Network Sandboxing
Web traffic scan
AvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableN/AAvaliableN/AAvaliableAvaliable
Email scan
YesN/AYesYesYesYesYesYesYes (must be integrated with FortiMail for threats blocking)N/AYesN/AYesN/AN/A
Endpoint protection
AvaliableN/AAvaliableAvaliableAvaliableAvaliableAvaliableN/AAvaliableN/AAvaliableAvaliableN/AAvaliableAvaliable
Mobile protection
N/AN/AN/AN/AAvaliableN/AAvaliableN/AN/AN/AN/AAvaliableAvaliableN/AAvaliable
Malware Detection in files
AvaliableN/AAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableN/AAvaliableAvaliableAvaliableAvaliableAvaliable
Encrypted traffic scan
N/AN/AN/AYesN/AN/AYesN/AYes (with FortiGate and FortiWeb integrations)N/AN/AYesN/AYes (using a third-party solutions)Yes
Network shares scan
N/AN/AN/AAvaliableAvaliableN/AAvaliableN/AAvaliableN/AN/AAvaliableN/AAvaliableAvaliable
YARA files scanning
N/AN/AAvaliableN/AN/AN/AAvaliableN/AAvaliableN/AAvaliableN/AN/AAvaliableN/A
YARA implementation by customer
N/AN/AAvaliableN/AN/AAvaliableAvaliableN/AAvaliableN/AAvaliableAvaliableN/AAvaliableN/A
Malware blocking by protocols
N/AN/AAvaliableAvaliableAvaliableN/AAvaliableN/AAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliable
CPU-level detection
N/AN/AN/AAvaliableN/AAvaliableAvaliableAvaliableAvaliableN/AN/AN/AN/AN/AN/A
OS kernel level detection
N/AN/AN/AAvaliableN/AN/AAvaliableAvaliableAvaliableN/AN/AN/AN/AAvaliableN/A
Malware Samples
N/AN/AAvaliableAvaliableAvaliableN/AAvaliableN/AAvaliableN/AAvaliableAvaliableN/AAvaliableAvaliable
Zero-day threats protection
N/AAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliable
Detecting C&C server
N/AN/AAvaliableAvaliableAvaliableN/AAvaliableN/AAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliable
Hardware Applience
AvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableN/AAvaliableAvaliableN/AAvaliableAvaliable
Working in in-band/out-of-band modes
AvaliableAvaliableAvaliableAvaliableAvaliableN/AAvaliableN/AAvaliableN/AAvaliableAvaliableN/AAvaliableAvaliable
Cloud
AvaliableN/AAvaliableAvaliableAvaliableN/AAvaliableAvaliableAvaliableN/AAvaliableAvaliableAvaliableAvaliableAvaliable
Threat Intelligence Feeds
AvaliableN/AAvaliableAvaliableAvaliableN/AAvaliableN/AAvaliableAvaliableAvaliableAvaliableAvaliableN/AAvaliable
SIEM Integration
AvaliableN/AAvaliableAvaliableAvaliableN/AAvaliableN/AAvaliableN/AAvaliableAvaliableN/AAvaliableAvaliable
Vulnerability manager
N/AN/AAvaliableN/AAvaliableN/AN/AN/AAvaliableAvaliableN/AAvaliableN/AAvaliableAvaliable
Uploading "Golden Image"
N/AN/AN/AN/AN/AN/AN/AN/AN/AN/AN/AN/AN/AN/AN/A
Using Multiple OSes
N/AN/AAvaliableAvaliableAvaliableN/AAvaliableN/AAvaliableN/AAvaliableAvaliableN/AAvaliableAvaliable
Multiple Versions of Sandbox App
N/AN/AAvaliableN/AN/AN/AAvaliableN/AAvaliableN/AAvaliableAvaliableN/AAvaliableAvaliable
Payload detonation
AvaliableN/AAvaliableAvaliableAvaliableAvaliableAvaliableN/AAvaliableN/AAvaliableAvaliableN/AAvaliableAvaliable
Auto-uploading files
N/AN/AAvaliableAvaliableAvaliableN/AAvaliableN/AAvaliableN/AAvaliableAvaliableN/AAvaliableAvaliable
URL analysis
N/AN/AAvaliableAvaliableAvaliableN/AAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliable
Analyst console
AvaliableN/AAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableN/AAvaliableAvaliable
Security Reports
  • Periodic reports
  • Contextual reports on threats
N/A
  • Periodic reports
  • Contextual reports on threats
  • Periodic reports
  • Contextual reports on threats
  • Periodic reports
  • Contextual reports on threats
N/A
  • Periodic reports
  • Contextual reports on threats
N/A
  • Periodic reports
  • Contextual reports on threats
  • Periodic reports
  • Contextual reports on threats
  • Periodic reports
  • Contextual reports on threats
  • Periodic reports
  • Contextual reports on threats
N/A
  • Periodic reports
  • Contextual reports on threats
  • Periodic reports
  • Contextual reports on threats
Alerts via Email
AvaliableN/AAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliable
Central Policy Management for Data Protection
AvaliableN/AAvaliableAvaliableAvaliableAvaliableAvaliableN/AAvaliableAvaliableAvaliableAvaliableN/AAvaliableAvaliable
Forensic analysis of data history
N/AN/AAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableN/AAvaliableAvaliable
Automated remediation capabilities
AvaliableN/AAvaliableAvaliableAvaliableN/AAvaliableN/AAvaliableAvaliableAvaliableAvaliableN/AAvaliableAvaliable
Auto Update of Signatures
N/AN/AAvaliableAvaliableAvaliableN/AAvaliableN/AAvaliableN/AAvaliableAvaliableN/AAvaliableAvaliable
Trial
YesN/AYesYesYesYesYesYesN/AYesYesYesYes (30 days)N/AYes
Network Sandboxing
Web traffic scan
Email scan
Endpoint protection
Mobile protection
Malware Detection in files
Encrypted traffic scan
Network shares scan
YARA files scanning
YARA implementation by customer
Malware blocking by protocols
CPU-level detection
OS kernel level detection
Malware Samples
Zero-day threats protection
Detecting C&C server
Hardware Applience
Working in in-band/out-of-band modes
Cloud
Threat Intelligence Feeds
SIEM Integration
Vulnerability manager
Uploading "Golden Image"
Using Multiple OSes
Multiple Versions of Sandbox App
Payload detonation
Auto-uploading files
URL analysis
Analyst console
Security Reports
Alerts via Email
Central Policy Management for Data Protection
Forensic analysis of data history
Automated remediation capabilities
Auto Update of Signatures
Trial