Network Sandboxing
Web traffic scan
AvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableN/AAvaliableN/AAvaliableAvaliable
Email scan
Yes (must be integrated with FortiMail for threats blocking)N/AYesYesYesYesYesYesYesN/AYesN/AYesN/AN/A
Endpoint protection
AvaliableN/AAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableN/AN/AAvaliableAvaliableN/AAvaliableAvaliable
Mobile protection
N/AN/AN/AN/AAvaliableN/AN/AAvaliableN/AN/AN/AAvaliableAvaliableN/AAvaliable
Malware Detection in files
AvaliableN/AAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableN/AAvaliableAvaliableAvaliableAvaliableAvaliable
Encrypted traffic scan
Yes (with FortiGate and FortiWeb integrations)N/AN/AYesN/AN/AN/AYesN/AN/AN/AYesN/AYes (using a third-party solutions)Yes
Network shares scan
AvaliableN/AN/AAvaliableAvaliableN/AN/AAvaliableN/AN/AN/AAvaliableN/AAvaliableAvaliable
YARA files scanning
AvaliableN/AAvaliableN/AN/AN/AN/AAvaliableN/AN/AAvaliableN/AN/AAvaliableN/A
YARA implementation by customer
AvaliableN/AAvaliableN/AN/AN/AAvaliableAvaliableN/AN/AAvaliableAvaliableN/AAvaliableN/A
Malware blocking by protocols
AvaliableN/AAvaliableAvaliableAvaliableN/AN/AAvaliableN/AAvaliableAvaliableAvaliableAvaliableAvaliableAvaliable
CPU-level detection
AvaliableN/AN/AAvaliableN/AN/AAvaliableAvaliableAvaliableN/AN/AN/AN/AN/AN/A
OS kernel level detection
AvaliableN/AN/AAvaliableN/AN/AN/AAvaliableAvaliableN/AN/AN/AN/AAvaliableN/A
Malware Samples
AvaliableN/AAvaliableAvaliableAvaliableN/AN/AAvaliableN/AN/AAvaliableAvaliableN/AAvaliableAvaliable
Zero-day threats protection
AvaliableAvaliableAvaliableAvaliableAvaliableN/AAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliable
Detecting C&C server
AvaliableN/AAvaliableAvaliableAvaliableN/AN/AAvaliableN/AAvaliableAvaliableAvaliableAvaliableAvaliableAvaliable
Hardware Applience
AvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableN/AAvaliableAvaliableN/AAvaliableAvaliable
Working in in-band/out-of-band modes
AvaliableAvaliableAvaliableAvaliableAvaliableAvaliableN/AAvaliableN/AN/AAvaliableAvaliableN/AAvaliableAvaliable
Cloud
AvaliableN/AAvaliableAvaliableAvaliableAvaliableN/AAvaliableAvaliableN/AAvaliableAvaliableAvaliableAvaliableAvaliable
Threat Intelligence Feeds
AvaliableN/AAvaliableAvaliableAvaliableAvaliableN/AAvaliableN/AAvaliableAvaliableAvaliableAvaliableN/AAvaliable
SIEM Integration
AvaliableN/AAvaliableAvaliableAvaliableAvaliableN/AAvaliableN/AN/AAvaliableAvaliableN/AAvaliableAvaliable
Vulnerability manager
AvaliableN/AAvaliableN/AAvaliableN/AN/AN/AN/AAvaliableN/AAvaliableN/AAvaliableAvaliable
Uploading "Golden Image"
N/AN/AN/AN/AN/AN/AN/AN/AN/AN/AN/AN/AN/AN/AN/A
Using Multiple OSes
AvaliableN/AAvaliableAvaliableAvaliableN/AN/AAvaliableN/AN/AAvaliableAvaliableN/AAvaliableAvaliable
Multiple Versions of Sandbox App
AvaliableN/AAvaliableN/AN/AN/AN/AAvaliableN/AN/AAvaliableAvaliableN/AAvaliableAvaliable
Payload detonation
AvaliableN/AAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableN/AN/AAvaliableAvaliableN/AAvaliableAvaliable
Auto-uploading files
AvaliableN/AAvaliableAvaliableAvaliableN/AN/AAvaliableN/AN/AAvaliableAvaliableN/AAvaliableAvaliable
URL analysis
AvaliableN/AAvaliableAvaliableAvaliableN/AN/AAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliable
Analyst console
AvaliableN/AAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableN/AAvaliableAvaliable
Security Reports
  • Periodic reports
  • Contextual reports on threats
N/A
  • Periodic reports
  • Contextual reports on threats
  • Periodic reports
  • Contextual reports on threats
  • Periodic reports
  • Contextual reports on threats
  • Periodic reports
  • Contextual reports on threats
N/A
  • Periodic reports
  • Contextual reports on threats
N/A
  • Periodic reports
  • Contextual reports on threats
  • Periodic reports
  • Contextual reports on threats
  • Periodic reports
  • Contextual reports on threats
N/A
  • Periodic reports
  • Contextual reports on threats
  • Periodic reports
  • Contextual reports on threats
Alerts via Email
AvaliableN/AAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliable
Central Policy Management for Data Protection
AvaliableN/AAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableN/AAvaliableAvaliableAvaliableN/AAvaliableAvaliable
Forensic analysis of data history
AvaliableN/AAvaliableAvaliableAvaliableN/AAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableN/AAvaliableAvaliable
Automated remediation capabilities
AvaliableN/AAvaliableAvaliableAvaliableAvaliableN/AAvaliableN/AAvaliableAvaliableAvaliableN/AAvaliableAvaliable
Auto Update of Signatures
AvaliableN/AAvaliableAvaliableAvaliableN/AN/AAvaliableN/AN/AAvaliableAvaliableN/AAvaliableAvaliable
Trial
N/AN/AYesYesYesYesYesYesYesYesYesYesYes (30 days)N/AYes
Network Sandboxing
Web traffic scan
Email scan
Endpoint protection
Mobile protection
Malware Detection in files
Encrypted traffic scan
Network shares scan
YARA files scanning
YARA implementation by customer
Malware blocking by protocols
CPU-level detection
OS kernel level detection
Malware Samples
Zero-day threats protection
Detecting C&C server
Hardware Applience
Working in in-band/out-of-band modes
Cloud
Threat Intelligence Feeds
SIEM Integration
Vulnerability manager
Uploading "Golden Image"
Using Multiple OSes
Multiple Versions of Sandbox App
Payload detonation
Auto-uploading files
URL analysis
Analyst console
Security Reports
Alerts via Email
Central Policy Management for Data Protection
Forensic analysis of data history
Automated remediation capabilities
Auto Update of Signatures
Trial