Introducing G2.ai, the future of software buying.Try now

Best Network Sandboxing Software

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Network sandboxing software provides a safe space for suspicious network traffic or objects can be evaluated against a database of known threats and assigned a malware probability score.

To qualify for inclusion in the Network Sandboxing category, a product must:

Provide an isolated space for threats to be evaluated
Maintain a library of known threats and assigned malware scores
Automatically submit suspicious objects to the sandbox for evaluation
Show More
Show Less

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

Coming Soon
Get Trending Network Sandboxing Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
No filters applied
17 Listings in Network Sandboxing Available
(163)4.4 out of 5
2nd Easiest To Use in Network Sandboxing software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Zscaler Internet Access™ (ZIA) is the world’s leading cloud-native secure access solution that protects users, devices, and data by securing all internet traffic, regardless of location. Leveragin

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 51% Enterprise
    • 26% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Zscaler Internet Access is a cloud-based security tool that aims to secure and control internet traffic, eliminating security risks from web and cloud traffic.
    • Reviewers like the consistent performance, cloud-native security, and the robust security features of Zscaler Internet Access, which provide a seamless internet access experience and enhance their day-to-day internet activities.
    • Reviewers experienced slow performance and delays in internet access when starting their computers or waking them from sleep mode, and found the initial setup process not straightforward, which disrupts their workflow.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Zscaler Internet Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    35
    Internet Security
    33
    Protection
    29
    Ease of Use
    20
    Email Security
    19
    Cons
    Slow Performance
    20
    Connection Issues
    19
    Internet Connectivity
    16
    Complex Implementation
    15
    Complex Configuration
    14
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Zscaler Internet Access features and usability ratings that predict user satisfaction
    8.6
    Malware Probability Scores
    Average: 9.0
    8.9
    Has the product been a good partner in doing business?
    Average: 8.8
    9.0
    Malware Evaluation
    Average: 9.3
    8.8
    Sandbox
    Average: 9.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Zscaler
    Company Website
    Year Founded
    2008
    HQ Location
    San Jose, California
    Twitter
    @zscaler
    17,121 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    9,410 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Zscaler Internet Access™ (ZIA) is the world’s leading cloud-native secure access solution that protects users, devices, and data by securing all internet traffic, regardless of location. Leveragin

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 51% Enterprise
  • 26% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Zscaler Internet Access is a cloud-based security tool that aims to secure and control internet traffic, eliminating security risks from web and cloud traffic.
  • Reviewers like the consistent performance, cloud-native security, and the robust security features of Zscaler Internet Access, which provide a seamless internet access experience and enhance their day-to-day internet activities.
  • Reviewers experienced slow performance and delays in internet access when starting their computers or waking them from sleep mode, and found the initial setup process not straightforward, which disrupts their workflow.
Zscaler Internet Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
35
Internet Security
33
Protection
29
Ease of Use
20
Email Security
19
Cons
Slow Performance
20
Connection Issues
19
Internet Connectivity
16
Complex Implementation
15
Complex Configuration
14
Zscaler Internet Access features and usability ratings that predict user satisfaction
8.6
Malware Probability Scores
Average: 9.0
8.9
Has the product been a good partner in doing business?
Average: 8.8
9.0
Malware Evaluation
Average: 9.3
8.8
Sandbox
Average: 9.3
Seller Details
Seller
Zscaler
Company Website
Year Founded
2008
HQ Location
San Jose, California
Twitter
@zscaler
17,121 Twitter followers
LinkedIn® Page
www.linkedin.com
9,410 employees on LinkedIn®
(23)4.5 out of 5
4th Easiest To Use in Network Sandboxing software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Fortinet’s top-rated FortiSandbox provides the on-site intelligence that enables the Fortinet Security Fabric to address the fast moving and more targeted threats across a broad attack surface. Specif

    Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 57% Mid-Market
    • 30% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FortiSandbox features and usability ratings that predict user satisfaction
    8.6
    Malware Probability Scores
    Average: 9.0
    8.8
    Has the product been a good partner in doing business?
    Average: 8.8
    9.2
    Malware Evaluation
    Average: 9.3
    9.5
    Sandbox
    Average: 9.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortinet
    Year Founded
    2000
    HQ Location
    Sunnyvale, CA
    Twitter
    @Fortinet
    151,439 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    15,738 employees on LinkedIn®
    Ownership
    NASDAQ: FTNT
Product Description
How are these determined?Information
This description is provided by the seller.

Fortinet’s top-rated FortiSandbox provides the on-site intelligence that enables the Fortinet Security Fabric to address the fast moving and more targeted threats across a broad attack surface. Specif

Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 57% Mid-Market
  • 30% Small-Business
FortiSandbox features and usability ratings that predict user satisfaction
8.6
Malware Probability Scores
Average: 9.0
8.8
Has the product been a good partner in doing business?
Average: 8.8
9.2
Malware Evaluation
Average: 9.3
9.5
Sandbox
Average: 9.3
Seller Details
Seller
Fortinet
Year Founded
2000
HQ Location
Sunnyvale, CA
Twitter
@Fortinet
151,439 Twitter followers
LinkedIn® Page
www.linkedin.com
15,738 employees on LinkedIn®
Ownership
NASDAQ: FTNT

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Proofpoint Targeted Attack Protection (TAP) helps organizations efficiently detect, mitigate and respond to known and unknown advanced threats that target people and VIPs through email. TAP provides u

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 71% Enterprise
    • 24% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Proofpoint Targeted Attack Protection For Email features and usability ratings that predict user satisfaction
    8.7
    Malware Probability Scores
    Average: 9.0
    9.0
    Has the product been a good partner in doing business?
    Average: 8.8
    9.1
    Malware Evaluation
    Average: 9.3
    8.6
    Sandbox
    Average: 9.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Sunnyvale, CA
    Twitter
    @proofpoint
    31,075 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,801 employees on LinkedIn®
    Ownership
    NASDAQ: PFPT
Product Description
How are these determined?Information
This description is provided by the seller.

Proofpoint Targeted Attack Protection (TAP) helps organizations efficiently detect, mitigate and respond to known and unknown advanced threats that target people and VIPs through email. TAP provides u

Users
No information available
Industries
No information available
Market Segment
  • 71% Enterprise
  • 24% Mid-Market
Proofpoint Targeted Attack Protection For Email features and usability ratings that predict user satisfaction
8.7
Malware Probability Scores
Average: 9.0
9.0
Has the product been a good partner in doing business?
Average: 8.8
9.1
Malware Evaluation
Average: 9.3
8.6
Sandbox
Average: 9.3
Seller Details
Year Founded
2002
HQ Location
Sunnyvale, CA
Twitter
@proofpoint
31,075 Twitter followers
LinkedIn® Page
www.linkedin.com
4,801 employees on LinkedIn®
Ownership
NASDAQ: PFPT
(13)4.2 out of 5
3rd Easiest To Use in Network Sandboxing software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The FortiGuard team develops effective countermeasures to protect more than 320,000 Fortinet customers around the world. These countermeasures include up-to-the-minute threat intelligence, delivered a

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 69% Mid-Market
    • 15% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • FortiGuard Labs Outbreak Alerts Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Malware Protection
    1
    Ransomware Protection
    1
    Security
    1
    Software Updates
    1
    Cons
    Lack of Updates
    1
    Poor Customer Support
    1
    Poor Detection Performance
    1
    Software Bugs
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FortiGuard Labs Outbreak Alerts features and usability ratings that predict user satisfaction
    9.2
    Malware Probability Scores
    Average: 9.0
    8.8
    Has the product been a good partner in doing business?
    Average: 8.8
    9.4
    Malware Evaluation
    Average: 9.3
    8.8
    Sandbox
    Average: 9.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortinet
    Year Founded
    2000
    HQ Location
    Sunnyvale, CA
    Twitter
    @Fortinet
    151,439 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    15,738 employees on LinkedIn®
    Ownership
    NASDAQ: FTNT
Product Description
How are these determined?Information
This description is provided by the seller.

The FortiGuard team develops effective countermeasures to protect more than 320,000 Fortinet customers around the world. These countermeasures include up-to-the-minute threat intelligence, delivered a

Users
No information available
Industries
No information available
Market Segment
  • 69% Mid-Market
  • 15% Small-Business
FortiGuard Labs Outbreak Alerts Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Malware Protection
1
Ransomware Protection
1
Security
1
Software Updates
1
Cons
Lack of Updates
1
Poor Customer Support
1
Poor Detection Performance
1
Software Bugs
1
FortiGuard Labs Outbreak Alerts features and usability ratings that predict user satisfaction
9.2
Malware Probability Scores
Average: 9.0
8.8
Has the product been a good partner in doing business?
Average: 8.8
9.4
Malware Evaluation
Average: 9.3
8.8
Sandbox
Average: 9.3
Seller Details
Seller
Fortinet
Year Founded
2000
HQ Location
Sunnyvale, CA
Twitter
@Fortinet
151,439 Twitter followers
LinkedIn® Page
www.linkedin.com
15,738 employees on LinkedIn®
Ownership
NASDAQ: FTNT
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all netwo

    Users
    • Network & Security Engineer
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 39% Mid-Market
    • 31% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Check Point Infinity Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Centralized Management
    12
    Security
    11
    Easy Management
    10
    Features
    9
    Ease of Use
    8
    Cons
    Learning Curve
    10
    Complexity
    6
    Delays
    4
    Difficult Configuration
    4
    Expensive
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point Infinity Platform features and usability ratings that predict user satisfaction
    8.7
    Malware Probability Scores
    Average: 9.0
    8.8
    Has the product been a good partner in doing business?
    Average: 8.8
    9.2
    Malware Evaluation
    Average: 9.3
    8.8
    Sandbox
    Average: 9.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    70,962 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8,323 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all netwo

Users
  • Network & Security Engineer
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 39% Mid-Market
  • 31% Small-Business
Check Point Infinity Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Centralized Management
12
Security
11
Easy Management
10
Features
9
Ease of Use
8
Cons
Learning Curve
10
Complexity
6
Delays
4
Difficult Configuration
4
Expensive
4
Check Point Infinity Platform features and usability ratings that predict user satisfaction
8.7
Malware Probability Scores
Average: 9.0
8.8
Has the product been a good partner in doing business?
Average: 8.8
9.2
Malware Evaluation
Average: 9.3
8.8
Sandbox
Average: 9.3
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
70,962 Twitter followers
LinkedIn® Page
www.linkedin.com
8,323 employees on LinkedIn®
Ownership
NASDAQ:CHKP
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Check Point’s multilayered security technology provides protection against advanced and zero-day cyber threats, preventing attacks, minimizing risks and offering rapid response

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 65% Mid-Market
    • 29% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Check Point SandBlast Advanced Network Threat Prevention Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Easy Integrations
    3
    Threat Detection
    3
    Security Protection
    2
    Accuracy of Information
    1
    Cons
    Cost
    2
    Expensive
    2
    High Resource Usage
    1
    Incomplete Information
    1
    Limited Customization
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point SandBlast Advanced Network Threat Prevention features and usability ratings that predict user satisfaction
    7.9
    Malware Probability Scores
    Average: 9.0
    9.7
    Has the product been a good partner in doing business?
    Average: 8.8
    9.3
    Malware Evaluation
    Average: 9.3
    9.5
    Sandbox
    Average: 9.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    70,962 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8,323 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

Check Point’s multilayered security technology provides protection against advanced and zero-day cyber threats, preventing attacks, minimizing risks and offering rapid response

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 65% Mid-Market
  • 29% Enterprise
Check Point SandBlast Advanced Network Threat Prevention Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Easy Integrations
3
Threat Detection
3
Security Protection
2
Accuracy of Information
1
Cons
Cost
2
Expensive
2
High Resource Usage
1
Incomplete Information
1
Limited Customization
1
Check Point SandBlast Advanced Network Threat Prevention features and usability ratings that predict user satisfaction
7.9
Malware Probability Scores
Average: 9.0
9.7
Has the product been a good partner in doing business?
Average: 8.8
9.3
Malware Evaluation
Average: 9.3
9.5
Sandbox
Average: 9.3
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
70,962 Twitter followers
LinkedIn® Page
www.linkedin.com
8,323 employees on LinkedIn®
Ownership
NASDAQ:CHKP
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Kaspersky Sandbox is an advanced cybersecurity solution designed to detect and automatically block sophisticated threats that traditional endpoint protection platforms might miss. By executing suspici

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 38% Small-Business
    • 31% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Kaspersky Sandbox features and usability ratings that predict user satisfaction
    8.6
    Malware Probability Scores
    Average: 9.0
    8.3
    Has the product been a good partner in doing business?
    Average: 8.8
    9.0
    Malware Evaluation
    Average: 9.3
    9.0
    Sandbox
    Average: 9.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kaspersky
    Year Founded
    1997
    HQ Location
    Moscow
    Twitter
    @kasperskylabind
    1,299 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,439 employees on LinkedIn®
    Phone
    1-866-328-5700
Product Description
How are these determined?Information
This description is provided by the seller.

Kaspersky Sandbox is an advanced cybersecurity solution designed to detect and automatically block sophisticated threats that traditional endpoint protection platforms might miss. By executing suspici

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 38% Small-Business
  • 31% Mid-Market
Kaspersky Sandbox features and usability ratings that predict user satisfaction
8.6
Malware Probability Scores
Average: 9.0
8.3
Has the product been a good partner in doing business?
Average: 8.8
9.0
Malware Evaluation
Average: 9.3
9.0
Sandbox
Average: 9.3
Seller Details
Seller
Kaspersky
Year Founded
1997
HQ Location
Moscow
Twitter
@kasperskylabind
1,299 Twitter followers
LinkedIn® Page
www.linkedin.com
4,439 employees on LinkedIn®
Phone
1-866-328-5700
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Deep Discovery Analyzer Extend the value of your security investments with custom sandboxing

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 30% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Deep Discovery Inspector features and usability ratings that predict user satisfaction
    8.8
    Malware Probability Scores
    Average: 9.0
    8.3
    Has the product been a good partner in doing business?
    Average: 8.8
    8.8
    Malware Evaluation
    Average: 9.3
    8.3
    Sandbox
    Average: 9.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Tokyo
    Twitter
    @trendmicro
    111,977 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,862 employees on LinkedIn®
    Ownership
    OTCMKTS:TMICY
Product Description
How are these determined?Information
This description is provided by the seller.

Deep Discovery Analyzer Extend the value of your security investments with custom sandboxing

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 30% Enterprise
Deep Discovery Inspector features and usability ratings that predict user satisfaction
8.8
Malware Probability Scores
Average: 9.0
8.3
Has the product been a good partner in doing business?
Average: 8.8
8.8
Malware Evaluation
Average: 9.3
8.3
Sandbox
Average: 9.3
Seller Details
Year Founded
1988
HQ Location
Tokyo
Twitter
@trendmicro
111,977 Twitter followers
LinkedIn® Page
www.linkedin.com
7,862 employees on LinkedIn®
Ownership
OTCMKTS:TMICY
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Intezer automates the entire alert triage process, like an extension of your team handling Tier 1 SOC tasks for every alert at machine-speed. Intezer monitors incoming incidents from endpoint, reporte

    Users
    • Software Engineer
    • Student
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 54% Small-Business
    • 23% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Intezer Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Accuracy of Information
    2
    Detection Accuracy
    2
    Ease of Use
    2
    Information Accuracy
    2
    Malware Protection
    2
    Cons
    Complex Interface
    2
    Poor Interface Design
    2
    UX Improvement
    2
    Access Control
    1
    Data Privacy
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Intezer features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.6
    Has the product been a good partner in doing business?
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Intezer
    Year Founded
    2015
    HQ Location
    New York
    Twitter
    @IntezerLabs
    10,317 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    73 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Intezer automates the entire alert triage process, like an extension of your team handling Tier 1 SOC tasks for every alert at machine-speed. Intezer monitors incoming incidents from endpoint, reporte

Users
  • Software Engineer
  • Student
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 54% Small-Business
  • 23% Mid-Market
Intezer Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Accuracy of Information
2
Detection Accuracy
2
Ease of Use
2
Information Accuracy
2
Malware Protection
2
Cons
Complex Interface
2
Poor Interface Design
2
UX Improvement
2
Access Control
1
Data Privacy
1
Intezer features and usability ratings that predict user satisfaction
0.0
No information available
8.6
Has the product been a good partner in doing business?
Average: 8.8
0.0
No information available
0.0
No information available
Seller Details
Seller
Intezer
Year Founded
2015
HQ Location
New York
Twitter
@IntezerLabs
10,317 Twitter followers
LinkedIn® Page
www.linkedin.com
73 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Detect and block advanced threats that elude traditional analysis with multiple-layer inspection and customizable sandboxing

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 37% Enterprise
    • 37% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Symantec Content Analysis and Sandboxing features and usability ratings that predict user satisfaction
    10.0
    Malware Probability Scores
    Average: 9.0
    10.0
    Has the product been a good partner in doing business?
    Average: 8.8
    10.0
    Malware Evaluation
    Average: 9.3
    10.0
    Sandbox
    Average: 9.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Broadcom
    Year Founded
    1991
    HQ Location
    San Jose, CA
    Twitter
    @broadcom
    61,734 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    56,584 employees on LinkedIn®
    Ownership
    NASDAQ: CA
Product Description
How are these determined?Information
This description is provided by the seller.

Detect and block advanced threats that elude traditional analysis with multiple-layer inspection and customizable sandboxing

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 37% Enterprise
  • 37% Mid-Market
Symantec Content Analysis and Sandboxing features and usability ratings that predict user satisfaction
10.0
Malware Probability Scores
Average: 9.0
10.0
Has the product been a good partner in doing business?
Average: 8.8
10.0
Malware Evaluation
Average: 9.3
10.0
Sandbox
Average: 9.3
Seller Details
Seller
Broadcom
Year Founded
1991
HQ Location
San Jose, CA
Twitter
@broadcom
61,734 Twitter followers
LinkedIn® Page
www.linkedin.com
56,584 employees on LinkedIn®
Ownership
NASDAQ: CA
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Deep Discovery Inspector is available as a physical or virtual network appliance. It's designed to quickly detect advanced malware that typically bypasses traditional security defenses and exfiltrates

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 41% Mid-Market
    • 35% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trend Micro Deep Discovery features and usability ratings that predict user satisfaction
    8.9
    Malware Probability Scores
    Average: 9.0
    9.2
    Has the product been a good partner in doing business?
    Average: 8.8
    10.0
    Malware Evaluation
    Average: 9.3
    8.9
    Sandbox
    Average: 9.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Tokyo
    Twitter
    @trendmicro
    111,977 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,862 employees on LinkedIn®
    Ownership
    OTCMKTS:TMICY
Product Description
How are these determined?Information
This description is provided by the seller.

Deep Discovery Inspector is available as a physical or virtual network appliance. It's designed to quickly detect advanced malware that typically bypasses traditional security defenses and exfiltrates

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 41% Mid-Market
  • 35% Enterprise
Trend Micro Deep Discovery features and usability ratings that predict user satisfaction
8.9
Malware Probability Scores
Average: 9.0
9.2
Has the product been a good partner in doing business?
Average: 8.8
10.0
Malware Evaluation
Average: 9.3
8.9
Sandbox
Average: 9.3
Seller Details
Year Founded
1988
HQ Location
Tokyo
Twitter
@trendmicro
111,977 Twitter followers
LinkedIn® Page
www.linkedin.com
7,862 employees on LinkedIn®
Ownership
OTCMKTS:TMICY
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    MetaDefender Managed File Transfer™ (MFT) is OPSWAT’s security-focused managed file transfer solution that unifies automation, usability, and compliance into a single, trusted platform. Secure file an

    Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 64% Mid-Market
    • 18% Enterprise
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • MetaDefender Managed File Transfer is a platform that supports secure file transfers, with features such as multi-antivirus scanning, data sanitization, and policy-controlled transfers.
    • Reviewers frequently mention the platform's commitment to security, user-friendliness, and automation capabilities, as well as its ability to support large file transfers and provide total control over file movement.
    • Reviewers mentioned that the advanced security features of MetaDefender Managed File Transfer can require configuration and fine-tuning, and the initial setup and policy customization can be complex for new users.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • MetaDefender Managed File Transfer™ (MFT) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    9
    Reliability
    6
    Secure Transfer
    6
    File Transfer
    5
    Compliance Standards
    4
    Cons
    Complexity
    3
    Integration Issues
    2
    Difficult Learning
    1
    Expensive Licensing
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • MetaDefender Managed File Transfer™ (MFT) features and usability ratings that predict user satisfaction
    9.2
    Malware Probability Scores
    Average: 9.0
    9.1
    Has the product been a good partner in doing business?
    Average: 8.8
    10.0
    Malware Evaluation
    Average: 9.3
    10.0
    Sandbox
    Average: 9.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    OPSWAT
    Company Website
    Year Founded
    2002
    HQ Location
    Tampa, Florida
    Twitter
    @OPSWAT
    7,228 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,045 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

MetaDefender Managed File Transfer™ (MFT) is OPSWAT’s security-focused managed file transfer solution that unifies automation, usability, and compliance into a single, trusted platform. Secure file an

Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 64% Mid-Market
  • 18% Enterprise
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • MetaDefender Managed File Transfer is a platform that supports secure file transfers, with features such as multi-antivirus scanning, data sanitization, and policy-controlled transfers.
  • Reviewers frequently mention the platform's commitment to security, user-friendliness, and automation capabilities, as well as its ability to support large file transfers and provide total control over file movement.
  • Reviewers mentioned that the advanced security features of MetaDefender Managed File Transfer can require configuration and fine-tuning, and the initial setup and policy customization can be complex for new users.
MetaDefender Managed File Transfer™ (MFT) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
9
Reliability
6
Secure Transfer
6
File Transfer
5
Compliance Standards
4
Cons
Complexity
3
Integration Issues
2
Difficult Learning
1
Expensive Licensing
1
MetaDefender Managed File Transfer™ (MFT) features and usability ratings that predict user satisfaction
9.2
Malware Probability Scores
Average: 9.0
9.1
Has the product been a good partner in doing business?
Average: 8.8
10.0
Malware Evaluation
Average: 9.3
10.0
Sandbox
Average: 9.3
Seller Details
Seller
OPSWAT
Company Website
Year Founded
2002
HQ Location
Tampa, Florida
Twitter
@OPSWAT
7,228 Twitter followers
LinkedIn® Page
www.linkedin.com
1,045 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cloud Sandbox delivers a unique, advanced threat detection platform that can emulate the execution environment and analyze all activities related to malicious files, identify advanced threats and coll

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Hillstone Cloud Sandbox features and usability ratings that predict user satisfaction
    10.0
    Malware Probability Scores
    Average: 9.0
    6.7
    Has the product been a good partner in doing business?
    Average: 8.8
    8.3
    Malware Evaluation
    Average: 9.3
    10.0
    Sandbox
    Average: 9.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2006
    HQ Location
    Santa Clara, US
    Twitter
    @Hillstone_Net
    10,115 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    367 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cloud Sandbox delivers a unique, advanced threat detection platform that can emulate the execution environment and analyze all activities related to malicious files, identify advanced threats and coll

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Hillstone Cloud Sandbox features and usability ratings that predict user satisfaction
10.0
Malware Probability Scores
Average: 9.0
6.7
Has the product been a good partner in doing business?
Average: 8.8
8.3
Malware Evaluation
Average: 9.3
10.0
Sandbox
Average: 9.3
Seller Details
Year Founded
2006
HQ Location
Santa Clara, US
Twitter
@Hillstone_Net
10,115 Twitter followers
LinkedIn® Page
www.linkedin.com
367 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Virtual appliance that simplifies management, automation, and orchestration of network and lab resources.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Software Defined Labs (SDL) features and usability ratings that predict user satisfaction
    10.0
    Malware Probability Scores
    Average: 9.0
    0.0
    No information available
    10.0
    Malware Evaluation
    Average: 9.3
    10.0
    Sandbox
    Average: 9.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tokalabs
    Year Founded
    2015
    HQ Location
    San Jose, US
    LinkedIn® Page
    www.linkedin.com
    2 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Virtual appliance that simplifies management, automation, and orchestration of network and lab resources.

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Software Defined Labs (SDL) features and usability ratings that predict user satisfaction
10.0
Malware Probability Scores
Average: 9.0
0.0
No information available
10.0
Malware Evaluation
Average: 9.3
10.0
Sandbox
Average: 9.3
Seller Details
Seller
Tokalabs
Year Founded
2015
HQ Location
San Jose, US
LinkedIn® Page
www.linkedin.com
2 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AhnLab MDS is a sandbox solution that provides advanced threat detection, analysis, and response capabilities without compromising end-user systems. Why AhnLab MDS • Advanced Threat Detection The

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AhnLab MDS features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    AhnLab
    Year Founded
    1995
    HQ Location
    Seongnam-si, KR
    Twitter
    @AhnLab_man
    14,531 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    639 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

AhnLab MDS is a sandbox solution that provides advanced threat detection, analysis, and response capabilities without compromising end-user systems. Why AhnLab MDS • Advanced Threat Detection The

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
AhnLab MDS features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
AhnLab
Year Founded
1995
HQ Location
Seongnam-si, KR
Twitter
@AhnLab_man
14,531 Twitter followers
LinkedIn® Page
www.linkedin.com
639 employees on LinkedIn®