Best Network Sandboxing Software

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Network sandboxing software provides a safe space for suspicious network traffic or objects can be evaluated against a database of known threats and assigned a malware probability score.

To qualify for inclusion in the Network Sandboxing category, a product must:

  • Provide an isolated space for threats to be evaluated
  • Maintain a library of known threats and assigned malware scores
  • Automatically submit suspicious objects to the sandbox for evaluation

Best Network Sandboxing Software At A Glance

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
17 Listings in Network Sandboxing Available
(121)4.4 out of 5
1st Easiest To Use in Network Sandboxing software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Zscaler Internet Access™ (ZIA) is the world’s leading secure web gateway (SWG), delivering cloud native, AI-powered cyberthreat protection and zero trust access to the internet and SaaS apps. Enter

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 55% Enterprise
    • 22% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Zscaler Internet Access is a cloud-delivered service that handles all internet traffic and provides security by preventing access to unwanted sites.
    • Users like the ease of use, the seamless integration with other security tools, the intuitive user interface, the real-time traffic monitoring and filtering, and the responsive customer support.
    • Users experienced occasional latency during high traffic times, sudden internet disconnections, difficulty in initial setup, and issues with the pricing being less affordable for smaller businesses.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Zscaler Internet Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    22
    Internet Security
    16
    Ease of Use
    14
    Protection
    14
    Security Protection
    9
    Cons
    Connection Issues
    11
    Internet Connectivity
    10
    Connectivity Issues
    8
    Slow Performance
    7
    Expensive
    6
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Zscaler Internet Access features and usability ratings that predict user satisfaction
    8.5
    Malware Probability Scores
    Average: 9.0
    8.8
    Has the product been a good partner in doing business?
    Average: 8.7
    8.9
    Malware Evaluation
    Average: 9.2
    8.8
    Sandbox
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Zscaler
    Company Website
    Year Founded
    2008
    HQ Location
    San Jose, California
    Twitter
    @zscaler
    16,542 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8,674 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Zscaler Internet Access™ (ZIA) is the world’s leading secure web gateway (SWG), delivering cloud native, AI-powered cyberthreat protection and zero trust access to the internet and SaaS apps. Enter

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 55% Enterprise
  • 22% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Zscaler Internet Access is a cloud-delivered service that handles all internet traffic and provides security by preventing access to unwanted sites.
  • Users like the ease of use, the seamless integration with other security tools, the intuitive user interface, the real-time traffic monitoring and filtering, and the responsive customer support.
  • Users experienced occasional latency during high traffic times, sudden internet disconnections, difficulty in initial setup, and issues with the pricing being less affordable for smaller businesses.
Zscaler Internet Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
22
Internet Security
16
Ease of Use
14
Protection
14
Security Protection
9
Cons
Connection Issues
11
Internet Connectivity
10
Connectivity Issues
8
Slow Performance
7
Expensive
6
Zscaler Internet Access features and usability ratings that predict user satisfaction
8.5
Malware Probability Scores
Average: 9.0
8.8
Has the product been a good partner in doing business?
Average: 8.7
8.9
Malware Evaluation
Average: 9.2
8.8
Sandbox
Average: 9.2
Seller Details
Seller
Zscaler
Company Website
Year Founded
2008
HQ Location
San Jose, California
Twitter
@zscaler
16,542 Twitter followers
LinkedIn® Page
www.linkedin.com
8,674 employees on LinkedIn®
(20)4.6 out of 5
3rd Easiest To Use in Network Sandboxing software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Fortinet’s top-rated FortiSandbox provides the on-site intelligence that enables the Fortinet Security Fabric to address the fast moving and more targeted threats across a broad attack surface. Specif

    Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 50% Mid-Market
    • 35% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FortiSandbox features and usability ratings that predict user satisfaction
    8.5
    Malware Probability Scores
    Average: 9.0
    8.8
    Has the product been a good partner in doing business?
    Average: 8.7
    9.1
    Malware Evaluation
    Average: 9.2
    9.7
    Sandbox
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortinet
    Year Founded
    2000
    HQ Location
    Sunnyvale, CA
    Twitter
    @Fortinet
    151,531 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    14,832 employees on LinkedIn®
    Ownership
    NASDAQ: FTNT
Product Description
How are these determined?Information
This description is provided by the seller.

Fortinet’s top-rated FortiSandbox provides the on-site intelligence that enables the Fortinet Security Fabric to address the fast moving and more targeted threats across a broad attack surface. Specif

Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 50% Mid-Market
  • 35% Small-Business
FortiSandbox features and usability ratings that predict user satisfaction
8.5
Malware Probability Scores
Average: 9.0
8.8
Has the product been a good partner in doing business?
Average: 8.7
9.1
Malware Evaluation
Average: 9.2
9.7
Sandbox
Average: 9.2
Seller Details
Seller
Fortinet
Year Founded
2000
HQ Location
Sunnyvale, CA
Twitter
@Fortinet
151,531 Twitter followers
LinkedIn® Page
www.linkedin.com
14,832 employees on LinkedIn®
Ownership
NASDAQ: FTNT

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 38% Small-Business
    • 31% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Kaspersky Sandbox features and usability ratings that predict user satisfaction
    8.6
    Malware Probability Scores
    Average: 9.0
    8.3
    Has the product been a good partner in doing business?
    Average: 8.7
    9.0
    Malware Evaluation
    Average: 9.2
    9.0
    Sandbox
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kaspersky
    Year Founded
    1997
    HQ Location
    Moscow
    Twitter
    @kasperskylabind
    1,307 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,258 employees on LinkedIn®
    Phone
    1-866-328-5700
Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 38% Small-Business
  • 31% Enterprise
Kaspersky Sandbox features and usability ratings that predict user satisfaction
8.6
Malware Probability Scores
Average: 9.0
8.3
Has the product been a good partner in doing business?
Average: 8.7
9.0
Malware Evaluation
Average: 9.2
9.0
Sandbox
Average: 9.2
Seller Details
Seller
Kaspersky
Year Founded
1997
HQ Location
Moscow
Twitter
@kasperskylabind
1,307 Twitter followers
LinkedIn® Page
www.linkedin.com
4,258 employees on LinkedIn®
Phone
1-866-328-5700
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Proofpoint Targeted Attack Protection (TAP) helps organizations efficiently detect, mitigate and respond to known and unknown advanced threats that target people and VIPs through email. TAP provides u

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 71% Enterprise
    • 24% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Proofpoint Targeted Attack Protection For Email features and usability ratings that predict user satisfaction
    8.7
    Malware Probability Scores
    Average: 9.0
    9.0
    Has the product been a good partner in doing business?
    Average: 8.7
    9.1
    Malware Evaluation
    Average: 9.2
    8.6
    Sandbox
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Sunnyvale, CA
    Twitter
    @proofpoint
    30,832 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,756 employees on LinkedIn®
    Ownership
    NASDAQ: PFPT
Product Description
How are these determined?Information
This description is provided by the seller.

Proofpoint Targeted Attack Protection (TAP) helps organizations efficiently detect, mitigate and respond to known and unknown advanced threats that target people and VIPs through email. TAP provides u

Users
No information available
Industries
No information available
Market Segment
  • 71% Enterprise
  • 24% Mid-Market
Proofpoint Targeted Attack Protection For Email features and usability ratings that predict user satisfaction
8.7
Malware Probability Scores
Average: 9.0
9.0
Has the product been a good partner in doing business?
Average: 8.7
9.1
Malware Evaluation
Average: 9.2
8.6
Sandbox
Average: 9.2
Seller Details
Year Founded
2002
HQ Location
Sunnyvale, CA
Twitter
@proofpoint
30,832 Twitter followers
LinkedIn® Page
www.linkedin.com
4,756 employees on LinkedIn®
Ownership
NASDAQ: PFPT
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Check Point’s multilayered security technology provides protection against advanced and zero-day cyber threats, preventing attacks, minimizing risks and offering rapid response

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 67% Mid-Market
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Check Point SandBlast Network Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security Protection
    2
    Threat Detection
    2
    Accuracy of Information
    1
    Customer Support
    1
    Deployment Ease
    1
    Cons
    Cost
    1
    Expensive
    1
    Limited Customization
    1
    Poor User Interface
    1
    Slow Loading
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point SandBlast Network features and usability ratings that predict user satisfaction
    8.1
    Malware Probability Scores
    Average: 9.0
    9.4
    Has the product been a good partner in doing business?
    Average: 8.7
    9.2
    Malware Evaluation
    Average: 9.2
    9.4
    Sandbox
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    71,015 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,977 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

Check Point’s multilayered security technology provides protection against advanced and zero-day cyber threats, preventing attacks, minimizing risks and offering rapid response

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 67% Mid-Market
  • 33% Enterprise
Check Point SandBlast Network Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security Protection
2
Threat Detection
2
Accuracy of Information
1
Customer Support
1
Deployment Ease
1
Cons
Cost
1
Expensive
1
Limited Customization
1
Poor User Interface
1
Slow Loading
1
Check Point SandBlast Network features and usability ratings that predict user satisfaction
8.1
Malware Probability Scores
Average: 9.0
9.4
Has the product been a good partner in doing business?
Average: 8.7
9.2
Malware Evaluation
Average: 9.2
9.4
Sandbox
Average: 9.2
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,015 Twitter followers
LinkedIn® Page
www.linkedin.com
7,977 employees on LinkedIn®
Ownership
NASDAQ:CHKP
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SandBlast Threat Emulation is a CPU-level threat detection software that prohibits network's infections from malware and targeted attacks.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 58% Enterprise
    • 42% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SandBlast Threat Emulation features and usability ratings that predict user satisfaction
    8.3
    Malware Probability Scores
    Average: 9.0
    8.3
    Has the product been a good partner in doing business?
    Average: 8.7
    9.2
    Malware Evaluation
    Average: 9.2
    8.9
    Sandbox
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    71,015 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,977 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

SandBlast Threat Emulation is a CPU-level threat detection software that prohibits network's infections from malware and targeted attacks.

Users
No information available
Industries
No information available
Market Segment
  • 58% Enterprise
  • 42% Mid-Market
SandBlast Threat Emulation features and usability ratings that predict user satisfaction
8.3
Malware Probability Scores
Average: 9.0
8.3
Has the product been a good partner in doing business?
Average: 8.7
9.2
Malware Evaluation
Average: 9.2
8.9
Sandbox
Average: 9.2
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,015 Twitter followers
LinkedIn® Page
www.linkedin.com
7,977 employees on LinkedIn®
Ownership
NASDAQ:CHKP
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Deep Discovery Analyzer Extend the value of your security investments with custom sandboxing

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 30% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Deep Discovery Inspector features and usability ratings that predict user satisfaction
    8.8
    Malware Probability Scores
    Average: 9.0
    8.3
    Has the product been a good partner in doing business?
    Average: 8.7
    8.8
    Malware Evaluation
    Average: 9.2
    8.3
    Sandbox
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Tokyo
    Twitter
    @trendmicro
    112,749 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,690 employees on LinkedIn®
    Ownership
    OTCMKTS:TMICY
Product Description
How are these determined?Information
This description is provided by the seller.

Deep Discovery Analyzer Extend the value of your security investments with custom sandboxing

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 30% Enterprise
Deep Discovery Inspector features and usability ratings that predict user satisfaction
8.8
Malware Probability Scores
Average: 9.0
8.3
Has the product been a good partner in doing business?
Average: 8.7
8.8
Malware Evaluation
Average: 9.2
8.3
Sandbox
Average: 9.2
Seller Details
Year Founded
1988
HQ Location
Tokyo
Twitter
@trendmicro
112,749 Twitter followers
LinkedIn® Page
www.linkedin.com
7,690 employees on LinkedIn®
Ownership
OTCMKTS:TMICY
(13)4.2 out of 5
4th Easiest To Use in Network Sandboxing software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The FortiGuard team develops effective countermeasures to protect more than 320,000 Fortinet customers around the world. These countermeasures include up-to-the-minute threat intelligence, delivered a

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 69% Mid-Market
    • 15% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FortiGuard Security Subscriptions features and usability ratings that predict user satisfaction
    9.2
    Malware Probability Scores
    Average: 9.0
    8.8
    Has the product been a good partner in doing business?
    Average: 8.7
    9.4
    Malware Evaluation
    Average: 9.2
    8.8
    Sandbox
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortinet
    Year Founded
    2000
    HQ Location
    Sunnyvale, CA
    Twitter
    @Fortinet
    151,531 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    14,832 employees on LinkedIn®
    Ownership
    NASDAQ: FTNT
Product Description
How are these determined?Information
This description is provided by the seller.

The FortiGuard team develops effective countermeasures to protect more than 320,000 Fortinet customers around the world. These countermeasures include up-to-the-minute threat intelligence, delivered a

Users
No information available
Industries
No information available
Market Segment
  • 69% Mid-Market
  • 15% Enterprise
FortiGuard Security Subscriptions features and usability ratings that predict user satisfaction
9.2
Malware Probability Scores
Average: 9.0
8.8
Has the product been a good partner in doing business?
Average: 8.7
9.4
Malware Evaluation
Average: 9.2
8.8
Sandbox
Average: 9.2
Seller Details
Seller
Fortinet
Year Founded
2000
HQ Location
Sunnyvale, CA
Twitter
@Fortinet
151,531 Twitter followers
LinkedIn® Page
www.linkedin.com
14,832 employees on LinkedIn®
Ownership
NASDAQ: FTNT
(192)4.5 out of 5
Optimized for quick response
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Intezer automates the entire alert triage process, like an extension of your team handling Tier 1 SOC tasks for every alert at machine-speed. Intezer monitors incoming incidents from endpoint, reporte

    Users
    • Software Engineer
    • Student
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 55% Small-Business
    • 23% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Intezer Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    5
    Easy Integrations
    3
    Features
    3
    Security Protection
    3
    Customer Support
    2
    Cons
    Complex Interface
    2
    Improvements Needed
    2
    Poor Interface Design
    2
    Poor User Interface
    2
    Alert Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Intezer features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.6
    Has the product been a good partner in doing business?
    Average: 8.7
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Intezer
    Company Website
    Year Founded
    2015
    HQ Location
    New York
    Twitter
    @IntezerLabs
    10,254 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    58 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Intezer automates the entire alert triage process, like an extension of your team handling Tier 1 SOC tasks for every alert at machine-speed. Intezer monitors incoming incidents from endpoint, reporte

Users
  • Software Engineer
  • Student
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 55% Small-Business
  • 23% Mid-Market
Intezer Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
5
Easy Integrations
3
Features
3
Security Protection
3
Customer Support
2
Cons
Complex Interface
2
Improvements Needed
2
Poor Interface Design
2
Poor User Interface
2
Alert Issues
1
Intezer features and usability ratings that predict user satisfaction
0.0
No information available
8.6
Has the product been a good partner in doing business?
Average: 8.7
0.0
No information available
0.0
No information available
Seller Details
Seller
Intezer
Company Website
Year Founded
2015
HQ Location
New York
Twitter
@IntezerLabs
10,254 Twitter followers
LinkedIn® Page
www.linkedin.com
58 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Detect and block advanced threats that elude traditional analysis with multiple-layer inspection and customizable sandboxing

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 37% Enterprise
    • 37% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Symantec Content Analysis and Sandboxing features and usability ratings that predict user satisfaction
    10.0
    Malware Probability Scores
    Average: 9.0
    10.0
    Has the product been a good partner in doing business?
    Average: 8.7
    10.0
    Malware Evaluation
    Average: 9.2
    10.0
    Sandbox
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Broadcom
    Year Founded
    1991
    HQ Location
    San Jose, CA
    Twitter
    @broadcom
    59,880 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    59,194 employees on LinkedIn®
    Ownership
    NASDAQ: CA
Product Description
How are these determined?Information
This description is provided by the seller.

Detect and block advanced threats that elude traditional analysis with multiple-layer inspection and customizable sandboxing

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 37% Enterprise
  • 37% Mid-Market
Symantec Content Analysis and Sandboxing features and usability ratings that predict user satisfaction
10.0
Malware Probability Scores
Average: 9.0
10.0
Has the product been a good partner in doing business?
Average: 8.7
10.0
Malware Evaluation
Average: 9.2
10.0
Sandbox
Average: 9.2
Seller Details
Seller
Broadcom
Year Founded
1991
HQ Location
San Jose, CA
Twitter
@broadcom
59,880 Twitter followers
LinkedIn® Page
www.linkedin.com
59,194 employees on LinkedIn®
Ownership
NASDAQ: CA
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all netwo

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 25% Enterprise
    • 21% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Check Point Infinity Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Artificial Intelligence
    1
    Centralized Management
    1
    Cybersecurity Protection
    1
    Ease of Use
    1
    Platform Compatibility
    1
    Cons
    Difficult Configuration
    1
    Difficult Navigation
    1
    Overwhelming Features
    1
    Visibility Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point Infinity Platform features and usability ratings that predict user satisfaction
    9.0
    Malware Probability Scores
    Average: 9.0
    8.8
    Has the product been a good partner in doing business?
    Average: 8.7
    9.2
    Malware Evaluation
    Average: 9.2
    8.9
    Sandbox
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    71,015 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,977 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all netwo

Users
No information available
Industries
No information available
Market Segment
  • 25% Enterprise
  • 21% Small-Business
Check Point Infinity Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Artificial Intelligence
1
Centralized Management
1
Cybersecurity Protection
1
Ease of Use
1
Platform Compatibility
1
Cons
Difficult Configuration
1
Difficult Navigation
1
Overwhelming Features
1
Visibility Issues
1
Check Point Infinity Platform features and usability ratings that predict user satisfaction
9.0
Malware Probability Scores
Average: 9.0
8.8
Has the product been a good partner in doing business?
Average: 8.7
9.2
Malware Evaluation
Average: 9.2
8.9
Sandbox
Average: 9.2
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,015 Twitter followers
LinkedIn® Page
www.linkedin.com
7,977 employees on LinkedIn®
Ownership
NASDAQ:CHKP
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Deep Discovery Inspector is available as a physical or virtual network appliance. It's designed to quickly detect advanced malware that typically bypasses traditional security defenses and exfiltrates

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 41% Mid-Market
    • 35% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trend Micro Deep Discovery features and usability ratings that predict user satisfaction
    8.9
    Malware Probability Scores
    Average: 9.0
    9.2
    Has the product been a good partner in doing business?
    Average: 8.7
    10.0
    Malware Evaluation
    Average: 9.2
    8.9
    Sandbox
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Tokyo
    Twitter
    @trendmicro
    112,749 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,690 employees on LinkedIn®
    Ownership
    OTCMKTS:TMICY
Product Description
How are these determined?Information
This description is provided by the seller.

Deep Discovery Inspector is available as a physical or virtual network appliance. It's designed to quickly detect advanced malware that typically bypasses traditional security defenses and exfiltrates

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 41% Mid-Market
  • 35% Enterprise
Trend Micro Deep Discovery features and usability ratings that predict user satisfaction
8.9
Malware Probability Scores
Average: 9.0
9.2
Has the product been a good partner in doing business?
Average: 8.7
10.0
Malware Evaluation
Average: 9.2
8.9
Sandbox
Average: 9.2
Seller Details
Year Founded
1988
HQ Location
Tokyo
Twitter
@trendmicro
112,749 Twitter followers
LinkedIn® Page
www.linkedin.com
7,690 employees on LinkedIn®
Ownership
OTCMKTS:TMICY
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Lastline’s Network Detection and Response platform delivers the visibility security professionals need to detect and contain sophisticated cyberthreats before they disrupt your business. We offer the

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 46% Mid-Market
    • 31% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Lastline Defender Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Artificial Intelligence
    1
    Cybersecurity
    1
    Cybersecurity Protection
    1
    Implementation Ease
    1
    Network Security
    1
    Cons
    Limited Features
    3
    Not User-Friendly
    2
    Poor Customer Support
    2
    Poor Documentation
    2
    Poor User Interface
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Lastline Defender features and usability ratings that predict user satisfaction
    8.3
    Malware Probability Scores
    Average: 9.0
    8.9
    Has the product been a good partner in doing business?
    Average: 8.7
    8.3
    Malware Evaluation
    Average: 9.2
    9.2
    Sandbox
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Broadcom
    Year Founded
    1991
    HQ Location
    San Jose, CA
    Twitter
    @broadcom
    59,880 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    59,194 employees on LinkedIn®
    Ownership
    NASDAQ: CA
Product Description
How are these determined?Information
This description is provided by the seller.

Lastline’s Network Detection and Response platform delivers the visibility security professionals need to detect and contain sophisticated cyberthreats before they disrupt your business. We offer the

Users
No information available
Industries
No information available
Market Segment
  • 46% Mid-Market
  • 31% Enterprise
Lastline Defender Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Artificial Intelligence
1
Cybersecurity
1
Cybersecurity Protection
1
Implementation Ease
1
Network Security
1
Cons
Limited Features
3
Not User-Friendly
2
Poor Customer Support
2
Poor Documentation
2
Poor User Interface
2
Lastline Defender features and usability ratings that predict user satisfaction
8.3
Malware Probability Scores
Average: 9.0
8.9
Has the product been a good partner in doing business?
Average: 8.7
8.3
Malware Evaluation
Average: 9.2
9.2
Sandbox
Average: 9.2
Seller Details
Seller
Broadcom
Year Founded
1991
HQ Location
San Jose, CA
Twitter
@broadcom
59,880 Twitter followers
LinkedIn® Page
www.linkedin.com
59,194 employees on LinkedIn®
Ownership
NASDAQ: CA
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cloud Sandbox delivers a unique, advanced threat detection platform that can emulate the execution environment and analyze all activities related to malicious files, identify advanced threats and coll

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Hillstone Cloud Sandbox features and usability ratings that predict user satisfaction
    10.0
    Malware Probability Scores
    Average: 9.0
    6.7
    Has the product been a good partner in doing business?
    Average: 8.7
    8.3
    Malware Evaluation
    Average: 9.2
    10.0
    Sandbox
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2006
    HQ Location
    Santa Clara, CA
    Twitter
    @Hillstone_Net
    10,226 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    357 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cloud Sandbox delivers a unique, advanced threat detection platform that can emulate the execution environment and analyze all activities related to malicious files, identify advanced threats and coll

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Hillstone Cloud Sandbox features and usability ratings that predict user satisfaction
10.0
Malware Probability Scores
Average: 9.0
6.7
Has the product been a good partner in doing business?
Average: 8.7
8.3
Malware Evaluation
Average: 9.2
10.0
Sandbox
Average: 9.2
Seller Details
Year Founded
2006
HQ Location
Santa Clara, CA
Twitter
@Hillstone_Net
10,226 Twitter followers
LinkedIn® Page
www.linkedin.com
357 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Virtual appliance that simplifies management, automation, and orchestration of network and lab resources.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Software Defined Labs (SDL) features and usability ratings that predict user satisfaction
    10.0
    Malware Probability Scores
    Average: 9.0
    0.0
    No information available
    10.0
    Malware Evaluation
    Average: 9.2
    10.0
    Sandbox
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tokalabs
    LinkedIn® Page
    www.linkedin.com
    7 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Virtual appliance that simplifies management, automation, and orchestration of network and lab resources.

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Software Defined Labs (SDL) features and usability ratings that predict user satisfaction
10.0
Malware Probability Scores
Average: 9.0
0.0
No information available
10.0
Malware Evaluation
Average: 9.2
10.0
Sandbox
Average: 9.2
Seller Details
Seller
Tokalabs
LinkedIn® Page
www.linkedin.com
7 employees on LinkedIn®