Try our new research platform with insights from 80,000+ expert users
Security Unit Manager at EEMC
Real User
Good endpoint detection and response, but it needs better technical support
Pros and Cons
  • "The most valuable feature was the EDR, endpoint detection and response."
  • "In the next release, I would like to see machine learning and anti-exploitation included."

What is our primary use case?

The primary use case of this solution is for using FortiSandbox.

The deployment model we are using is on-premises.

What is most valuable?

The most valuable feature was the EDR, endpoint detection and response.

What needs improvement?

FortiSandbox could be improved. Fortinet took some time to include this feature and new technologies.

They have to develop it more, because of the codes, the variables in the number of virtual environments and the number of virtual rules.

They only provide eight or sometimes a maximum of fourteen virtual environments and the competitors are offering two hundred environments, so the number of environments offered it too small and needs to increase. Currently, this is one of the weakest capabilities with FortiSandbox.

The integration has no enforcements, you cannot apply any action, you have to integrate it with Fortinet. For example, if a customer wants to have FortiSandbox, he has to purchase the entire Fortinet profile. This is not an advantage for Fortinet, compared to others that can be integrated easily with any technology and with any vendor. Fortinet will only integrate with itself.

They are not leading in endpoints for FortiSandbox.

The capabilities and features of this solution are not good. They have to enhance and develop the product to compete.

In the next release, I would like to see machine learning and anti-exploitation included.

For how long have I used the solution?

I have been using this solution for two years.
Buyer's Guide
Fortinet FortiSandbox
June 2025
Learn what your peers think about Fortinet FortiSandbox. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
857,028 professionals have used our research since 2012.

What do I think about the stability of the solution?

This solution is stable. I have not had any issues with stability. It's fine.

How are customer service and support?

We face some challenges with Fortinet. Each time we use the technical support, we run into the same problem. We open a ticket and we have to wait until is it escalated to a tier-two or a tier-three level before anyone will address your specific issues. You will never get help on the first level, and it is always directed to another level.

There seems to be a lack of coordinators.

It is possible that on our end we contact them for issues that are on a larger scale, or new issues, never on a basic level. However, it still takes time to get the issue resolved. 

How was the initial setup?

The installation is easy and straightforward.

Which other solutions did I evaluate?

Other companies, the competitors of Fortinet, offer this and in this area, they are better.

What other advice do I have?

We are Platinum level partners, and I am a consultant.

My advice would be to check the web reviews and you will find that Sandbox and FortiClient are not the best.

If you check Gartner, you will see that McAfee and Microsoft are better.

The setup and installation are easy and straightforward.

If you a Symantec endpoint then it's easy and straightforward.

I would rate this solution a six out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner.
PeerSpot user
Owner2204 - PeerSpot reviewer
Owner at a tech services company
Reseller
Detects new threats but could be faster and less complex
Pros and Cons
  • "One of the valuable features is its ability to detect new threats."
  • "The product is good but it could be speedier. In addition, it's quite complex."

What is our primary use case?

Securing mail is our primary use case.

How has it helped my organization?

We have seen a measurable decrease in the mean time to detect or respond to threats, on the order of 20 percent.

What is most valuable?

One of the valuable features is its ability to detect new threats.

What needs improvement?

We would like to see the solution open to third parties.

What do I think about the stability of the solution?

The stability is okay.

What do I think about the scalability of the solution?

It's scalable. You can scale it.

Which solution did I use previously and why did I switch?

We did not have a previous solution. Using this solution is part of the way we do business. If you don't invest in the future you could be stopping your business.

How was the initial setup?

The initial setup is quite complex. You have to really know the features by heart.

What's my experience with pricing, setup cost, and licensing?

There are no costs in addition to the standard licensing fees.

Which other solutions did I evaluate?

We did not evaluate other vendors.

What other advice do I have?

If you aren't sure about the solution, buy the cloud version first. You can use it in their cloud.

The solution is a seven out of ten. The product is good but it could be speedier. In addition, it's quite complex.

Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller.
PeerSpot user
Buyer's Guide
Fortinet FortiSandbox
June 2025
Learn what your peers think about Fortinet FortiSandbox. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
857,028 professionals have used our research since 2012.
PeerSpot user
Analista de Segurança da Informação at a comms service provider with 11-50 employees
Consultant
You have access to a report as to what behaviors the example file entered in the registry
Pros and Cons
  • "You have access to a report as to what behaviors the example file entered in the registry."
  • "For additional features, maybe a form of execution pain files in a non-virtual environment because it has threats that identify when it is being run in a virtual machine."

What is our primary use case?

I work at a college campus with the intention of understanding targeted attacks. If a file is hit or some pre files set as .exe, .pif, .zip, or .pdf among others and forwards to virtual machines and executes an action of the file changing a registry, it creates some backdoor or memory overflow guaranteeing access the machine.

How has it helped my organization?

Improved the security imagine if any hacker develops a file for invasion my antivirus, it will not have a vaccine where FortiSandbox enters.

What is most valuable?

You have access to a report as to what behaviors the example file entered in the registry. Windows changed this parameter in order to obtain a breach, and this is demonstrated by report.

What needs improvement?

At the moment, I do not see anything to improve. 

For additional features, maybe a form of execution pain files in a non-virtual environment because it has threats that identify when it is being run in a virtual machine.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1026282 - PeerSpot reviewer
Network Engineer at a tech services company with 51-200 employees
Real User
Reliable, good support, and simple to manage
Pros and Cons
  • "The solution is easy to manage."
  • "The initial setup is not too complex but could be easier."

What is our primary use case?

We use Fortinet FortiSandbox for threat protection and threat emulation.

What is most valuable?

The solution is easy to manage.

For how long have I used the solution?

I have been using Fortinet FortiSandbox for approximately one year.

What do I think about the stability of the solution?

The solution is stable.

What do I think about the scalability of the solution?

We have over 20 customers using this solution.

How are customer service and support?

The technical support is good.

How was the initial setup?

The initial setup is not too complex but could be easier.

What's my experience with pricing, setup cost, and licensing?

There is a license to use this solution.

What other advice do I have?

I rate Fortinet FortiSandbox a ten out of ten.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1721355 - PeerSpot reviewer
Security Technical Manager at a tech services company with 51-200 employees
Real User
Top 5Leaderboard
Used for malware analysis and easily integrate with various solutions

What is our primary use case?

We use Fortinet FortiSandbox for malware analysis, seamlessly integrating with various solutions such as FortiGate, FortiMail for Mail Security, FortiWeb, and other endpoints. FortiSandbox also supports ICAP integration with FortiWeb, enhancing its capabilities. These integrations can be configured within FortiSandbox, either internally or externally. Additionally, FortiSandbox offers integration with Exchange as an adapter.

What is most valuable?

The integration is easy with other Fortinet products like FortiMail. The technology of sandboxing FortiSandbox can cover it.

Fortinet FortiSandbox has the capability for manual analysis' Unlike its competitors, FortiSandbox offers functionalities such as banning, sniffing, and analyzing traffic in the network. It can connect as a bandwidth analyzer and provide analytics on the network traffic. It's not limited to just sandboxing; it can also operate at the endpoint, firewall, or gateway levels to submit files for analysis and monitor network traffic for analysts.

What needs improvement?

The solution must focus on API integration with other vendors.

For how long have I used the solution?

I have been using Fortinet FortiSandbox as an integrator since 2017.

What do I think about the stability of the solution?

The solution is stable on dedicated appliances like virtual machines. It also depends on the capabilities of the host system, including CPU and RAM.

What do I think about the scalability of the solution?

The solution is scalable. You can configure up to one hundred nodes as workers. Additionally, you can include up to ninety-eight worker nodes in other models, allowing them to function as a cluster.

It has a defense line from zero-day attacks and sophisticated attacks. You will need an EDR solution and the endpoint.

Six persons are using this solution.

How are customer service and support?

Customer support is friendly and has a good team.

How was the initial setup?

A network security engineer can deploy the solution. The organization's IT department manages administration, including application and network security. Multiple administrators may use FortiSandbox, each with their front-end interface for managing it.

What was our ROI?

The solution provide zero-day attacks which benefitted a lot.

What other advice do I have?

If the customer's operating system is supported, there's no need for a custom package. It's straightforward. If a custom operating system is required, it will take longer due to the need for package customization.

Overall, I rate the solution an eight out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Integrator
PeerSpot user
reviewer1810833 - PeerSpot reviewer
CEO at a tech services company with 1-10 employees
Real User
Top 5Leaderboard
Real-time analysis capability of FortiSandbox is beneficial for email analysis and is scalable for enterprise companies
Pros and Cons
  • "The real-time analysis capability of FortiSandbox is beneficial for email analysis."
  • "Not practical for real-time web traffic analysis because users won't wait for the FortiSandbox to complete its analysis before accessing content"

What is our primary use case?

We implemented FortiSandbox in three main steps: planning the infrastructure and topology, setting up dedicated Internet access for the sandbox, and configuring manual uploading and email forwarding. For email communication, we used either FortiMail or BCC/force mirroring solutions. FortiSandbox has successfully identified and blocked email attachments containing threats. 

What is most valuable?

The real-time analysis capability of FortiSandbox is beneficial for email analysis, but it's not practical for real-time web traffic analysis because users won't wait for the FortiSandbox to complete its analysis before accessing content.

What needs improvement?


For how long have I used the solution?

I have experience working with Fortinet FortiSandbox, but it's been about one year since the first implementation.

What do I think about the stability of the solution?

It is stable

What do I think about the scalability of the solution?

The solution is scalable especially suitable for enterprise businesses.

How are customer service and support?

I haven't needed technical support, and while the pricing can be expensive, the performance and security it offers are commendable.

How was the initial setup?

I rate the initial setup of Fortinet FortiSandbox as a little bit difficult due to licensing issues,

What other advice do I have?

I would recommend FortiSandbox for high-security environments like financial or government sectors. Overall, I rate it an eight out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Integrator
PeerSpot user
Buyer's Guide
Download our free Fortinet FortiSandbox Report and get advice and tips from experienced pros sharing their opinions.
Updated: June 2025
Buyer's Guide
Download our free Fortinet FortiSandbox Report and get advice and tips from experienced pros sharing their opinions.