PROTECT YOUR EMPLOYEES AND WORKSPACE FROM CYBER-ATTACKS

1

MALWARE PROTECTION

Excellent protection from various types of malware and cyber-attacks by fencing PC's operating system from reaching out. Malware remains locally in virtual environment where unable to activate itself. Virtual environment is easy to one-click clean up or by schedule.

3

BRAND-NEW & UNKNOWN THREATS

High level of protection from Zero-day threats, until traditional signature-based solutions haven't recognizes and released signatures for that threat. It happens rare, but unexpected. Usually harms business significantly.

5

COST SAVING & CORE BUSINESS FOCUS

We have one of the best prices for security products. Besides, reduction of security incidents reduces costs and retains your company reputation , 

7

MULTIPLE SANDBOXES FEATURE 

Enterprise version allows you to create several isolated sandboxes. Put each application in its own sandbox, and isolate it even more! Malware analysts  get an unique opportunity to see "output" of every single virus in a separate  container.

2

EMAIL SECURITY

Prevention from common human factor of accidental opening email containing *.EXE file disguised by cyber-criminals as MS Office or other types of document. Usually scriptsand steals information from victim's hard drive.

4

OUT-OF-OFFICE SECURITY & OFFICE NETWORK CLARITY

Prevention office network from contamination from laptops used by employees visiting customers, or just working outside the office, via connecting to unknown networks outside the office.

6

COMPATIBILITY WITH OTHER VENDORS & EXTRA PROTECTION FOR ESSENTIAL AREAS

Shade is compatible with security products from other vendors. Using both products together synergy security effect obtains.

8

PRODUCT CUSTOMIZATION

Shade Sandbox Platform of our own is customisable. You can purchase it as an SDK and customize it for your own needs such as integrating into your own product, extending its functionality and it is even possible to create related products such as file lockers, folder hiding software and simple DLP systems.
Drop a line to support@shadesandbox.com for more informaton!

History, Cookies, Temporary Internet files are isolated from the real OS environment. Registry, Executable and System Files, and other important information is well protected from cyber-attacks and malware activity including Worms, Trojans and Exploits

Operating System: Windows Vista SP2 x32/x64; Windows 7 x32/x64; Windows 8 x32/x64; Windows 8.1 x32/x64; Windows 10 x32/x64 CPU: 1GHz RAM: 1GB