Sandboxes are used to safely execute suspicious code without risking harm to the host device or network.

Sandboxing Key Benefits
Performs deep forensic analysis through the full attack life cycle
Streamlines and batches analysis of suspicious web code, executables and files
Offers live-mode or sandbox analysis to confirm zero-day exploits
Dynamically generates threat intelligence for immediate local protection
Captures packets to allow analysis of malicious URL session and code execution
Sandboxing Products

Forcepoint Advanced Malware Detection ,

FireEye Malware Analysis (AX)

Paloalto wildfire
