Cloud sandbox analysis

Cloud security sandbox provides a powerful, isolated test environment in which a suspicious program is executed, and its behavior is observed, analyzed and reported in an automated manner. This is especially useful against zero-day threats, including ransomware. 

ESET Dynamic Threat Defense

Advanced protection utilizing cloud-sandboxing technology

Cloud sandbox analysis

Cloud security sandbox provides a powerful, isolated test environment in which a suspicious program is executed, and its behavior is observed, analyzed and reported in an automated manner. This is especially useful against zero-day threats, including ransomware. 

ESET Dynamic Threat Defense

Advanced protection utilizing cloud-sandboxing technology

BENEFITS    |    USE CASES
SOLUTION    |    SYS REQUIREMENTS

Why do customers appreciate our cloud sandbox analysis solution?

Additional layer of defense

Defense outside of a company’s network to prevent ransomware and zero-day threats from ever executing in a production environment.

Power of the cloud

The solution uses the immense computing power of the cloud sandbox to detonate the suspicious files into running a whole battery of tests.

Unparalleled speed

Every minute counts. That is why our Cloud Sandbox is designed to analyze the majority of new samples in under 5 minutes.

Common use cases

Worried about

Ransomware?

Ransomware tends to enter unsuspecting users’ mailboxes through email.

Worried about

Targeted attacks and data breaches?

The cybersecurity landscape is constantly evolving with new attack methods and never-before-seen threats.

Worried about

Unknown or questionable files?

Sometimes employees or IT might receive a file that they want to double-check is safe.

What makes our solution a perfect fit for your needs?

Cloud sanbox analysis

ESET Dynamic Threat Defense

Provides another layer of security for ESET products like Mail Security and Endpoint products by utilizing cloud-based sandboxing technology to detect new, never-before-seen type of threats. Future proof your company IT security with:

  • Behavior-based Detection
  • Machine Learning
  • Zero-day Threats Detection
  • Ransomware Prevention

Explore ESET Dynamic Threat Defense features

Ransomware and zero-day threats detection

Detect new, never-before-seen types of threats. ESET utilizes three different machine learning models once a file is submitted. 

Granular reports

An admin can create a report of ESET Dynamic Threat Defense data in the ESET PROTECT console. They can either use one of the pre-defined reports or create a custom one.

Transparent full visibility

Every analyzed sample status is visible in the ESET PROTECT console, which provides transparency to all data sent to ESET LiveGrid®. 

Mobility

Nowadays, employees often do not work on the premises. The Cloud Sandbox analyzes files no matter where users are.

Automatic protection

The endpoint or server product automatically decides whether a sample is good, bad or unknown. 

Proactive protection

If a sample is found suspicious, it is blocked from execution while it’s being analyzed by ESET Dynamic Threat Defense.

System requirements and license information

  • A working ESET Business Account or ESET MSP Administrator account synchronized with a ESET management console
  • ESET PROTECT cloud or on-premises console deployed
  • Version 7.x of compatible ESET security products installed or newer
  • A Valid license for ESET Dynamic Threat Defense or bundled solution license with Cloud Sandbox component included
  • Activated Security products with ESET Dynamic Threat Defense License
  • ESET Dynamic Threat Defense enabled in policies for compatible Security products
  • Network requirements on opened ports 

Committed to the highest industry standards

Respected by industry analysts

Learn more

Awarded in independent tests

See test results

ESET PROTECT Advanced is a leader in Endpoint Protection Suites on G2

Appreciated by customers worldwide

Read full reviews

Purchase your cloud sandbox solution today

ESET's cloud sandbox analysis is available in the following solutions

Eliminate ransomware and zero-day threats with Cloud Sandbox.

Explore solution


Cloud sandbox analysis

All included components:
  • Cloud-based Console
  • Endpoint Protection
  • File Server Security
  • Full Disk Encryption
  • Cloud sandbox analysis
  • Mail Security
  • Cloud App Protection
  • Endpoint Detection & Response

Secured cloud applications and multilayered endpoint protection.

Explore solution


Cloud sandbox analysis

All included components:
  • Cloud-based Console
  • Endpoint Protection
  • File Server Security
  • Full Disk Encryption
  • Cloud sandbox analysis
  • Mail Security
  • Cloud App Protection
  • Endpoint Detection & Response

Future ready cybersecurity for powerful enterprise protection


Cloud sandbox analysis

All included components:
  • Cloud-based Console
  • Endpoint Protection
  • File Server Security
  • Full Disk Encryption
  • Cloud sandbox analysis
  • Mail Security
  • Cloud App Protection
  • Endpoint Detection & Response

Secured email communication with cloud-based sandboxing.

Explore solution


Cloud sandbox analysis

All included components:
  • Cloud-based Console
  • Endpoint Protection
  • File Server Security
  • Full Disk Encryption
  • Cloud Sandbox
  • Mail Security
  • Cloud App Protection
  • Endpoint Detection & Response