For VendorsBlog
Login

Compare: Network Sandboxing

Characteristics

Web traffic scan

Email scan

N/A
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes (must be integrated with FortiMail for threats blocking)
N/A
Yes
N/A
Yes
N/A
N/A

Endpoint protection

Mobile protection

Malware Detection in files

Encrypted traffic scan

N/A
N/A
Yes
N/A
N/A
N/A
Yes
N/A
Yes (with FortiGate and FortiWeb integrations)
N/A
N/A
Yes
N/A
Yes (using a third-party solutions)
Yes

Network shares scan

YARA files scanning

YARA implementation by customer

Malware blocking by protocols

CPU-level detection

OS kernel level detection

Malware Samples

Zero-day threats protection

Detecting C&C server

Hardware Applience

Working in in-band/out-of-band modes

Cloud

Threat Intelligence Feeds

SIEM Integration

Vulnerability manager

Uploading "Golden Image"

Using Multiple OSes

Multiple Versions of Sandbox App

Payload detonation

Auto-uploading files

URL analysis

Analyst console

Security Reports

  • N/A
  • Periodic reports
  • Contextual reports on threats
  • Periodic reports
  • Contextual reports on threats
  • Periodic reports
  • Contextual reports on threats
  • Periodic reports
  • Contextual reports on threats
  • N/A
  • Periodic reports
  • Contextual reports on threats
  • N/A
  • Periodic reports
  • Contextual reports on threats
  • Periodic reports
  • Contextual reports on threats
  • Periodic reports
  • Contextual reports on threats
  • Periodic reports
  • Contextual reports on threats
  • N/A
  • Periodic reports
  • Contextual reports on threats
  • Periodic reports
  • Contextual reports on threats

Alerts via Email

Central Policy Management for Data Protection

Forensic analysis of data history

Automated remediation capabilities

Auto Update of Signatures

Trial

N/A
Yes
Yes
Yes
Yes
Yes
Yes
Yes
N/A
Yes
Yes
Yes
Yes (30 days)
N/A
Yes
Found mistake? Write us.