Best Network Sandboxing Software

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Network sandboxing software provides a safe space for suspicious network traffic or objects can be evaluated against a database of known threats and assigned a malware probability score.

To qualify for inclusion in the Network Sandboxing category, a product must:

Provide an isolated space for threats to be evaluated
Maintain a library of known threats and assigned malware scores
Automatically submit suspicious objects to the sandbox for evaluation

Best Network Sandboxing Software At A Glance

Highest User Satisfaction:
Best Free Software:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
19 Listings in Network Sandboxing Available
(116)4.4 out of 5
1st Easiest To Use in Network Sandboxing software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Zscaler Internet Access™ (ZIA) is the world’s leading secure web gateway (SWG), delivering cloud native, AI-powered cyberthreat protection and zero trust access to the internet and SaaS apps. Enter

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 54% Enterprise
    • 22% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Zscaler Internet Access is a cloud-based security service that proxies internet traffic and runs it through URL content filter lists, providing secure access to company internal tools and data.
    • Users like the ease of use, the ability to monitor and filter traffic in real time, the seamless integration with other security tools, and the responsive customer support that often replies within four hours.
    • Users mentioned issues such as latency during high traffic times, a complex configuration process, occasional connection issues impacting user experience, and a high pricing that may not be affordable for smaller businesses.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Zscaler Internet Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    29
    Internet Security
    23
    Ease of Use
    18
    Protection
    17
    Security Protection
    11
    Cons
    Connection Issues
    13
    Internet Connectivity
    10
    Slow Performance
    9
    Connectivity Issues
    7
    Complex Configuration
    6
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Zscaler Internet Access features and usability ratings that predict user satisfaction
    8.5
    Malware Probability Scores
    Average: 8.9
    9.0
    Has the product been a good partner in doing business?
    Average: 8.6
    8.9
    Malware Evaluation
    Average: 9.2
    8.8
    Sandbox
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Zscaler
    Company Website
    Year Founded
    2008
    HQ Location
    San Jose, California
    Twitter
    @zscaler
    16,396 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8,427 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Zscaler Internet Access™ (ZIA) is the world’s leading secure web gateway (SWG), delivering cloud native, AI-powered cyberthreat protection and zero trust access to the internet and SaaS apps. Enter

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 54% Enterprise
  • 22% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Zscaler Internet Access is a cloud-based security service that proxies internet traffic and runs it through URL content filter lists, providing secure access to company internal tools and data.
  • Users like the ease of use, the ability to monitor and filter traffic in real time, the seamless integration with other security tools, and the responsive customer support that often replies within four hours.
  • Users mentioned issues such as latency during high traffic times, a complex configuration process, occasional connection issues impacting user experience, and a high pricing that may not be affordable for smaller businesses.
Zscaler Internet Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
29
Internet Security
23
Ease of Use
18
Protection
17
Security Protection
11
Cons
Connection Issues
13
Internet Connectivity
10
Slow Performance
9
Connectivity Issues
7
Complex Configuration
6
Zscaler Internet Access features and usability ratings that predict user satisfaction
8.5
Malware Probability Scores
Average: 8.9
9.0
Has the product been a good partner in doing business?
Average: 8.6
8.9
Malware Evaluation
Average: 9.2
8.8
Sandbox
Average: 9.1
Seller Details
Seller
Zscaler
Company Website
Year Founded
2008
HQ Location
San Jose, California
Twitter
@zscaler
16,396 Twitter followers
LinkedIn® Page
www.linkedin.com
8,427 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 38% Small-Business
    • 31% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Kaspersky Sandbox features and usability ratings that predict user satisfaction
    8.6
    Malware Probability Scores
    Average: 8.9
    8.3
    Has the product been a good partner in doing business?
    Average: 8.6
    9.0
    Malware Evaluation
    Average: 9.2
    9.0
    Sandbox
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kaspersky
    Year Founded
    1997
    HQ Location
    Moscow
    Twitter
    @kasperskylabind
    1,323 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,057 employees on LinkedIn®
    Phone
    1-866-328-5700
Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 38% Small-Business
  • 31% Enterprise
Kaspersky Sandbox features and usability ratings that predict user satisfaction
8.6
Malware Probability Scores
Average: 8.9
8.3
Has the product been a good partner in doing business?
Average: 8.6
9.0
Malware Evaluation
Average: 9.2
9.0
Sandbox
Average: 9.1
Seller Details
Seller
Kaspersky
Year Founded
1997
HQ Location
Moscow
Twitter
@kasperskylabind
1,323 Twitter followers
LinkedIn® Page
www.linkedin.com
4,057 employees on LinkedIn®
Phone
1-866-328-5700

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(20)4.6 out of 5
3rd Easiest To Use in Network Sandboxing software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Fortinet’s top-rated FortiSandbox provides the on-site intelligence that enables the Fortinet Security Fabric to address the fast moving and more targeted threats across a broad attack surface. Specif

    Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 50% Mid-Market
    • 35% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FortiSandbox features and usability ratings that predict user satisfaction
    8.5
    Malware Probability Scores
    Average: 8.9
    8.8
    Has the product been a good partner in doing business?
    Average: 8.6
    9.1
    Malware Evaluation
    Average: 9.2
    9.7
    Sandbox
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortinet
    Year Founded
    2000
    HQ Location
    Sunnyvale, CA
    Twitter
    @Fortinet
    152,032 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    14,397 employees on LinkedIn®
    Ownership
    NASDAQ: FTNT
Product Description
How are these determined?Information
This description is provided by the seller.

Fortinet’s top-rated FortiSandbox provides the on-site intelligence that enables the Fortinet Security Fabric to address the fast moving and more targeted threats across a broad attack surface. Specif

Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 50% Mid-Market
  • 35% Small-Business
FortiSandbox features and usability ratings that predict user satisfaction
8.5
Malware Probability Scores
Average: 8.9
8.8
Has the product been a good partner in doing business?
Average: 8.6
9.1
Malware Evaluation
Average: 9.2
9.7
Sandbox
Average: 9.1
Seller Details
Seller
Fortinet
Year Founded
2000
HQ Location
Sunnyvale, CA
Twitter
@Fortinet
152,032 Twitter followers
LinkedIn® Page
www.linkedin.com
14,397 employees on LinkedIn®
Ownership
NASDAQ: FTNT
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Deep Discovery Analyzer Extend the value of your security investments with custom sandboxing

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 30% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Deep Discovery Inspector features and usability ratings that predict user satisfaction
    8.8
    Malware Probability Scores
    Average: 8.9
    8.3
    Has the product been a good partner in doing business?
    Average: 8.6
    8.8
    Malware Evaluation
    Average: 9.2
    8.3
    Sandbox
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Tokyo
    Twitter
    @trendmicro
    113,677 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,572 employees on LinkedIn®
    Ownership
    OTCMKTS:TMICY
Product Description
How are these determined?Information
This description is provided by the seller.

Deep Discovery Analyzer Extend the value of your security investments with custom sandboxing

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 30% Enterprise
Deep Discovery Inspector features and usability ratings that predict user satisfaction
8.8
Malware Probability Scores
Average: 8.9
8.3
Has the product been a good partner in doing business?
Average: 8.6
8.8
Malware Evaluation
Average: 9.2
8.3
Sandbox
Average: 9.1
Seller Details
Year Founded
1988
HQ Location
Tokyo
Twitter
@trendmicro
113,677 Twitter followers
LinkedIn® Page
www.linkedin.com
7,572 employees on LinkedIn®
Ownership
OTCMKTS:TMICY
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Proofpoint Targeted Attack Protection (TAP) helps organizations efficiently detect, mitigate and respond to known and unknown advanced threats that target people and VIPs through email. TAP provides u

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 71% Enterprise
    • 24% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Proofpoint Targeted Attack Protection For Email features and usability ratings that predict user satisfaction
    8.7
    Malware Probability Scores
    Average: 8.9
    9.0
    Has the product been a good partner in doing business?
    Average: 8.6
    9.1
    Malware Evaluation
    Average: 9.2
    8.6
    Sandbox
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Sunnyvale, CA
    Twitter
    @proofpoint
    30,859 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,697 employees on LinkedIn®
    Ownership
    NASDAQ: PFPT
Product Description
How are these determined?Information
This description is provided by the seller.

Proofpoint Targeted Attack Protection (TAP) helps organizations efficiently detect, mitigate and respond to known and unknown advanced threats that target people and VIPs through email. TAP provides u

Users
No information available
Industries
No information available
Market Segment
  • 71% Enterprise
  • 24% Mid-Market
Proofpoint Targeted Attack Protection For Email features and usability ratings that predict user satisfaction
8.7
Malware Probability Scores
Average: 8.9
9.0
Has the product been a good partner in doing business?
Average: 8.6
9.1
Malware Evaluation
Average: 9.2
8.6
Sandbox
Average: 9.1
Seller Details
Year Founded
2002
HQ Location
Sunnyvale, CA
Twitter
@proofpoint
30,859 Twitter followers
LinkedIn® Page
www.linkedin.com
4,697 employees on LinkedIn®
Ownership
NASDAQ: PFPT
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SandBlast Threat Emulation is a CPU-level threat detection software that prohibits network's infections from malware and targeted attacks.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 58% Enterprise
    • 42% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SandBlast Threat Emulation features and usability ratings that predict user satisfaction
    8.3
    Malware Probability Scores
    Average: 8.9
    8.3
    Has the product been a good partner in doing business?
    Average: 8.6
    9.2
    Malware Evaluation
    Average: 9.2
    8.9
    Sandbox
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    71,170 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,920 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

SandBlast Threat Emulation is a CPU-level threat detection software that prohibits network's infections from malware and targeted attacks.

Users
No information available
Industries
No information available
Market Segment
  • 58% Enterprise
  • 42% Mid-Market
SandBlast Threat Emulation features and usability ratings that predict user satisfaction
8.3
Malware Probability Scores
Average: 8.9
8.3
Has the product been a good partner in doing business?
Average: 8.6
9.2
Malware Evaluation
Average: 9.2
8.9
Sandbox
Average: 9.1
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,170 Twitter followers
LinkedIn® Page
www.linkedin.com
7,920 employees on LinkedIn®
Ownership
NASDAQ:CHKP
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Check Point’s multilayered security technology provides protection against advanced and zero-day cyber threats, preventing attacks, minimizing risks and offering rapid response

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 67% Mid-Market
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Check Point SandBlast Network Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security Protection
    2
    Threat Detection
    2
    Accuracy of Information
    1
    Customer Support
    1
    Deployment Ease
    1
    Cons
    Cost
    1
    Expensive
    1
    Limited Customization
    1
    Poor User Interface
    1
    Slow Loading
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point SandBlast Network features and usability ratings that predict user satisfaction
    8.1
    Malware Probability Scores
    Average: 8.9
    9.4
    Has the product been a good partner in doing business?
    Average: 8.6
    9.2
    Malware Evaluation
    Average: 9.2
    9.4
    Sandbox
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    71,170 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,920 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

Check Point’s multilayered security technology provides protection against advanced and zero-day cyber threats, preventing attacks, minimizing risks and offering rapid response

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 67% Mid-Market
  • 33% Enterprise
Check Point SandBlast Network Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security Protection
2
Threat Detection
2
Accuracy of Information
1
Customer Support
1
Deployment Ease
1
Cons
Cost
1
Expensive
1
Limited Customization
1
Poor User Interface
1
Slow Loading
1
Check Point SandBlast Network features and usability ratings that predict user satisfaction
8.1
Malware Probability Scores
Average: 8.9
9.4
Has the product been a good partner in doing business?
Average: 8.6
9.2
Malware Evaluation
Average: 9.2
9.4
Sandbox
Average: 9.1
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,170 Twitter followers
LinkedIn® Page
www.linkedin.com
7,920 employees on LinkedIn®
Ownership
NASDAQ:CHKP
(192)4.5 out of 5
Optimized for quick response
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Intezer automates the entire alert triage process, like an extension of your team handling Tier 1 SOC tasks for every alert at machine-speed. Intezer monitors incoming incidents from endpoint, reporte

    Users
    • Software Engineer
    • Student
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 55% Small-Business
    • 23% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Intezer Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    6
    Easy Integrations
    3
    Features
    3
    Security Protection
    3
    Customer Support
    2
    Cons
    Complex Interface
    2
    Improvements Needed
    2
    Information Deficiency
    2
    Poor Interface Design
    2
    Poor User Interface
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Intezer features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.6
    Has the product been a good partner in doing business?
    Average: 8.6
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Intezer
    Company Website
    Year Founded
    2015
    HQ Location
    New York
    Twitter
    @IntezerLabs
    10,252 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    48 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Intezer automates the entire alert triage process, like an extension of your team handling Tier 1 SOC tasks for every alert at machine-speed. Intezer monitors incoming incidents from endpoint, reporte

Users
  • Software Engineer
  • Student
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 55% Small-Business
  • 23% Mid-Market
Intezer Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
6
Easy Integrations
3
Features
3
Security Protection
3
Customer Support
2
Cons
Complex Interface
2
Improvements Needed
2
Information Deficiency
2
Poor Interface Design
2
Poor User Interface
2
Intezer features and usability ratings that predict user satisfaction
0.0
No information available
8.6
Has the product been a good partner in doing business?
Average: 8.6
0.0
No information available
0.0
No information available
Seller Details
Seller
Intezer
Company Website
Year Founded
2015
HQ Location
New York
Twitter
@IntezerLabs
10,252 Twitter followers
LinkedIn® Page
www.linkedin.com
48 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    McAfee Network Security Platform is a next-generation intrusion prevention system (IPS) that redefines how organizations block advanced threats.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 48% Small-Business
    • 29% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • McAfee Network Security Platform features and usability ratings that predict user satisfaction
    8.8
    Malware Probability Scores
    Average: 8.9
    8.8
    Has the product been a good partner in doing business?
    Average: 8.6
    9.2
    Malware Evaluation
    Average: 9.2
    8.3
    Sandbox
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    McAfee
    Year Founded
    1987
    HQ Location
    San Jose, US
    Twitter
    @McAfee_Home
    43,156 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,536 employees on LinkedIn®
    Ownership
    NASDAQ: MCFE
Product Description
How are these determined?Information
This description is provided by the seller.

McAfee Network Security Platform is a next-generation intrusion prevention system (IPS) that redefines how organizations block advanced threats.

Users
No information available
Industries
No information available
Market Segment
  • 48% Small-Business
  • 29% Mid-Market
McAfee Network Security Platform features and usability ratings that predict user satisfaction
8.8
Malware Probability Scores
Average: 8.9
8.8
Has the product been a good partner in doing business?
Average: 8.6
9.2
Malware Evaluation
Average: 9.2
8.3
Sandbox
Average: 9.1
Seller Details
Seller
McAfee
Year Founded
1987
HQ Location
San Jose, US
Twitter
@McAfee_Home
43,156 Twitter followers
LinkedIn® Page
www.linkedin.com
5,536 employees on LinkedIn®
Ownership
NASDAQ: MCFE
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    McAfee Advanced Threat Defense enhances protection from network edge to endpoint and enables investigation

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 47% Mid-Market
    • 47% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • McAfee Advanced Threat Defense features and usability ratings that predict user satisfaction
    9.0
    Malware Probability Scores
    Average: 8.9
    6.7
    Has the product been a good partner in doing business?
    Average: 8.6
    9.2
    Malware Evaluation
    Average: 9.2
    8.3
    Sandbox
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    McAfee
    Year Founded
    1987
    HQ Location
    San Jose, US
    Twitter
    @McAfee_Home
    43,156 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,536 employees on LinkedIn®
    Ownership
    NASDAQ: MCFE
Product Description
How are these determined?Information
This description is provided by the seller.

McAfee Advanced Threat Defense enhances protection from network edge to endpoint and enables investigation

Users
No information available
Industries
No information available
Market Segment
  • 47% Mid-Market
  • 47% Small-Business
McAfee Advanced Threat Defense features and usability ratings that predict user satisfaction
9.0
Malware Probability Scores
Average: 8.9
6.7
Has the product been a good partner in doing business?
Average: 8.6
9.2
Malware Evaluation
Average: 9.2
8.3
Sandbox
Average: 9.1
Seller Details
Seller
McAfee
Year Founded
1987
HQ Location
San Jose, US
Twitter
@McAfee_Home
43,156 Twitter followers
LinkedIn® Page
www.linkedin.com
5,536 employees on LinkedIn®
Ownership
NASDAQ: MCFE
(13)4.2 out of 5
4th Easiest To Use in Network Sandboxing software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The FortiGuard team develops effective countermeasures to protect more than 320,000 Fortinet customers around the world. These countermeasures include up-to-the-minute threat intelligence, delivered a

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 69% Mid-Market
    • 15% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FortiGuard Security Subscriptions features and usability ratings that predict user satisfaction
    9.2
    Malware Probability Scores
    Average: 8.9
    8.8
    Has the product been a good partner in doing business?
    Average: 8.6
    9.4
    Malware Evaluation
    Average: 9.2
    8.8
    Sandbox
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortinet
    Year Founded
    2000
    HQ Location
    Sunnyvale, CA
    Twitter
    @Fortinet
    152,032 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    14,397 employees on LinkedIn®
    Ownership
    NASDAQ: FTNT
Product Description
How are these determined?Information
This description is provided by the seller.

The FortiGuard team develops effective countermeasures to protect more than 320,000 Fortinet customers around the world. These countermeasures include up-to-the-minute threat intelligence, delivered a

Users
No information available
Industries
No information available
Market Segment
  • 69% Mid-Market
  • 15% Enterprise
FortiGuard Security Subscriptions features and usability ratings that predict user satisfaction
9.2
Malware Probability Scores
Average: 8.9
8.8
Has the product been a good partner in doing business?
Average: 8.6
9.4
Malware Evaluation
Average: 9.2
8.8
Sandbox
Average: 9.1
Seller Details
Seller
Fortinet
Year Founded
2000
HQ Location
Sunnyvale, CA
Twitter
@Fortinet
152,032 Twitter followers
LinkedIn® Page
www.linkedin.com
14,397 employees on LinkedIn®
Ownership
NASDAQ: FTNT
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Detect and block advanced threats that elude traditional analysis with multiple-layer inspection and customizable sandboxing

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 37% Enterprise
    • 37% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Symantec Content Analysis and Sandboxing features and usability ratings that predict user satisfaction
    10.0
    Malware Probability Scores
    Average: 8.9
    10.0
    Has the product been a good partner in doing business?
    Average: 8.6
    10.0
    Malware Evaluation
    Average: 9.2
    10.0
    Sandbox
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Broadcom
    Year Founded
    1991
    HQ Location
    San Jose, CA
    Twitter
    @broadcom
    59,378 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    61,034 employees on LinkedIn®
    Ownership
    NASDAQ: CA
Product Description
How are these determined?Information
This description is provided by the seller.

Detect and block advanced threats that elude traditional analysis with multiple-layer inspection and customizable sandboxing

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 37% Enterprise
  • 37% Mid-Market
Symantec Content Analysis and Sandboxing features and usability ratings that predict user satisfaction
10.0
Malware Probability Scores
Average: 8.9
10.0
Has the product been a good partner in doing business?
Average: 8.6
10.0
Malware Evaluation
Average: 9.2
10.0
Sandbox
Average: 9.1
Seller Details
Seller
Broadcom
Year Founded
1991
HQ Location
San Jose, CA
Twitter
@broadcom
59,378 Twitter followers
LinkedIn® Page
www.linkedin.com
61,034 employees on LinkedIn®
Ownership
NASDAQ: CA
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all netwo

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 35% Enterprise
    • 20% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point Infinity Platform features and usability ratings that predict user satisfaction
    9.0
    Malware Probability Scores
    Average: 8.9
    8.6
    Has the product been a good partner in doing business?
    Average: 8.6
    9.2
    Malware Evaluation
    Average: 9.2
    8.9
    Sandbox
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    71,170 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,920 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all netwo

Users
No information available
Industries
No information available
Market Segment
  • 35% Enterprise
  • 20% Small-Business
Check Point Infinity Platform features and usability ratings that predict user satisfaction
9.0
Malware Probability Scores
Average: 8.9
8.6
Has the product been a good partner in doing business?
Average: 8.6
9.2
Malware Evaluation
Average: 9.2
8.9
Sandbox
Average: 9.1
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,170 Twitter followers
LinkedIn® Page
www.linkedin.com
7,920 employees on LinkedIn®
Ownership
NASDAQ:CHKP
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Deep Discovery Inspector is available as a physical or virtual network appliance. It's designed to quickly detect advanced malware that typically bypasses traditional security defenses and exfiltrates

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 41% Mid-Market
    • 35% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trend Micro Deep Discovery features and usability ratings that predict user satisfaction
    8.9
    Malware Probability Scores
    Average: 8.9
    9.2
    Has the product been a good partner in doing business?
    Average: 8.6
    10.0
    Malware Evaluation
    Average: 9.2
    8.9
    Sandbox
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Tokyo
    Twitter
    @trendmicro
    113,677 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,572 employees on LinkedIn®
    Ownership
    OTCMKTS:TMICY
Product Description
How are these determined?Information
This description is provided by the seller.

Deep Discovery Inspector is available as a physical or virtual network appliance. It's designed to quickly detect advanced malware that typically bypasses traditional security defenses and exfiltrates

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 41% Mid-Market
  • 35% Enterprise
Trend Micro Deep Discovery features and usability ratings that predict user satisfaction
8.9
Malware Probability Scores
Average: 8.9
9.2
Has the product been a good partner in doing business?
Average: 8.6
10.0
Malware Evaluation
Average: 9.2
8.9
Sandbox
Average: 9.1
Seller Details
Year Founded
1988
HQ Location
Tokyo
Twitter
@trendmicro
113,677 Twitter followers
LinkedIn® Page
www.linkedin.com
7,572 employees on LinkedIn®
Ownership
OTCMKTS:TMICY
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Lastline’s Network Detection and Response platform delivers the visibility security professionals need to detect and contain sophisticated cyberthreats before they disrupt your business. We offer the

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 46% Mid-Market
    • 31% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Lastline Defender Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    5
    Artificial Intelligence
    3
    Features
    3
    AI Automation
    2
    Deployment Ease
    2
    Cons
    Limited Features
    4
    Poor Customer Support
    3
    Poor Documentation
    3
    Difficult Configuration
    2
    Inefficient Automation
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Lastline Defender features and usability ratings that predict user satisfaction
    8.3
    Malware Probability Scores
    Average: 8.9
    8.9
    Has the product been a good partner in doing business?
    Average: 8.6
    8.3
    Malware Evaluation
    Average: 9.2
    9.2
    Sandbox
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Lastline
    Year Founded
    2011
    HQ Location
    San Mateo, California
    Twitter
    @lastlineinc
    3,039 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Lastline’s Network Detection and Response platform delivers the visibility security professionals need to detect and contain sophisticated cyberthreats before they disrupt your business. We offer the

Users
No information available
Industries
No information available
Market Segment
  • 46% Mid-Market
  • 31% Enterprise
Lastline Defender Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
5
Artificial Intelligence
3
Features
3
AI Automation
2
Deployment Ease
2
Cons
Limited Features
4
Poor Customer Support
3
Poor Documentation
3
Difficult Configuration
2
Inefficient Automation
2
Lastline Defender features and usability ratings that predict user satisfaction
8.3
Malware Probability Scores
Average: 8.9
8.9
Has the product been a good partner in doing business?
Average: 8.6
8.3
Malware Evaluation
Average: 9.2
9.2
Sandbox
Average: 9.1
Seller Details
Seller
Lastline
Year Founded
2011
HQ Location
San Mateo, California
Twitter
@lastlineinc
3,039 Twitter followers
LinkedIn® Page
www.linkedin.com
4 employees on LinkedIn®