered Email Security AhnLab MDS determines the maliciousness of email by extracting the email data and implementing AI-assisted analysis. This results in laser-accurate detection of phishing emails that might evade policy-based detection. Key Features • Cutting-Edge Sandbox Analysis In the sandbox constructed within the high-performance appliance, AhnLab MDS analyzes every executable and non-executable files as well as covert techniques hidden behind files. It accelerates users to outpace modern cyber threats without compromising end-user systems. • Reversing Anti-VM Some modern malware is equipped with anti-VM features, which freezes its operation once sandbox environments are detected. AhnLab MDS, always a few steps ahead of the latest cyber threats, reverses the anti-VM feature by disabling malware to scan the sandbox and evade detection. • Network Scanning When analyzing files, AhnLab MDS granularly detects and blocks malicious network traffic based on extensive signatures and YARA rules to tackle techniques of advanced persistent threats (APTs) such as C2 server connections. • Extensive Third-Party Integration AhnLab MDS is compatible with a variety of third-party products spanning SSL/TLS decryption and spam filtering solutions. This extends its range of file aggregation, detection, and analysis to deliver reinforced threat response capabilities. • Intelligence-Driven Defense AhnLab MDS actualizes “intelligence-driven defense” by deeply integrating with our native products and services. Our threat intelligence platform, AhnLab TIP, feeds additional insights on files, URLs, and Ips to AhnLab MDS, and industry-leading experts of ASEC step in to deliver the full-scale file analysis service. • Central Monitoring &amp; Log Management The intuitive AhnLab MDS dashboard offers exceptional visibility into the threat detection and analysis status and central management of logs and events generated by products deployed across the organization.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 1

**User Satisfaction Scores:**

- **Malware Evaluation:** 10.0/10 (Category avg: 9.4/10)


**Seller Details:**

- **Seller:** [AhnLab](https://www.g2.com/sellers/ahnlab-7be65c0f-4030-4ddd-9d2c-8413df0f9f71)
- **Year Founded:** 1995
- **HQ Location:** Seongnam-si, KR
- **Twitter:** @AhnLab_SecuInfo (2,946 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/ahnlab-inc./ (639 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 100% Mid-Market


  ### 14. [Hillstone Cloud Sandbox](https://www.g2.com/products/hillstone-cloud-sandbox/reviews)
  Cloud Sandbox delivers a unique, advanced threat detection platform that can emulate the execution environment and analyze all activities related to malicious files, identify advanced threats and collaborate with existing solutions to provide rapid remediation.


  **Average Rating:** 4.0/5.0
  **Total Reviews:** 1

**User Satisfaction Scores:**

- **Malware Probability Scores:** 10.0/10 (Category avg: 9.0/10)
- **Has the product been a good partner in doing business?:** 6.7/10 (Category avg: 8.8/10)
- **Malware Evaluation:** 8.3/10 (Category avg: 9.4/10)
- **Sandbox:** 10.0/10 (Category avg: 9.3/10)


**Seller Details:**

- **Seller:** [Hillstone Networks](https://www.g2.com/sellers/hillstone-networks)
- **Year Founded:** 2006
- **HQ Location:** Santa Clara, US
- **Twitter:** @Hillstone_Net (10,056 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/hillstonenet (367 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 100% Mid-Market


  ### 15. [Software Defined Labs (SDL)](https://www.g2.com/products/software-defined-labs-sdl/reviews)
  Virtual appliance that simplifies management, automation, and orchestration of network and lab resources.


  **Average Rating:** 5.0/5.0
  **Total Reviews:** 1

**User Satisfaction Scores:**

- **Malware Probability Scores:** 10.0/10 (Category avg: 9.0/10)
- **Malware Evaluation:** 10.0/10 (Category avg: 9.4/10)
- **Sandbox:** 10.0/10 (Category avg: 9.3/10)


**Seller Details:**

- **Seller:** [Tokalabs](https://www.g2.com/sellers/tokalabs-13c13fc7-b0c6-420a-a6d6-940c4ef98dcc)
- **Year Founded:** 2015
- **HQ Location:** San Jose, US
- **LinkedIn® Page:** https://www.linkedin.com/company/tokalabs/ (2 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 100% Enterprise


  ### 16. [C-Prot Endpoint Security](https://www.g2.com/products/c-prot-endpoint-security/reviews)
  With a user-friendly interface, cloud or on-prem based management options and a central control panel, you can easily manage all your endpoint devices (Computer, Mobile Device, Smart TV) from one place.


  **Average Rating:** 5.0/5.0
  **Total Reviews:** 1


**Seller Details:**

- **Seller:** [C-Prot Siber Güvenlik Teknolojileri A.S](https://www.g2.com/sellers/c-prot-siber-guvenlik-teknolojileri-a-s)
- **Year Founded:** 2010
- **HQ Location:** Mersin, TR
- **Twitter:** @cprottr (194 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/c-prottr/ (13 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 100% Small-Business


  ### 17. [Zscaler Cloud Sandbox](https://www.g2.com/products/zscaler-zscaler-cloud-sandbox/reviews)
  Zscaler Cloud Sandbox is the world’s first AI-driven, inline malware prevention engine that stops unknown, file-based threats—like ransomware and zero-day—before they reach users and endpoints. With real-time analysis, instant AI Verdict, and continuous threat intelligence, it blocks evasive threats without disrupting productivity. Unlike legacy solutions, it provides unlimited inspection across web and file protocols with no latency, enabling organizations to bolster security while preserving productivity. By seamlessly integrating into SOC workflows, it helps optimize threat response and reduce alert fatigue. Built into Zscaler’s Zero Trust Exchange, it deploys easily—eliminating hardware dependency and scaling globally to meet enterprise demands. Key Features and Benefits: • Prevent Zero Day Threats in Seconds: Stop unknown file-based threats with inline malware and advanced threat detection, including AI-driven instant verdicts. • Bolster Security and Preserve Productivity: Maximize security while keeping users productive by automatically detecting and quarantining threats—integrating Zero Trust Browser Isolation with sandbox capabilities. • Optimize SOC Workflows: Seamlessly integratemalware protection into your SOC workflows with out-of-band file analysis, third-party threat detection tools, and malware analysis using both unpatched and fully patched VMs for efficient threat investigation. • Deploy Easily and Scale Globally: Reduce costs and eliminate the hassle of outdated hardware and software. Simple policy configurations deliver immediate value, driving strong ROI and enabling strategic growth. • Maintain Data Residency and Compliance with Global Sandbox Nodes: Capitalize on our global edge presence to ensure data residency and compliance. Zscaler Cloud Sandbox is fully integrated with Zscaler Internet Access™ and a part of the Zero Trust Exchange™, allowing fully integrated protection and an unmatched user experience&quot;




**Seller Details:**

- **Seller:** [Zscaler](https://www.g2.com/sellers/zscaler)
- **Year Founded:** 2008
- **HQ Location:** San Jose, California
- **Twitter:** @zscaler (17,464 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/234625/ (9,540 employees on LinkedIn®)
- **Ownership:** NASDAQ:ZS





## Parent Category

[Network Security Software](https://www.g2.com/categories/network-security)





