Why you need a sandbox

Malware developers are constantly creating new ways to evade traditional defenses including antivirus products, firewalls, intrusion protection systems (IPS), and mail and web gateways.

Detecting malware is precisely the purpose of a different kind of solution. Sandboxes run a file in an isolated virtual environment, analyze the actions performed by the file, and issue a verdict that answers the all-important question: is the file safe or not?

01

Overview

PT Sandbox is a state-of-the-art sandbox for enterprise protection from advanced persistent threat (APT) and mass attacks. Capable of detecting sophisticated malware in files and traffic, the product supports flexible and extensive customization of virtual environments for maximum effectiveness.
  • Made for your infrastructure

    PT Sandbox allows you to flexibly customize virtual environments to match real workstations. This ensures high fidelity and detection even if malware is tailored to your company's infrastructure.
  • Provides complex analysis

    The product makes use of unique rules made by PT Expert Security Center and multiple antivirus engines to effectively detect new, unknown malware and targeted attacks.
  • Detects hidden threats

    Once databases are updated, PT Sandbox automatically re-checks previously analyzed files to detect hidden threats and previously unnoticed attacks.

Detects threats in traffic

02

PT Sandbox checks all traffic generated during analysis of a suspicious file and decrypts TLS traffic to detect malicious activity.

03

Easy and convenient to use

Covers all common attack vectors

04

PT Sandbox blocks the main vectors used by malware to infiltrate your network. It also analyzes email attachments, network-stored files, files uploaded to corporate sites, and internet downloads.

Why virtual environments need to be customized

APT malware targets a specific company and the software in use at that company. In order to detect such malware in a sandbox, that sandbox needs to be running the same software as the company's real workstations.

For example, if your company uses Google Chrome, an attacker's malware might target Google Chrome. That malware will not show itself in a sandbox containing Microsoft Edge. Critically, a non-customized sandbox with the wrong software won't pick up any malicious activity. The result: a compromise of your company.

PT Sandbox solves this problem by providing the ability to customize and configure full-fidelity virtual environments.

Get in touch

Fill in the form and our specialists
will contact you shortly