Show rating breakdown
Save to My Lists
Unclaimed
Unclaimed

Top Rated Hillstone Cloud Sandbox Alternatives

Hillstone Cloud Sandbox Reviews & Product Details

Hillstone Cloud Sandbox Overview

What is Hillstone Cloud Sandbox?

Cloud Sandbox delivers a unique, advanced threat detection platform that can emulate the execution environment and analyze all activities related to malicious files, identify advanced threats and collaborate with existing solutions to provide rapid remediation.

Hillstone Cloud Sandbox Details
Show LessShow More
Product Description

Cloud Sandbox delivers a unique, advanced threat detection platform that can emulate the execution environment and analyze all activities related to malicious files, identify advanced threats and collaborate with existing solutions to provide rapid remediation.


Seller Details
Year Founded
2006
HQ Location
Santa Clara, CA
Twitter
@Hillstone_Net
10,321 Twitter followers
LinkedIn® Page
www.linkedin.com
357 employees on LinkedIn®

Recent Hillstone Cloud Sandbox Reviews

Verified User
A
Verified UserMid-Market (51-1000 emp.)
4.0 out of 5
"Experience On Hill Stone Cloud Sandbox"
The Detection rate of anomalous files is comparatively efficient while compared to other vendors in the market and it also updated its file signatu...
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

Hillstone Cloud Sandbox Media

Answer a few questions to help the Hillstone Cloud Sandbox community
Have you used Hillstone Cloud Sandbox before?
Yes

1 Hillstone Cloud Sandbox Reviews

4.0 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
1 Hillstone Cloud Sandbox Reviews
4.0 out of 5
1 Hillstone Cloud Sandbox Reviews
4.0 out of 5
G2 reviews are authentic and verified.
Verified User in Information Technology and Services
AI
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: Organic
What do you like best about Hillstone Cloud Sandbox?

The Detection rate of anomalous files is comparatively efficient while compared to other vendors in the market and it also updated its file signatures comparatively fast. The reports which are generated in the sandbox is comprehensive with all the statistics. Review collected by and hosted on G2.com.

What do you dislike about Hillstone Cloud Sandbox?

It's mostly the user interface and administration sections that require upgrading. User interface and user experience have the biggest impact on the user experience. Review collected by and hosted on G2.com.

Recommendations to others considering Hillstone Cloud Sandbox:

It would be a cost-effective solution if you are planning to integrate a sandboxing feature into your company. Since its hosted in the cloud you do not have to worry about maintaining any hardware equipment. Review collected by and hosted on G2.com.

What problems is Hillstone Cloud Sandbox solving and how is that benefiting you?

Scanning of anomalous files which does not have any virus signatures are being blocked from the firewall itself, without getting into the network. In addition, it also enables to prevent of zero-day attacks. Review collected by and hosted on G2.com.

There are not enough reviews of Hillstone Cloud Sandbox for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Intezer Logo
Intezer
4.5
(192)
Automate your malware analysis. Get answers quickly about any suspicious file, URL, endpoint or memory dump.
2
Hybrid Cloud Security Logo
Hybrid Cloud Security
4.5
(175)
Hybrid Cloud Security solution, powered by XGen security, delivers a blend of cross-generational threat defense techniques that have been optimized to protect physical, virtual, and cloud workloads.
3
Palo Alto Networks Next-Generation Firewalls Logo
Palo Alto Networks Next-Generation Firewalls
4.5
(131)
Our next-generation firewall classifies all traffic, including encrypted traffic, based on application, application function, user and content. You can create comprehensive, precise security policies, resulting in safe enablement of applications. This lets only authorized users run sanctioned applications, greatly reducing the surface area of cyber attacks across the organization.
4
Zscaler Internet Access Logo
Zscaler Internet Access
4.4
(116)
Zscaler Internet Access delivers the complete security stack as a service from the cloud.
5
AlienVault USM (from AT&T Cybersecurity) Logo
AlienVault USM (from AT&T Cybersecurity)
4.4
(113)
AlienVault USM (from AT&T Cybersecurity) is a platform that provides five essential security capabilities in a single console to manage both compliance and threats, understanding the sensitive nature of IT environments, include active, passive and host-based technologies to match the requirements of each particular environment.
6
Blumira Automated Detection & Response Logo
Blumira Automated Detection & Response
4.6
(107)
Blumira's Automated SIEM enables organizations to detect and respond effectively to cybersecurity threats without having a dedicated in-house security operations center or security expertise.
7
Cisco Secure Firewall Threat Defense Virtual (formerly NGFWv) Logo
Cisco Secure Firewall Threat Defense Virtual (formerly NGFWv)
4.2
(91)
The Cisco Secure Firewall portfolio delivers greater protections for your network against an increasingly evolving and complex set of threats. With Cisco, you’re investing in a foundation for security that is both agile and integrated- leading to the strongest security posture available today and tomorrow. From your data center, branch offices, cloud environments, and everywhere in between, you can leverage the power of Cisco to turn your existing network infrastructure into an extension of your firewall solution, resulting in world class security controls everywhere you need them. Investing in a Secure Firewall appliance today gives you robust protections against even the most sophisticated threats without compromising performance when inspecting encrypted traffic. Further, integrations with other Cisco and 3rd party solutions provides you with a broad and deep portfolio of security products, all working together to correlate previously disconnected events, eliminate noise, and stop threats faster.
8
CrowdSec Logo
CrowdSec
4.7
(87)
CrowdSec is a collaborative, free and open source security automation platform relying on both IP behavior analysis and IP reputation. CrowdSec identifies threats and shares IP addresses behind malevolent behaviors across its community, to allow everyone to block them preventively. Used in 90 countries across 6 continents, the solution builds a real-time IP reputation database that keeps growing every day and benefits all community members who have each other's backs while forming a global defense shield.
9
Cloud-Delivered Security Services Logo
Cloud-Delivered Security Services
4.4
(82)
Our Cloud-Delivered Security Services are natively integrated, offering consistent best-in-class protection everywhere. Backed by our world-renowned Unit 42® Threat Research team, this one-of-a-kind protection uses the network effect of 65,000 global customers to share intelligence from all threat vectors to stop known, unknown and zero-day threats 180X faster than any other platform or point solution.
10
ExtraHop Logo
ExtraHop
4.6
(67)
ExtraHop Reveal(x) provides cloud-native visibility, detection, and response for the hybrid enterprise.
Show More