For VendorsBlog
Zscaler Cloud Sandbox

Add to comparison

Zscaler Cloud Sandbox

The Zscaler Cloud Sandbox service delivers full inline protection and provides a complete picture of the threats targeting your users.

Features of product

Проблемы Problem Solving
  • Customer fraud
  • Malware infection via Internet, email, storage devices
  • No IT security guidelines
  • Non-compliant with IT security requirements
  • Risk of attacks by hackers
  • Risk of data loss or damage
  • Risk of lost access to data and IT systems
  • Risk or Leaks of confidential information
  • Unauthorized access to corporate IT systems and data
Ценности Business Values
  • Ensure Compliance
  • Ensure Security and Business Continuity
  • Reduce Costs
Матрица сравнения с конкурентами Matrix of comparison with competitors

About Product

Zscaler Cloud Sandbox uses advanced behavioral analysis techniques to find and block zero-day threats. Delivered as a service from the Zscaler global security cloud, Zscaler Cloud Sandbox provides a higher level of threat protection than any other solution.

With Zscaler, you can sandbox any suspicious or unknown file without backhauling traffic to the data center. Since Zscaler Cloud Sandbox is implemented from the cloud, it protects all of your users, regardless of their locations. This means that remote office workers and mobile users get the same level of protection as the users at your headquarters, without costly MPLS links or cumbersome VPN connections. Zscaler Cloud Sandbox is architected to provide inline protection to block threats before they enter your network. Malicious files are instantly blocked, quarantined, or flagged based on your defined policies.

Unlike appliances, which work in isolation, Zscaler Cloud Sandbox is fully integrated into the Zscaler Cloud Security Platform to deliver maximum threat visibility and multilevel protection. Because Zscaler is delivered as a service, there is no hardware deploy and manage, and no software to update.

The processing power of Zscaler Cloud Sandbox lets us inspect all suspicious and unknown files with efficiency. Data is correlated across multiple security engines to identify and block sophisticated threats that go undetected by traditional appliances. By performing this in-depth level of sandbox pre-processing, we streamline the detection of suspicious files and improve the user experience. And because SSL inspection is native to the cloud security platform, the tactic of hiding attacks behind encryption fails as well. Malicious files are instantly blocked, quarantined, or flagged based on your defined policy, which can be easily scaled across all users.

Zscaler Cloud Sandbox uses cloud intelligence gained from more than 60 billion transactions processed every day at peak periods and more than 120,000 unique security updates. Once a threat is identified anywhere in the Zscaler cloud, it is immediately blocked for all customers. By default, the Zscaler security cloud sandboxes all executables and libraries to improve the protection to all customers. Zscaler also incorporates over 40 partner threat feeds to make sure the latest threat intelligence is applied across the cloud, which minimizes the number of files that need to be sandboxed.

Zscaler Cloud Sandbox provides:

Integrated platform service

  • Pre-filters all known threats using threat feeds from 40+ security partners
  • Offers native SSL inspection to close security gaps
  • Provides APT protection — for both inbound and outbound traffic
  • Delivers rich forensics — including intelligence on users, locations, origins, and evasive tactics

Inline inspection of all suspicious and unknown files

  • Fully analyzes executables, libraries, Office documents, archives, and web and mobile content
  • Enforces patient-zero quarantines
  • Enables manual file submission via a sandbox scanning portal

Uniform policies across all users and locations

  • Defines global policies from a single console
  • Enforces policy changes immediately across all users, regardless of location


Simply Scalable. Break free from costly gateway-based architectures. Scale protection across all users and all locations with ease from the cloud.

Better Protection. Deliver a fully integrated sandbox solution that can inspect all traffic, including SSL, without performance limitations.

Cost-Effective. Minimize IT procurement and administration costs with protection that easily grows with your needs.

Cloud Intelligence. Empower your sandbox with the power and visibility of the world’s largest security cloud.



Web traffic scan
Email scan


Endpoint protection
Mobile protection
Malware Detection in files
Encrypted traffic scan


Network shares scan
YARA files scanning N/A
YARA implementation by customer N/A
Malware blocking by protocols