• HOME
  • CATEGORIES

    • CATEGORIES

    • Browse All Categories
  • FOR VENDORS

    • FOR VENDORS

    • Log In to Vendor Portal
    • Get Started
  • REVIEWS

    • REVIEWS

    • Write a Review
    • Product Reviews
    • Vendor Directory
    • Product Comparisons
  • GARTNER PEER COMMUNITY™
  • GARTNER.COM
  • Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQPrivacyTerms of Service
    ©2026 Gartner, Inc. and/or its affiliates.
    All rights reserved.
  • Categories

    • Loading categories...

      Browse All Categories

      Loading markets...

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
All Categories
/
Network Sandboxing

Network Sandboxing Reviews and Ratings

What is Network Sandboxing software?

Network-based sandboxing is a proven technique for detecting malware and targeted attacks. Network sandboxes monitor network traffic for suspicious objects and automatically submit them to the sandbox environment, where they are analyzed and assigned malware probability scores and severity ratings. Sandboxing technology has been used for years by malware researchers at security companies and even in some large enterprises that are highly security conscious. Traditionally, using a sandbox has been an intensive effort requiring advanced skills. The malware researcher manually submits a suspicious object into the sandbox and analyzes it before flagging it as malware or not. By adding automated features to sandboxing technology (automatically submitting suspicious objects and automatically generating alerts).

How Categories and Markets Are Defined
Highest Rated By Your Peers
For Willingness to Recommend
Logo of ContentKeeper Web Filter Pro
ContentKeeper Web Filter Pro
Logo of SonicWall Capture Advanced Threat Protection (ATP)
SonicWall Capture Advanced Threat Protection (ATP)
Logo of FortiSandbox
FortiSandbox
For 50M-1B USD Companies
Logo of Targeted Attack Protection
Targeted Attack Protection
Logo of FortiSandbox
FortiSandbox
Logo of Trend Vision One
Trend Vision One
For Asia/Pacific
Logo of ContentKeeper Web Filter Pro
ContentKeeper Web Filter Pro
Logo of Check Point SandBlast Network
Check Point SandBlast Network
Logo of Check Point Intrusion Prevention System (IPS)
Check Point Intrusion Prevention System (IPS)
Integration & Deployment
Logo of ContentKeeper Web Filter Pro
ContentKeeper Web Filter Pro
Logo of SonicWall Capture Advanced Threat Protection (ATP)
SonicWall Capture Advanced Threat Protection (ATP)
Logo of Trend Vision One
Trend Vision One

Product Listings

Filter by

Products 1 - 20 of 24
Sort by
Logo of R80 Security Management

R80 Security Management

By Check Point Software Technologies

4.6
(240 Ratings)

R80 Security Management is a software solution designed to enable centralized control over network security policies, threat prevention, and cyber security management for organizations. It integrates policy management, real-time threat analysis, and secure communication across different environments, facilitating unified visibility and administration of security rules. The software provides automated policy deployment and rule management, allowing users to analyze and mitigate vulnerabilities through streamlined workflows and customizable dashboards. R80 Security Management supports collaborative policy creation and revisions, audit tracking, and compliance reporting. It is utilized in multi-domain environments to simplify the administration of diverse security infrastructures and addresses the business need for efficient security operations, risk mitigation, and regulatory adherence.

Show More Details
Logo of Check Point Intrusion Prevention System (IPS)

Check Point Intrusion Prevention System (IPS)

By Check Point Software Technologies

4.6
(154 Ratings)

Check Point Intrusion Prevention System IPS is a software that monitors network traffic to identify and block potential threats and vulnerabilities in real time. The software provides intrusion detection and prevention features by analyzing activities within the network and comparing them against known threat signatures and behavioral patterns. It works to prevent unauthorized access and harmful activities by stopping exploits, malware, and other cyber risks before they reach critical systems. The software supports automated threat intelligence updates, ensuring ongoing protection against emerging threats. It assists organizations in maintaining the integrity of their network environments by reducing the risk of data breaches and service disruptions through proactive threat mitigation and policy enforcement.

Show More Details
Logo of Targeted Attack Protection

Targeted Attack Protection

By Proofpoint

4.6
(80 Ratings)

Targeted Attack Protection is a software developed to identify, block, and mitigate advanced threats such as phishing, ransomware, and email-based attacks before they reach users. The software analyzes incoming messages and attachments using multiple detection techniques including machine learning, sandboxing, and threat intelligence. It provides organizations with visibility into targeted threats, offering real-time reporting and forensics to investigate and respond to incidents. Targeted Attack Protection aims to address the business problem of safeguarding sensitive information and users from sophisticated email threats by preventing unauthorized access, data loss, and service disruption.

Show More Details
Logo of Check Point SandBlast Network

Check Point SandBlast Network

By Check Point Software Technologies

4.7
(77 Ratings)

Check Point SandBlast Network is a network security software that provides advanced threat prevention capabilities to protect organizations against malware, exploits, and zero-day attacks. The software utilizes technologies such as threat emulation and threat extraction to detect and block threats before they reach users, analyzing suspicious files in a virtual environment and delivering sanitized content in real-time. It is designed to address business challenges related to securing network traffic, preventing the spread of sophisticated attacks, and reducing the risk of data breaches. SandBlast Network integrates with security gateways to deliver protection at the perimeter, safeguarding networks from both known and unknown threats without disrupting business operations.

Show More Details
Logo of Trend Vision One

Trend Vision One

By Trend Micro

4.7
(74 Ratings)

Trend Vision One is a cybersecurity software developed to provide extended detection and response capabilities across endpoints, servers, cloud environments, and email. The software integrates security data from multiple sources to enable threat detection, investigation, and response through a unified console. It offers automated threat analysis, security posture visibility, and incident remediation tools designed to improve organizational security operations and minimize the impact of cyber threats. The software is utilized by businesses to address challenges such as detecting advanced attacks, reducing investigation times, and maintaining compliance with security standards. Its feature set includes correlation of security events, comprehensive reporting, and integration with third-party security solutions.

Show More Details
Logo of Trellix Intelligent Virtual Execution

Trellix Intelligent Virtual Execution

By Trellix

4.3
(47 Ratings)

Trellix Intelligent Virtual Execution is a software designed to analyze and simulate potentially harmful files within a controlled virtual environment. This software enables organizations to detect file behaviors and assess potential risks before files are allowed to interact with core systems. By emulating the execution of suspicious files, the software identifies threats such as malware and ransomware and assists security teams in understanding attack tactics. It contributes to improving threat detection accuracy and reducing false positives by providing detailed insights into file actions without impacting operational workflows. The software supports incident response processes and integrates with broader security infrastructures to help organizations address advanced persistent threats and targeted attacks.

Show More Details
Logo of FortiSandbox

FortiSandbox

By Fortinet

4.8
(40 Ratings)

FortiSandbox is a software designed to provide advanced threat protection by using dynamic and static analysis to identify and mitigate malware and zero-day threats. The software integrates with security frameworks to analyze files, links, and communication behavior within a controlled environment, helping organizations detect previously unknown threats. FortiSandbox offers automation features for threat intelligence sharing and incident response, supporting integration with security appliances to strengthen network and endpoint security. The software addresses business challenges such as reducing exposure to sophisticated cyber threats and streamlining the process of discovering and responding to malicious activity within IT infrastructure.

Show More Details
Logo of ContentKeeper Web Filter Pro

ContentKeeper Web Filter Pro

By ContentKeeper

4.9
(24 Ratings)

ContentKeeper Web Filter Pro is a software designed to provide web filtering and internet security for organizations. The software enables real-time monitoring and control of web usage, helping organizations manage internet access and ensure compliance with acceptable use policies. It offers features such as granular policy enforcement, reporting, and threat protection across multiple devices and networks. ContentKeeper Web Filter Pro assists in blocking access to inappropriate or harmful content, reducing exposure to web-based threats, and improving bandwidth management. This software addresses the business problem of managing secure, policy-compliant internet access while protecting users from online threats.

Show More Details
Logo of SonicWall Capture Advanced Threat Protection (ATP)

SonicWall Capture Advanced Threat Protection (ATP)

By SonicWall

4.2
(15 Ratings)

SonicWall Capture Advanced Threat Protection is a software that provides cloud-based multi-engine sandboxing to identify and mitigate advanced threats such as zero-day attacks and ransomware. The software analyzes suspicious files and code in a secure environment, utilizing multiple engines to detect advanced malware and evasive threats that traditional security solutions might miss. It facilitates automated threat prevention and enables organizations to prevent the spread of malicious content across their network. The software is designed to integrate with existing SonicWall network security appliances and supports rapid detection and response without impacting network performance.

Show More Details
Logo of Forcepoint Advanced Malware Detection

Forcepoint Advanced Malware Detection

By Forcepoint

4.7
(14 Ratings)

Forcepoint Advanced Malware Detection is a software designed to identify and analyze sophisticated malware threats within digital environments. The software utilizes sandboxing, behavioral analytics, and emulation technologies to detect and mitigate advanced threats, including zero-day vulnerabilities and evasive malware. It integrates with other security platforms to enhance organizational defense systems, providing automated threat intelligence sharing and real-time analysis capabilities. The software addresses the business problem of rapidly evolving malware by offering proactive detection and prevention, helping organizations minimize risk and protect critical data from unauthorized access and compromise.

Show More Details
Logo of FortiGuard Security Services

FortiGuard Security Services

By Fortinet

4.3
(13 Ratings)

FortiGuard Security Services is a suite of software solutions designed to provide threat intelligence, security updates, and protection mechanisms for networks, endpoints, and cloud environments. The software offers features such as intrusion prevention, antivirus, web filtering, advanced threat detection, application control, and vulnerability management. It analyzes network traffic and data flows for malicious activity and delivers near real-time intelligence updates to help automate responses to emerging threats. FortiGuard Security Services addresses business challenges related to securing digital assets, maintaining compliance, and minimizing risks from cyber threats by continuously monitoring and updating security rules and detection capabilities across supported security platforms.

Show More Details
Logo of Lastline Enterprise

Lastline Enterprise

By Broadcom (VMware)

3.6
(9 Ratings)
Show More Details
Logo of AhnLab MDS

AhnLab MDS

By AhnLab

5
(6 Ratings)

AhnLab MDS is a sandbox-based advanced threat detection and response solution designed to address modern APTs (Advanced Persistent Threats), ransomware, spear-phishing and other evasive malware. The solution combines multiple engines and supports dynamic analysis to deliver deep visibility and defence across network, email and endpoint vectors.

Show More Details
Logo of ReversingLabs Titanium Platform (Legacy)

ReversingLabs Titanium Platform (Legacy)

By ReversingLabs

4.6
(4 Ratings)

ReversingLabs empowers modern software development, IT and security operations teams with a unified platform to protect against a wide range of sophisticated attacks. The ReversingLabs Titanium Platform integrates seamlessly into an enterprise security architecture at scale, analyzing files, objects and software for threat actors, malicious behaviors, and indicators of compromise, enabling development to release confidently, and the SOC to effectively isolate and respond.

Show More Details
Logo of Trend Micro Smart Protection Suites

Trend Micro Smart Protection Suites

By Trend Micro

4.1
(4 Ratings)

Trend Micro Smart Protection Suites is a security software designed to defend endpoints, email, web, and SaaS applications against threats such as malware, ransomware, phishing, and targeted attacks. The software integrates advanced detection techniques including behavioral analysis, application control, and intrusion prevention to protect devices and data across multiple environments. It helps organizations manage vulnerabilities, enforce security policies, and ensure compliance by providing centralized management and automated protection. The software solves business challenges related to information security, minimizing risk from cyber threats and facilitating secure access to critical resources for users operating both within and outside the corporate network.

Show More Details
Logo of Symantec Virtual Secure Web Gateway

Symantec Virtual Secure Web Gateway

By Broadcom

4
(3 Ratings)

Symantec Virtual Secure Web Gateway is a software designed to provide secure internet access and protection for organizations by inspecting web traffic for threats and enforcing security policies. The software enables real-time detection and mitigation of malware, phishing attempts, and other web-based threats. It offers granular control over web usage, allowing administrators to manage user access to web resources based on organizational policies. The software supports deployment in virtual environments, facilitating scalability and flexibility for businesses with varying infrastructure needs. By delivering secure web gateway functionality, the software addresses the business problem of safeguarding sensitive data and maintaining compliance with regulatory standards while enabling safe access to internet resources.

Show More Details
Logo of WatchGuard Intrusion Prevention Service (IPS)

WatchGuard Intrusion Prevention Service (IPS)

By WatchGuard

4.2
(3 Ratings)

WatchGuard Intrusion Prevention Service (IPS) is a software designed to detect, block, and log network threats by analyzing data traffic for signs of malicious activity and known exploits. The software monitors network data streams in real-time, inspecting protocols and applications to identify intrusion attempts targeting vulnerabilities in operating systems, applications, and devices. WatchGuard Intrusion Prevention Service helps organizations prevent unauthorized access and disruptions by providing automated signature updates and threat intelligence. The software assists businesses in strengthening their cybersecurity defenses, reducing risks from malware, spyware, and network attacks with minimal impact on system performance. The solution integrates with existing network architectures to enhance security policies and aligns with regulatory compliance requirements.

Show More Details
Logo of Cyphort Anti-SIEM

Cyphort Anti-SIEM

By Cyphort

4.6
(2 Ratings)

Cyphort Anti-SIEM is a security software designed to detect, analyze, and mitigate advanced cyber threats across enterprise networks. The software combines behavioral analysis, machine learning, and threat intelligence to identify suspicious activity and potential breaches. It integrates with existing network infrastructure to collect and inspect traffic, providing automated threat detection and incident response capabilities. Cyphort Anti-SIEM addresses the business problem of limited visibility into sophisticated attacks and targeted malware by offering functionalities such as sandboxing, forensics, and integration with security information and event management systems. The software supports organizations in improving their threat detection and response effectiveness by automating analysis and correlating threat data across multiple vectors.

Show More Details
Logo of Group-IB Managed Extended Detection and Response (MXDR)

Group-IB Managed Extended Detection and Response (MXDR)

By Group-IB

4.5
(2 Ratings)

Group-IB Managed Extended Detection and Response (MXDR) software is designed to enhance organizations' cybersecurity by integrating threat detection, analysis, and response capabilities across networks, endpoints, cloud environments, and email systems. The software combines real-time monitoring with automated intelligence to identify, investigate, and contain cyber threats, facilitating rapid incident response and reducing dwell time. It delivers detailed threat analytics, supports forensic investigations, and adapts to evolving attack techniques, aiming to protect digital assets and reduce operational risks associated with security breaches. The software also streamlines event management and coordinates with existing security infrastructures to improve detection efficiency and response accuracy.

Show More Details
Logo of Splunk Attack Analyzer

Splunk Attack Analyzer

By Cisco Systems (Splunk)

5
(1 Rating)

Splunk Attack Analyzer is a software designed to help organizations detect, analyze, and respond to cyber threats by automating the investigation of suspicious activities across email, web, and cloud platforms. The software integrates with security information and event management environments to facilitate real-time threat detection and analysis, providing contextual insights on potential attacks. It enables security teams to correlate data from multiple sources, perform automated enrichment of indicators of compromise, and accelerate remediation efforts. Splunk Attack Analyzer assists in reducing manual investigation workflows and enhances visibility into advanced threats, supporting incident response and security operations to address common business challenges such as improving response times and strengthening organizational security posture.

Show More Details

Gartner Research

Market Guide for Network Sandboxing

Popular Product Comparisons

FortiSandbox vs R80 Security ManagementCheck Point SandBlast Network vs FortiSandbox

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.