It provides complete visibility by monitoring all the ports and protocols, leverages custom sandboxing, and allows you to correlate advanced threat events and prioritise your response. They have a "Safe-Live mode" to analyse multistage downloads, URLs, command-and-control, etc. Review collected by and hosted on G2.com.
We have been using the Deep Discovery Inspector for some time; the problem that arises with Deep Discovery Inspector is when it's not connected to the internet since it cannot upload the logs to the Threat Management Services Portal (TMSP) for further analysis. Review collected by and hosted on G2.com.


