Introducing G2.ai, the future of software buying.Try now

Best Network Sandboxing Software

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Network sandboxing software provides a safe space for suspicious network traffic or objects can be evaluated against a database of known threats and assigned a malware probability score.

To qualify for inclusion in the Network Sandboxing category, a product must:

Provide an isolated space for threats to be evaluated
Maintain a library of known threats and assigned malware scores
Automatically submit suspicious objects to the sandbox for evaluation

Best Network Sandboxing Software At A Glance

Highest Performer:
Best Free Software:
Show LessShow More
Best Free Software:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
16 Listings in Network Sandboxing Available
(122)4.4 out of 5
1st Easiest To Use in Network Sandboxing software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Zscaler Internet Access™ (ZIA) is the world’s leading secure web gateway (SWG), delivering cloud native, AI-powered cyberthreat protection and zero trust access to the internet and SaaS apps. Enter

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 54% Enterprise
    • 22% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Zscaler Internet Access is a cloud-delivered service that handles all internet traffic and provides security by preventing access to unwanted sites.
    • Users like the ease of use, the seamless integration with other security tools, the intuitive user interface, the real-time traffic monitoring and filtering, and the responsive customer support.
    • Users experienced occasional latency during high traffic times, sudden internet disconnections, difficulty in initial setup, and issues with the pricing being less affordable for smaller businesses.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Zscaler Internet Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    15
    Ease of Use
    12
    Internet Security
    11
    Protection
    8
    Access Control
    6
    Cons
    Connection Issues
    10
    Internet Connectivity
    10
    Connectivity Issues
    8
    Slow Performance
    5
    Complex Setup
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Zscaler Internet Access features and usability ratings that predict user satisfaction
    8.5
    Malware Probability Scores
    Average: 9.0
    8.8
    Has the product been a good partner in doing business?
    Average: 8.7
    8.9
    Malware Evaluation
    Average: 9.3
    8.8
    Sandbox
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Zscaler
    Company Website
    Year Founded
    2008
    HQ Location
    San Jose, California
    Twitter
    @zscaler
    16,610 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8,674 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Zscaler Internet Access™ (ZIA) is the world’s leading secure web gateway (SWG), delivering cloud native, AI-powered cyberthreat protection and zero trust access to the internet and SaaS apps. Enter

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 54% Enterprise
  • 22% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Zscaler Internet Access is a cloud-delivered service that handles all internet traffic and provides security by preventing access to unwanted sites.
  • Users like the ease of use, the seamless integration with other security tools, the intuitive user interface, the real-time traffic monitoring and filtering, and the responsive customer support.
  • Users experienced occasional latency during high traffic times, sudden internet disconnections, difficulty in initial setup, and issues with the pricing being less affordable for smaller businesses.
Zscaler Internet Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
15
Ease of Use
12
Internet Security
11
Protection
8
Access Control
6
Cons
Connection Issues
10
Internet Connectivity
10
Connectivity Issues
8
Slow Performance
5
Complex Setup
4
Zscaler Internet Access features and usability ratings that predict user satisfaction
8.5
Malware Probability Scores
Average: 9.0
8.8
Has the product been a good partner in doing business?
Average: 8.7
8.9
Malware Evaluation
Average: 9.3
8.8
Sandbox
Average: 9.2
Seller Details
Seller
Zscaler
Company Website
Year Founded
2008
HQ Location
San Jose, California
Twitter
@zscaler
16,610 Twitter followers
LinkedIn® Page
www.linkedin.com
8,674 employees on LinkedIn®
(20)4.6 out of 5
3rd Easiest To Use in Network Sandboxing software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Fortinet’s top-rated FortiSandbox provides the on-site intelligence that enables the Fortinet Security Fabric to address the fast moving and more targeted threats across a broad attack surface. Specif

    Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 50% Mid-Market
    • 35% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FortiSandbox features and usability ratings that predict user satisfaction
    8.5
    Malware Probability Scores
    Average: 9.0
    8.8
    Has the product been a good partner in doing business?
    Average: 8.7
    9.1
    Malware Evaluation
    Average: 9.3
    9.7
    Sandbox
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortinet
    Year Founded
    2000
    HQ Location
    Sunnyvale, CA
    Twitter
    @Fortinet
    151,611 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    14,832 employees on LinkedIn®
    Ownership
    NASDAQ: FTNT
Product Description
How are these determined?Information
This description is provided by the seller.

Fortinet’s top-rated FortiSandbox provides the on-site intelligence that enables the Fortinet Security Fabric to address the fast moving and more targeted threats across a broad attack surface. Specif

Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 50% Mid-Market
  • 35% Small-Business
FortiSandbox features and usability ratings that predict user satisfaction
8.5
Malware Probability Scores
Average: 9.0
8.8
Has the product been a good partner in doing business?
Average: 8.7
9.1
Malware Evaluation
Average: 9.3
9.7
Sandbox
Average: 9.2
Seller Details
Seller
Fortinet
Year Founded
2000
HQ Location
Sunnyvale, CA
Twitter
@Fortinet
151,611 Twitter followers
LinkedIn® Page
www.linkedin.com
14,832 employees on LinkedIn®
Ownership
NASDAQ: FTNT

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 38% Small-Business
    • 31% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Kaspersky Sandbox features and usability ratings that predict user satisfaction
    8.6
    Malware Probability Scores
    Average: 9.0
    8.3
    Has the product been a good partner in doing business?
    Average: 8.7
    9.0
    Malware Evaluation
    Average: 9.3
    9.0
    Sandbox
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kaspersky
    Year Founded
    1997
    HQ Location
    Moscow
    Twitter
    @kasperskylabind
    1,309 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,258 employees on LinkedIn®
    Phone
    1-866-328-5700
Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 38% Small-Business
  • 31% Enterprise
Kaspersky Sandbox features and usability ratings that predict user satisfaction
8.6
Malware Probability Scores
Average: 9.0
8.3
Has the product been a good partner in doing business?
Average: 8.7
9.0
Malware Evaluation
Average: 9.3
9.0
Sandbox
Average: 9.2
Seller Details
Seller
Kaspersky
Year Founded
1997
HQ Location
Moscow
Twitter
@kasperskylabind
1,309 Twitter followers
LinkedIn® Page
www.linkedin.com
4,258 employees on LinkedIn®
Phone
1-866-328-5700
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Proofpoint Targeted Attack Protection (TAP) helps organizations efficiently detect, mitigate and respond to known and unknown advanced threats that target people and VIPs through email. TAP provides u

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 71% Enterprise
    • 24% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Proofpoint Targeted Attack Protection For Email features and usability ratings that predict user satisfaction
    8.7
    Malware Probability Scores
    Average: 9.0
    9.0
    Has the product been a good partner in doing business?
    Average: 8.7
    9.1
    Malware Evaluation
    Average: 9.3
    8.6
    Sandbox
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Sunnyvale, CA
    Twitter
    @proofpoint
    30,886 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,756 employees on LinkedIn®
    Ownership
    NASDAQ: PFPT
Product Description
How are these determined?Information
This description is provided by the seller.

Proofpoint Targeted Attack Protection (TAP) helps organizations efficiently detect, mitigate and respond to known and unknown advanced threats that target people and VIPs through email. TAP provides u

Users
No information available
Industries
No information available
Market Segment
  • 71% Enterprise
  • 24% Mid-Market
Proofpoint Targeted Attack Protection For Email features and usability ratings that predict user satisfaction
8.7
Malware Probability Scores
Average: 9.0
9.0
Has the product been a good partner in doing business?
Average: 8.7
9.1
Malware Evaluation
Average: 9.3
8.6
Sandbox
Average: 9.2
Seller Details
Year Founded
2002
HQ Location
Sunnyvale, CA
Twitter
@proofpoint
30,886 Twitter followers
LinkedIn® Page
www.linkedin.com
4,756 employees on LinkedIn®
Ownership
NASDAQ: PFPT
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Check Point’s multilayered security technology provides protection against advanced and zero-day cyber threats, preventing attacks, minimizing risks and offering rapid response

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 67% Mid-Market
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Check Point SandBlast Network Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security Protection
    2
    Threat Detection
    2
    Accuracy of Information
    1
    Customer Support
    1
    Deployment Ease
    1
    Cons
    Cost
    1
    Expensive
    1
    Limited Customization
    1
    Slow Loading
    1
    UX Improvement
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point SandBlast Network features and usability ratings that predict user satisfaction
    8.1
    Malware Probability Scores
    Average: 9.0
    9.4
    Has the product been a good partner in doing business?
    Average: 8.7
    9.2
    Malware Evaluation
    Average: 9.3
    9.4
    Sandbox
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    71,087 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,977 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

Check Point’s multilayered security technology provides protection against advanced and zero-day cyber threats, preventing attacks, minimizing risks and offering rapid response

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 67% Mid-Market
  • 33% Enterprise
Check Point SandBlast Network Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security Protection
2
Threat Detection
2
Accuracy of Information
1
Customer Support
1
Deployment Ease
1
Cons
Cost
1
Expensive
1
Limited Customization
1
Slow Loading
1
UX Improvement
1
Check Point SandBlast Network features and usability ratings that predict user satisfaction
8.1
Malware Probability Scores
Average: 9.0
9.4
Has the product been a good partner in doing business?
Average: 8.7
9.2
Malware Evaluation
Average: 9.3
9.4
Sandbox
Average: 9.2
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,087 Twitter followers
LinkedIn® Page
www.linkedin.com
7,977 employees on LinkedIn®
Ownership
NASDAQ:CHKP
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SandBlast Threat Emulation is a CPU-level threat detection software that prohibits network's infections from malware and targeted attacks.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 58% Enterprise
    • 42% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SandBlast Threat Emulation features and usability ratings that predict user satisfaction
    8.3
    Malware Probability Scores
    Average: 9.0
    8.3
    Has the product been a good partner in doing business?
    Average: 8.7
    9.2
    Malware Evaluation
    Average: 9.3
    8.9
    Sandbox
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    71,087 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,977 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

SandBlast Threat Emulation is a CPU-level threat detection software that prohibits network's infections from malware and targeted attacks.

Users
No information available
Industries
No information available
Market Segment
  • 58% Enterprise
  • 42% Mid-Market
SandBlast Threat Emulation features and usability ratings that predict user satisfaction
8.3
Malware Probability Scores
Average: 9.0
8.3
Has the product been a good partner in doing business?
Average: 8.7
9.2
Malware Evaluation
Average: 9.3
8.9
Sandbox
Average: 9.2
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,087 Twitter followers
LinkedIn® Page
www.linkedin.com
7,977 employees on LinkedIn®
Ownership
NASDAQ:CHKP
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Deep Discovery Analyzer Extend the value of your security investments with custom sandboxing

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 30% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Deep Discovery Inspector features and usability ratings that predict user satisfaction
    8.8
    Malware Probability Scores
    Average: 9.0
    8.3
    Has the product been a good partner in doing business?
    Average: 8.7
    8.8
    Malware Evaluation
    Average: 9.3
    8.3
    Sandbox
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Tokyo
    Twitter
    @trendmicro
    112,808 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,690 employees on LinkedIn®
    Ownership
    OTCMKTS:TMICY
Product Description
How are these determined?Information
This description is provided by the seller.

Deep Discovery Analyzer Extend the value of your security investments with custom sandboxing

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 30% Enterprise
Deep Discovery Inspector features and usability ratings that predict user satisfaction
8.8
Malware Probability Scores
Average: 9.0
8.3
Has the product been a good partner in doing business?
Average: 8.7
8.8
Malware Evaluation
Average: 9.3
8.3
Sandbox
Average: 9.2
Seller Details
Year Founded
1988
HQ Location
Tokyo
Twitter
@trendmicro
112,808 Twitter followers
LinkedIn® Page
www.linkedin.com
7,690 employees on LinkedIn®
Ownership
OTCMKTS:TMICY
(13)4.2 out of 5
4th Easiest To Use in Network Sandboxing software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The FortiGuard team develops effective countermeasures to protect more than 320,000 Fortinet customers around the world. These countermeasures include up-to-the-minute threat intelligence, delivered a

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 69% Mid-Market
    • 15% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FortiGuard Security Subscriptions features and usability ratings that predict user satisfaction
    9.2
    Malware Probability Scores
    Average: 9.0
    8.8
    Has the product been a good partner in doing business?
    Average: 8.7
    9.4
    Malware Evaluation
    Average: 9.3
    8.8
    Sandbox
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortinet
    Year Founded
    2000
    HQ Location
    Sunnyvale, CA
    Twitter
    @Fortinet
    151,611 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    14,832 employees on LinkedIn®
    Ownership
    NASDAQ: FTNT
Product Description
How are these determined?Information
This description is provided by the seller.

The FortiGuard team develops effective countermeasures to protect more than 320,000 Fortinet customers around the world. These countermeasures include up-to-the-minute threat intelligence, delivered a

Users
No information available
Industries
No information available
Market Segment
  • 69% Mid-Market
  • 15% Enterprise
FortiGuard Security Subscriptions features and usability ratings that predict user satisfaction
9.2
Malware Probability Scores
Average: 9.0
8.8
Has the product been a good partner in doing business?
Average: 8.7
9.4
Malware Evaluation
Average: 9.3
8.8
Sandbox
Average: 9.2
Seller Details
Seller
Fortinet
Year Founded
2000
HQ Location
Sunnyvale, CA
Twitter
@Fortinet
151,611 Twitter followers
LinkedIn® Page
www.linkedin.com
14,832 employees on LinkedIn®
Ownership
NASDAQ: FTNT
(192)4.5 out of 5
Optimized for quick response
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Intezer automates the entire alert triage process, like an extension of your team handling Tier 1 SOC tasks for every alert at machine-speed. Intezer monitors incoming incidents from endpoint, reporte

    Users
    • Software Engineer
    • Student
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 55% Small-Business
    • 23% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Intezer Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    5
    Easy Integrations
    3
    Features
    3
    Customer Support
    2
    Cybersecurity
    2
    Cons
    Complex Interface
    2
    Improvements Needed
    2
    Poor Interface Design
    2
    UX Improvement
    2
    Alert Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Intezer features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.6
    Has the product been a good partner in doing business?
    Average: 8.7
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Intezer
    Company Website
    Year Founded
    2015
    HQ Location
    New York
    Twitter
    @IntezerLabs
    10,270 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    58 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Intezer automates the entire alert triage process, like an extension of your team handling Tier 1 SOC tasks for every alert at machine-speed. Intezer monitors incoming incidents from endpoint, reporte

Users
  • Software Engineer
  • Student
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 55% Small-Business
  • 23% Mid-Market
Intezer Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
5
Easy Integrations
3
Features
3
Customer Support
2
Cybersecurity
2
Cons
Complex Interface
2
Improvements Needed
2
Poor Interface Design
2
UX Improvement
2
Alert Issues
1
Intezer features and usability ratings that predict user satisfaction
0.0
No information available
8.6
Has the product been a good partner in doing business?
Average: 8.7
0.0
No information available
0.0
No information available
Seller Details
Seller
Intezer
Company Website
Year Founded
2015
HQ Location
New York
Twitter
@IntezerLabs
10,270 Twitter followers
LinkedIn® Page
www.linkedin.com
58 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Detect and block advanced threats that elude traditional analysis with multiple-layer inspection and customizable sandboxing

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 37% Enterprise
    • 37% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Symantec Content Analysis and Sandboxing features and usability ratings that predict user satisfaction
    10.0
    Malware Probability Scores
    Average: 9.0
    10.0
    Has the product been a good partner in doing business?
    Average: 8.7
    10.0
    Malware Evaluation
    Average: 9.3
    10.0
    Sandbox
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Broadcom
    Year Founded
    1991
    HQ Location
    San Jose, CA
    Twitter
    @broadcom
    60,101 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    59,194 employees on LinkedIn®
    Ownership
    NASDAQ: CA
Product Description
How are these determined?Information
This description is provided by the seller.

Detect and block advanced threats that elude traditional analysis with multiple-layer inspection and customizable sandboxing

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 37% Enterprise
  • 37% Mid-Market
Symantec Content Analysis and Sandboxing features and usability ratings that predict user satisfaction
10.0
Malware Probability Scores
Average: 9.0
10.0
Has the product been a good partner in doing business?
Average: 8.7
10.0
Malware Evaluation
Average: 9.3
10.0
Sandbox
Average: 9.2
Seller Details
Seller
Broadcom
Year Founded
1991
HQ Location
San Jose, CA
Twitter
@broadcom
60,101 Twitter followers
LinkedIn® Page
www.linkedin.com
59,194 employees on LinkedIn®
Ownership
NASDAQ: CA
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all netwo

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 24% Enterprise
    • 21% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Check Point Infinity Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cybersecurity Protection
    3
    Artificial Intelligence
    2
    Centralized Management
    2
    Security
    2
    Backup Solutions
    1
    Cons
    Difficult Configuration
    1
    Difficult Navigation
    1
    Expensive
    1
    Learning Curve
    1
    Overwhelming Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point Infinity Platform features and usability ratings that predict user satisfaction
    9.0
    Malware Probability Scores
    Average: 9.0
    8.8
    Has the product been a good partner in doing business?
    Average: 8.7
    9.2
    Malware Evaluation
    Average: 9.3
    8.9
    Sandbox
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    71,087 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,977 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all netwo

Users
No information available
Industries
No information available
Market Segment
  • 24% Enterprise
  • 21% Small-Business
Check Point Infinity Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cybersecurity Protection
3
Artificial Intelligence
2
Centralized Management
2
Security
2
Backup Solutions
1
Cons
Difficult Configuration
1
Difficult Navigation
1
Expensive
1
Learning Curve
1
Overwhelming Features
1
Check Point Infinity Platform features and usability ratings that predict user satisfaction
9.0
Malware Probability Scores
Average: 9.0
8.8
Has the product been a good partner in doing business?
Average: 8.7
9.2
Malware Evaluation
Average: 9.3
8.9
Sandbox
Average: 9.2
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,087 Twitter followers
LinkedIn® Page
www.linkedin.com
7,977 employees on LinkedIn®
Ownership
NASDAQ:CHKP
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Deep Discovery Inspector is available as a physical or virtual network appliance. It's designed to quickly detect advanced malware that typically bypasses traditional security defenses and exfiltrates

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 41% Mid-Market
    • 35% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trend Micro Deep Discovery features and usability ratings that predict user satisfaction
    8.9
    Malware Probability Scores
    Average: 9.0
    9.2
    Has the product been a good partner in doing business?
    Average: 8.7
    10.0
    Malware Evaluation
    Average: 9.3
    8.9
    Sandbox
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Tokyo
    Twitter
    @trendmicro
    112,808 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,690 employees on LinkedIn®
    Ownership
    OTCMKTS:TMICY
Product Description
How are these determined?Information
This description is provided by the seller.

Deep Discovery Inspector is available as a physical or virtual network appliance. It's designed to quickly detect advanced malware that typically bypasses traditional security defenses and exfiltrates

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 41% Mid-Market
  • 35% Enterprise
Trend Micro Deep Discovery features and usability ratings that predict user satisfaction
8.9
Malware Probability Scores
Average: 9.0
9.2
Has the product been a good partner in doing business?
Average: 8.7
10.0
Malware Evaluation
Average: 9.3
8.9
Sandbox
Average: 9.2
Seller Details
Year Founded
1988
HQ Location
Tokyo
Twitter
@trendmicro
112,808 Twitter followers
LinkedIn® Page
www.linkedin.com
7,690 employees on LinkedIn®
Ownership
OTCMKTS:TMICY
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cloud Sandbox delivers a unique, advanced threat detection platform that can emulate the execution environment and analyze all activities related to malicious files, identify advanced threats and coll

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Hillstone Cloud Sandbox features and usability ratings that predict user satisfaction
    10.0
    Malware Probability Scores
    Average: 9.0
    6.7
    Has the product been a good partner in doing business?
    Average: 8.7
    8.3
    Malware Evaluation
    Average: 9.3
    10.0
    Sandbox
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2006
    HQ Location
    Santa Clara, CA
    Twitter
    @Hillstone_Net
    10,210 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    357 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cloud Sandbox delivers a unique, advanced threat detection platform that can emulate the execution environment and analyze all activities related to malicious files, identify advanced threats and coll

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Hillstone Cloud Sandbox features and usability ratings that predict user satisfaction
10.0
Malware Probability Scores
Average: 9.0
6.7
Has the product been a good partner in doing business?
Average: 8.7
8.3
Malware Evaluation
Average: 9.3
10.0
Sandbox
Average: 9.2
Seller Details
Year Founded
2006
HQ Location
Santa Clara, CA
Twitter
@Hillstone_Net
10,210 Twitter followers
LinkedIn® Page
www.linkedin.com
357 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Virtual appliance that simplifies management, automation, and orchestration of network and lab resources.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Software Defined Labs (SDL) features and usability ratings that predict user satisfaction
    10.0
    Malware Probability Scores
    Average: 9.0
    0.0
    No information available
    10.0
    Malware Evaluation
    Average: 9.3
    10.0
    Sandbox
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tokalabs
    LinkedIn® Page
    www.linkedin.com
    7 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Virtual appliance that simplifies management, automation, and orchestration of network and lab resources.

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Software Defined Labs (SDL) features and usability ratings that predict user satisfaction
10.0
Malware Probability Scores
Average: 9.0
0.0
No information available
10.0
Malware Evaluation
Average: 9.3
10.0
Sandbox
Average: 9.2
Seller Details
Seller
Tokalabs
LinkedIn® Page
www.linkedin.com
7 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AhnLab MDS is a sandbox solution that provides advanced threat detection, analysis, and response capabilities without compromising end-user systems. Why AhnLab MDS • Advanced Threat Detection The

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AhnLab MDS features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    AhnLab
    Year Founded
    1995
    HQ Location
    Gyeonggi-do, South Korea
    Twitter
    @AhnLab_man
    14,871 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    295 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

AhnLab MDS is a sandbox solution that provides advanced threat detection, analysis, and response capabilities without compromising end-user systems. Why AhnLab MDS • Advanced Threat Detection The

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
AhnLab MDS features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
AhnLab
Year Founded
1995
HQ Location
Gyeonggi-do, South Korea
Twitter
@AhnLab_man
14,871 Twitter followers
LinkedIn® Page
www.linkedin.com
295 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    With a user-friendly interface, cloud or on-prem based management options and a central control panel, you can easily manage all your endpoint devices (Computer, Mobile Device, Smart TV) from one plac

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • C-Prot Endpoint Security features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Twitter
    @cprottr
    182 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    16 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

With a user-friendly interface, cloud or on-prem based management options and a central control panel, you can easily manage all your endpoint devices (Computer, Mobile Device, Smart TV) from one plac

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
C-Prot Endpoint Security features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Twitter
@cprottr
182 Twitter followers
LinkedIn® Page
www.linkedin.com
16 employees on LinkedIn®