Fortinet FortiSandbox Overview

Fortinet FortiSandbox is the #6 ranked solution in our list of top Advanced Threat Protection tools. It is most often compared to Palo Alto Networks WildFire: Fortinet FortiSandbox vs Palo Alto Networks WildFire

What is Fortinet FortiSandbox?

Today’s threats are increasingly sophisticated and often bypass traditional malware security by masking their malicious activity. A sandbox augments your security architecture by validating threats in a separate, secure environment. FortiSandbox offers a powerful combination of advanced detection, automated mitigation, actionable insight, and flexible deployment to stop targeted attacks and subsequent data loss. It's also a key component of our Advanced Threat Protection solution.

Fortinet FortiSandbox is also known as FortiSandbox.

Fortinet FortiSandbox Buyer's Guide

Download the Fortinet FortiSandbox Buyer's Guide including reviews and more. Updated: June 2021

Fortinet FortiSandbox Customers

Lush, Barnabas Health, Options, Riverside Healthcare, Hillsbourough County Schools, Columbia Public Schools, Schiller AG

Fortinet FortiSandbox Video

Filter Archived Reviews (More than two years old)

Filter by:
Filter Reviews
Industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
Rating
Loading...
Filter Unavailable
Considered
Loading...
Filter Unavailable
Order by:
Loading...
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Search:
Showingreviews based on the current filters. Reset all filters
CR
Owner at a tech services company
Reseller
Detects new threats but could be faster and less complex

What is our primary use case?

Securing mail is our primary use case.

Pros and Cons

  • "One of the valuable features is its ability to detect new threats."
  • "The product is good but it could be speedier. In addition, it's quite complex."

What other advice do I have?

If you aren't sure about the solution, buy the cloud version first. You can use it in their cloud. The solution is a seven out of ten. The product is good but it could be speedier. In addition, it's quite complex.
Jonathan Bernardino
Analista de Segurança da Informação at a tech services company with 11-50 employees
Consultant
You have access to a report as to what behaviors the example file entered in the registry

What is our primary use case?

I work at a college campus with the intention of understanding targeted attacks. If a file is hit or some pre files set as .exe, .pif, .zip, or .pdf among others and forwards to virtual machines and executes an action of the file changing a registry, it creates some backdoor or memory overflow guaranteeing access the machine.

Pros and Cons

  • "You have access to a report as to what behaviors the example file entered in the registry."
  • "For additional features, maybe a form of execution pain files in a non-virtual environment because it has threats that identify when it is being run in a virtual machine."