Fortinet FortiSandbox
Offer a reference bonus
2.00

Fortinet FortiSandbox

Fortinet

ROI-
USD
Using14
Selling4

PitchFortiSandbox delivers real-time actionable intelligence through the automation of zero-day, advanced malware detection and mitigation.

Product features

Description

With the increasing volume and sophistication of cyber-attacks, it takes only one threat to slip through security for a data breach to occur. CISOs have adopted sandboxing as an essential component of their security strategies to help combat previously unknown threats. While attack surfaces are becoming more dynamic due to the rise of IoT and cloud-based services, a continuing shortage of cyber security talent is driving organizations to integrate sandboxing with greater controls and a high degree of automation. Today’s threats are increasingly sophisticated and often bypass traditional malware security by masking their malicious activity. A sandbox augments your security architecture by validating threats in a separate, secure environment. FortiSandbox offers a powerful combination of advanced detection, automated mitigation, actionable insight, and flexible deployment to stop targeted attacks and subsequent data loss. It's also a key component of our Advanced Threat Protection solution. Features and Benefits: Independently top-rated. NSS Labs "Recommended" for breach detection and breach prevention, and ICSA labs certified for advanced threat defense. Broad integration. Extends advanced threat protection to your next-generation firewall, web application firewall, secure email gateway, and endpoint protection platform. Intelligent automation. Speeds mitigation by sharing real-time updates to disrupt threats at the origin and subsequent immunization across the entire organization and the global community. All-in-one. Simplifies deployment and reduces complexity by covering all protocols in a single common sandbox platform. Flexible deployment. Available as a physical or virtual appliance on premises, as well as a cloud-based or managed service. Open extensibility. Flexible APIs for easy third-party integration and available day-zero integration with Fabric-Ready partners.

Categories

Problems that the product solves

No IT security guidelines

Unauthorized access to corporate IT systems and data

Risk or Leaks of confidential information

Malware infection via Internet, email, storage devices

Risk of attacks by hackers

Risk of data loss or damage

Risk of lost access to data and IT systems

Non-compliant with IT security requirements

Customer fraud

Values

Reduce Costs

Ensure Security and Business Continuity

Ensure Compliance

Characteristics (Network Sandboxing)

Web traffic scan

Avaliable

Email scan

Yes (must be integrated with FortiMail for threats blocking)

Endpoint protection

Avaliable

Mobile protection

N/A

Malware Detection in files

Avaliable

Encrypted traffic scan

Yes (with FortiGate and FortiWeb integrations)

Network shares scan

Avaliable

YARA files scanning

Avaliable

YARA implementation by customer

Avaliable

Malware blocking by protocols

Avaliable

CPU-level detection

Avaliable

OS kernel level detection

Avaliable

Malware Samples

Avaliable

Zero-day threats protection

Avaliable

Detecting C&C server

Avaliable

Hardware Applience

Avaliable

Working in in-band/out-of-band modes

Avaliable

Cloud

Avaliable

Threat Intelligence Feeds

Avaliable

SIEM Integration

Avaliable

Vulnerability manager

Avaliable

Uploading "Golden Image"

N/A

Using Multiple OSes

Avaliable

Multiple Versions of Sandbox App

Avaliable

Payload detonation

Avaliable

Auto-uploading files

Avaliable

URL analysis

Avaliable

Analyst console

Avaliable

Security Reports

Periodic reports, Contextual reports on threats

Alerts via Email

Avaliable

Central Policy Management for Data Protection

Avaliable

Forensic analysis of data history

Avaliable

Automated remediation capabilities

Avaliable

Auto Update of Signatures

Avaliable

Trial

N/A

Scheme of work

 Scheme of work

Competitive products

prev
next

User features

Roles of Interested Employees

Chief Information Officer

Chief IT Security Officer

IT Security and Risk Management

Organizational Features

Internet access is available for employees

GDPR Compliance