01

Overview

PT Sandbox is an advanced analysis environment for enterprise defense against APTs and large-scale cyberattacks. It detects sophisticated malware in both files and network traffic while offering extensive customization of virtual environments to improve detection accuracy.
  • Identifies complex threats

    Detects unknown viruses, advanced malware (rootkits, bootkits), and threats specifically designed to target SCADA systems.
  • Prevents targeted attacks

    Supports customizable emulation and decoy environments that align with industry-specific threat models, making it effective against highly tailored attack campaigns.
  • Covers all major attack vectors

    Analyzes files and links from emails, file storage systems, IT and security infrastructure, and manually downloaded content.
  • Speeds up threat research

    Processes and analyzes suspicious objects, providing detailed results along with access to relevant artifacts.
  • Enables rapid threat mitigation

    Delivers clear verdicts on malicious content, allowing immediate response and blocking of active threats without disrupting business operations.

02

Use cases

Email protection


Securing file storage and corporate systems


Defense against advanced hacking tools


Threat hunting and manual sample analysis


Protection against targeted attacks


Endpoint protection


Web application protection


Monitoring objects in network traffic


Securing development repositories


Vulnerability protection


03

How it works

PT Sandbox integrates into the infrastructure, connecting to multiple sources to detect unknown malware and zero-day threats in real time.

Operating modes:

1. Detection: aggregates files and links from various sources for analysis, identifying threats and issuing alerts.
2. Threat research: examines objects, including manually uploaded files, and provides detailed analysis with access to relevant artifacts.
3. Blocking: works with email systems, network traffic control tools, and API connectors to automatically prevent the spread of malicious content.

04

PT Sandbox advantages

  • Multi-layered threat detection

    PT Sandbox applies a stacked detection approach that combines static analysis, behavioral profiling with machine learning, and external threat intelligence. Malware designed to evade traditional security measures is exposed at multiple levels.
  • Seamless integration with enterprise systems

    Files and links are monitored across all major transfer channels, with direct integration into security and IT infrastructure. Threat detection is continuous and automatic, without disrupting operations.
  • Precision in targeted attack defense

    Virtual environments replicate real employee workstations, allowing for customized decoys and simulated interactions. This method exposes tailored attacks and ensures ransomware is caught before it can cause damage.

PT Sandbox: AI-powered threat analysis

Customizable machine learning models analyze more than 8,500 behavioral characteristics, including process actions, API call sequences, network activity, and auxiliary object creation. This level of detail enables precise detection of unknown and highly targeted threats.
Request a pilot

PT Sandbox expertise

05

PT Sandbox applies layered detection to uncover malicious activity. Static rules expose fragments of malicious code. Correlation rules track abnormal behavior. Network analysis detects communication with attacker-controlled servers. Machine learning models identify anomalies. OS monitoring sensors catch manipulations that indicate compromise. Every mechanism works in parallel to uncover threats designed to evade traditional security tools.

MITRE ATT&CK coverage

PT Sandbox detects malware tactics and techniques mapped to the MITRE ATT&CK framework for Windows and Linux. It identifies threats at every stage, from execution to persistence, privilege escalation, and lateral movement.
Learn more

06

Compatible products

PT NAD

Make hidden threats visible
 

MaxPatrol EDR

Protects your endpoints from sophisticated and targeted attacks on all major (including Russian) operating systems
 

PT ISIM

A simple, effective solution for ICS cybersecurity
 

MaxPatrol SIEM

An advanced solution that knows your infrastructure and delivers pinpoint detection
 

MaxPatrol VM

Next-generation vulnerability management system
 

PT Container Security

An advanced, innovative solution for the comprehensive protection of hybrid cloud infrastructure. It supports secure development for software systems that use containerized virtualization
 

PT Application Inspector

The only source code analyzer that provides high-quality analysis and convenient tools to automatically confirm vulnerabilities
 

Email remains the primary malware delivery method

Seventy-five percent of cyberattacks begin with an email. Attackers continuously refine malware and develop new evasion techniques, making email security a constant battleground. Regular testing is critical to identifying vulnerabilities before they are exploited.

PT Knockin evaluates the effectiveness of antivirus tools, mail gateways, sandboxes, and other defenses. The service provides actionable recommendations to close security gaps and strengthen protection.
Test your email security

Get in touch

Fill in the form and our specialists
will contact you shortly