Network Sandboxing | |||||||||||||||
Web traffic scan | N/A | N/A | |||||||||||||
Email scan | Yes | N/A | Yes | Yes | Yes | Yes | Yes | Yes | Yes (must be integrated with FortiMail for threats blocking) | N/A | Yes | N/A | Yes | N/A | N/A |
Endpoint protection | N/A | N/A | N/A | N/A | |||||||||||
Mobile protection | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||||
Malware Detection in files | N/A | N/A | |||||||||||||
Encrypted traffic scan | N/A | N/A | N/A | Yes | N/A | N/A | Yes | N/A | Yes (with FortiGate and FortiWeb integrations) | N/A | N/A | Yes | N/A | Yes (using a third-party solutions) | Yes |
Network shares scan | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||||||
YARA files scanning | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||||
YARA implementation by customer | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||||||
Malware blocking by protocols | N/A | N/A | N/A | N/A | |||||||||||
CPU-level detection | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||||
OS kernel level detection | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||||
Malware Samples | N/A | N/A | N/A | N/A | N/A | N/A | |||||||||
Zero-day threats protection | N/A | ||||||||||||||
Detecting C&C server | N/A | N/A | N/A | N/A | |||||||||||
Hardware Applience | N/A | N/A | |||||||||||||
Working in in-band/out-of-band modes | N/A | N/A | N/A | N/A | |||||||||||
Cloud | N/A | N/A | N/A | ||||||||||||
Threat Intelligence Feeds | N/A | N/A | N/A | N/A | |||||||||||
SIEM Integration | N/A | N/A | N/A | N/A | N/A | ||||||||||
Vulnerability manager | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||||||
Uploading "Golden Image" | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A |
Using Multiple OSes | N/A | N/A | N/A | N/A | N/A | N/A | |||||||||
Multiple Versions of Sandbox App | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||||||
Payload detonation | N/A | N/A | N/A | N/A | |||||||||||
Auto-uploading files | N/A | N/A | N/A | N/A | N/A | N/A | |||||||||
URL analysis | N/A | N/A | N/A | ||||||||||||
Analyst console | N/A | N/A | |||||||||||||
Security Reports | N/A | N/A |
|
|
|
|
| N/A |
|
|
|
| N/A |
|
|
Alerts via Email | N/A | ||||||||||||||
Central Policy Management for Data Protection | N/A | N/A | N/A | ||||||||||||
Forensic analysis of data history | N/A | N/A | N/A | ||||||||||||
Automated remediation capabilities | N/A | N/A | N/A | N/A | |||||||||||
Auto Update of Signatures | N/A | N/A | N/A | N/A | N/A | N/A | |||||||||
Trial | Yes | N/A | Yes | Yes | Yes | Yes | Yes | Yes | N/A | Yes | Yes | Yes | Yes (30 days) | N/A | Yes |
Network Sandboxing |
Web traffic scan |
Email scan |
Endpoint protection |
Mobile protection |
Malware Detection in files |
Encrypted traffic scan |
Network shares scan |
YARA files scanning |
YARA implementation by customer |
Malware blocking by protocols |
CPU-level detection |
OS kernel level detection |
Malware Samples |
Zero-day threats protection |
Detecting C&C server |
Hardware Applience |
Working in in-band/out-of-band modes |
Cloud |
Threat Intelligence Feeds |
SIEM Integration |
Vulnerability manager |
Uploading "Golden Image" |
Using Multiple OSes |
Multiple Versions of Sandbox App |
Payload detonation |
Auto-uploading files |
URL analysis |
Analyst console |
Security Reports |
Alerts via Email |
Central Policy Management for Data Protection |
Forensic analysis of data history |
Automated remediation capabilities |
Auto Update of Signatures |
Trial |