For VendorsBlog
Fortinet FortiSandbox

Add to comparison

Fortinet FortiSandbox

FortiSandbox delivers real-time actionable intelligence through the automation of zero-day, advanced malware detection and mitigation.

Features of product

Проблемы Problem Solving
  • Customer fraud
  • Malware infection via Internet, email, storage devices
  • No IT security guidelines
  • Non-compliant with IT security requirements
  • Risk of attacks by hackers
  • Risk of data loss or damage
  • Risk of lost access to data and IT systems
  • Risk or Leaks of confidential information
  • Unauthorized access to corporate IT systems and data
Ценности Business Values
  • Ensure Compliance
  • Ensure Security and Business Continuity
  • Reduce Costs
Матрица сравнения с конкурентами Matrix of comparison with competitors

About Product

With the increasing volume and sophistication of cyber-attacks, it takes only one threat to slip through security for a data breach to occur. CISOs have adopted sandboxing as an essential component of their security strategies to help combat previously unknown threats.

While attack surfaces are becoming more dynamic due to the rise of IoT and cloud-based services, a continuing shortage of cyber security talent is driving organizations to integrate sandboxing with greater controls and a high degree of automation.

Today’s threats are increasingly sophisticated and often bypass traditional malware security by masking their malicious activity. A sandbox augments your security architecture by validating threats in a separate, secure environment. FortiSandbox offers a powerful combination of advanced detection, automated mitigation, actionable insight, and flexible deployment to stop targeted attacks and subsequent data loss. It's also a key component of our Advanced Threat Protection solution.

Features and Benefits:

Independently top-rated. NSS Labs "Recommended" for breach detection and breach prevention, and ICSA labs certified for advanced threat defense.

Broad integration. Extends advanced threat protection to your next-generation firewall, web application firewall, secure email gateway, and endpoint protection platform.

Intelligent automation. Speeds mitigation by sharing real-time updates to disrupt threats at the origin and subsequent immunization across the entire organization and the global community.

All-in-one. Simplifies deployment and reduces complexity by covering all protocols in a single common sandbox platform.

Flexible deployment. Available as a physical or virtual appliance on premises, as well as a cloud-based or managed service.

Open extensibility. Flexible APIs for easy third-party integration and available day-zero integration with Fabric-Ready partners.



Web traffic scan
Email scan

Yes (must be integrated with FortiMail for threats blocking)

Endpoint protection
Mobile protection N/A
Malware Detection in files
Encrypted traffic scan

Yes (with FortiGate and FortiWeb integrations)

Network shares scan
YARA files scanning
YARA implementation by customer
Malware blocking by protocols

Features of users

Роли заинтересованных сотрудников Stakeholders Roles
  • Chief Information Officer
  • Chief IT Security Officer
  • IT Security and Risk Management
Признаки применимости Company requirements
  • Internet access is available for employees
  • GDPR Compliance
Продающие истории Use Cases

Determining if You’ve Outgrown Your First-Gen Sandbox

Продающия история

In a recent report, cyber crime was shown to cost the annual global economy over $450 billion, with over two billion personal records stolen worldwide and over 100 million medical records taken from United States citizens alone. With external threat actors responsible for more than 90% of security incidents, it is time to rethink how a sandbox solution should function within a larger defensive architecture designed for today’s networking environments. Read here.

Work flow chart