Sandboxes are used to safely execute suspicious code without risking harm to the host device or network.
![Sandboxing Sandboxing](https://protech-jo.com/wp-content/uploads/2020/11/Sandboxing-white.png)
Sandboxing Key Benefits
Performs deep forensic analysis through the full attack life cycle
Streamlines and batches analysis of suspicious web code, executables and files
Offers live-mode or sandbox analysis to confirm zero-day exploits
Dynamically generates threat intelligence for immediate local protection
Captures packets to allow analysis of malicious URL session and code execution
Sandboxing Products
![Forcepoint](https://protech-jo.com/wp-content/uploads/2020/10/forcepoint.png)
Forcepoint Advanced Malware Detection ,
![FireEye](https://protech-jo.com/wp-content/uploads/2020/10/FireEye-opt.png)
FireEye Malware Analysis (AX)
![Palo Alto](https://protech-jo.com/wp-content/uploads/2020/10/Palo-Alto.png)
Paloalto wildfire
![Symantec](https://protech-jo.com/wp-content/uploads/2020/10/Symantec.png)