Best Sandbox Software for Linux of 2024

Find and compare the best Sandbox software for Linux in 2024

Use the comparison tool below to compare the top Sandbox software for Linux on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Thinfinity Workspace Reviews
    Top Pick

    Thinfinity Workspace

    Cybele Software, Inc.

    13 Ratings
    Top Pick See Software
    Learn More
    Thinfinity Workspace 7.0's Technical Highlights: - Progressive Web App (PWA) technology for a seamless user experience - Integrated Thinfinity VNC, VirtualUI, and z/Scope for maximum versatility - HTML5 terminal emulation supporting DEC terminals, TN 5220, and TN 3270 protocols - Robust enterprise-grade audit logs for security and compliance management - Proprietary VNC protocol for real-time monitoring and troubleshooting IMPROVE USER EXPERIENCE - Deliver business-critical apps, desktops and files from a single web portal. - Provide simplified remote browser access for your users, while confining them to only the resources that they need. SIMPLIFY IT AND AVOID VPNs - Forget traditional VPN deployments and complexities. - Enable access from Chromebooks, mobile devices or any computer with a Web Browser. Zero setup. KEEP YOUR BUSINESS SECURE - Use enterprise-grade encrypted connections. - Integrate with your existing and external identity platforms. - Apply 2FA or MFA policies with all identity providers.
  • 2
    Kasm Workspaces Reviews
    Top Pick

    Kasm Technologies

    $0 Free Community Edition
    121 Ratings
    See Software
    Learn More
    Kasm Workspaces streams your workplace environment directly to your web browser…on any device and from any location. Kasm is revolutionizing the way businesses deliver digital workspaces. We use our open-source web native container streaming technology to create a modern devops delivery of Desktop as a Service, application streaming, and browser isolation. Kasm is more than a service. It is a platform that is highly configurable and has a robust API that can be customized to your needs at any scale. Workspaces can be deployed wherever the work is. It can be deployed on-premise (including Air-Gapped Networks), in the cloud (Public and Private), or in a hybrid.
  • 3
    Cameyo Reviews

    Cameyo

    Cameyo

    $12.00/month/user
    1 Rating
    Cameyo is a secure Virtual Application Delivery platform (VAD) for any Digital Workspace. Cameyo makes it easy, seamless, secure, and simple to deliver Windows and internal web apps to any device via the browser, without the need to use VPNs or virtual desktops. Cameyo allows organizations to give their employees secure access to business-critical apps from anywhere. This makes hybrid and remote work possible. Cameyo's Digital Workspace solution is used by hundreds of organizations and enterprises to deliver Windows and internal web apps to hundreds of thousands of users around the world.
  • 4
    VirtualBox Reviews
    VirtualBox is a powerful virtualization product that supports both x86 and Intel64 architectures. It can be used at home as well as in an enterprise environment. VirtualBox is a high-performance, feature-rich product that enterprises can use. It is also free to download as Open Source Software under GNU General Public License (GPL), version 2. For more information, see "About VirtualBox". VirtualBox currently runs on Windows, Linux and Macintosh. It supports a wide range of guest operating systems, including Windows (NT 4.0), 2000, XP and Server 2003), Windows (7, Windows 8, Windows 10), DOS/Windows (2.4, 2.6 and 3.x), Solaris and OpenSolaris (OS/2 and OpenBSD), and Solaris (2.4, 2.6 and 3.x). VirtualBox is actively being developed and released with regular releases. It has an ever-growing list of features, supported guest OS systems and platforms. VirtualBox is a community effort that is supported by a dedicated company.
  • 5
    ANY.RUN Reviews

    ANY.RUN

    ANY.RUN

    $109 per month
    ANY.RUN is a cloud malware sandbox that handles the heavy lifting of malware analysis for SOC and DFIR teams, as well as Threat Intelligence Feeds and Threat Intelligence Lookup. Every day, 400,000 professionals use our platform to investigate incidents and streamline threat analysis. - Real-time results: it takes about 40s from file upload to malware detection. - Interactivity: Unlike many automated turn-key solutions ANY.RUN is fully interactive (you can engage with the VM directly in the browser). This feature helps prevent zero-day exploits and sophisticated malware that evades signature-based detection. - Tailored for malware analysis: There’s built in network analysis tools, debugger, script tracer, and automatic config extraction from memory, among other useful tools. - Cost-savings: For businesses, ANY.RUN is more affordable to run than an on-premises solution because it doesn’t need any setup or maintenance time from your DevOps team. - Efficient onboarding of new hires: ANY.RUN’s intuitive interface means that even Junior SOC analysts can quickly learn to analyze malware and extract IOCs. Learn more at ANY.RUN's website.
  • 6
    AP Lens Reviews
    AP Lens is a Sandbox browser that isolates networks by using DNS Whitelisting. We stop the attack before it reaches your network. What does AP Lens offer? Web Filtering: Flexible, user-friendly content blocking. Anti-Phishing - Stop looking-alike domains with 100% accuracy Ransomware Protection: Protect your network from hackers without affecting your business applications. Secure Remote Work: Use VPN to enforce internet usage policies. AP Lens Augmented whitelist: No more 0-Day Attacks - Compliance: AP Lens meets the regulatory requirements of cybersecurity insurance policies. - One-Click Installation - No need to set up or update the user's computer. - No Maintenance: Stop malware or phishing without constant monitoring Our team has over 20 years of combined experience in cyber security, cloud security and information protection in various industries, such as the private sector and public sector.
  • 7
    Cuckoo Sandbox Reviews
    Cuckoo can quickly provide detailed reports detailing the behavior of suspicious files when they are executed in a controlled environment. Malware is the Swiss-army knife of cybercriminals, and any other adversary to your company or organization. It's not enough to detect and remove malware artifacts in these changing times. It's also vital to understand how they work to understand the context, motivations and goals of a breach. Cuckoo Sandbox, a free software, automates the task of analysing any malicious file on Windows, macOS Linux, Linux, or Android. Cuckoo Sandbox, an open-source automated malware analysis system that is highly modular and flexible, has endless application possibilities. Analyze many malicious files (executables and office documents, emails, etc.) as well as malicious websites in virtualized Windows, Linux, macOS, Android environments.
  • 8
    FortiSandbox Reviews
    Antivirus tools provided reasonable protection against viruses, unlike previous generations that were simple and low-volume. Modern malware uses new techniques, such as exploits. An attacker can exploit a vulnerability in legitimate software to cause abnormal behavior. An attack that exploits an unknown software vulnerability is called a zero-day or 0-day attack. Before sandboxing, there was no effective way to stop it. A malware sandbox is a system that restricts an application's actions, such as opening Word documents, to an isolated environment. The sandbox examines the dynamic behavior and interactions of applications in a pseudo-user environment to uncover malicious intent.
  • 9
    Joe Sandbox Reviews
    Are you tired of performing high-level malware analysis? Do you feel tired of high-level malware analysis? Instead of focusing on one technology, try to use multiple technologies such as hybrid analysis, instrumentation and hooking, hardware virtualization, machine learning / artificial intelligence, and machine learning / emulation. You can see the difference in our reports. Deeply analyze URLs for phishing, drive-by downloads, scams and more. Joe Sandbox uses an advanced AI-based algorithm that includes template matching, perptual havehing, ORB feature detector, and more to detect malicious use of legit brands. To enhance the detection capabilities, you can add your logos and templates. Live Interaction allows you to interact with the sandbox directly from your browser. Click through complex malware installers or phishing campaigns. You can test your software against backdoors, information loss, and exploits (SAST or DAST).
  • Previous
  • You're on page 1
  • Next