en-US
search-icon

Capture Advanced Threat Protection

SonicWall Capture Advanced Threat Protection service is a cloud-based multi-engine sandbox designed to discover and stop unknown, zero-day attacks such as ransomware at the gateway with automated remediation.

Watch the Video >
Capture Advanced Threat Protection Product Image

Protect your organization from zero-day threats

SonicWall Capture Advanced Threat Protection service is a cloud-based multi-engine sandbox designed to discover and stop unknown, zero-day attacks such as ransomware at the gateway with automated remediation.

Watch the Video >

SonicWall Capture Advanced Threat Protection Image

SonicWall Capture Advanced Threat Protection

SonicWall Capture Advanced Threat Protection service is a cloud-based network sandbox that analyzes suspicious code to help discover and stop newly developed malware.

  • Multi-engine cloud sandbox that includes virtualization, hypervisor level analysis and full-system emulation
  • High security effectiveness at diagnosing new threats
  • Automated breach prevention enabled by blocking files until a security verdict is determined
  • Near real-time signature deployment protects organizations from follow-on attacks
  • Email and app notifications with robust reporting from the sandbox environment
Multi-engine advanced threat analysis Image

Multi-engine advanced threat analysis

Capture executes suspicious code and analyzes behavior simultaneously in multiple engines. This provides you with comprehensive visibility into malicious activity, while resisting evasion tactics and maximizing zero-day threat detection.

Broad file type analysis Image

Broad file type analysis

Analyze a broad range of operating systems and file types, including executable programs, DLL, PDF, MS Office documents, archives, JAR and APK.

Block until verdict Image

Block until verdict

To prevent potentially malicious files from entering the network, files sent to the cloud for analysis can be held at the gateway until a verdict is determined.

Rapid deployment of remediation signatures Image

Rapid deployment of remediation signatures

When a file is identified as malicious, a hash is immediately created within Capture and later a signature is sent to firewalls to prevent follow-on attacks.

Reporting and alerts Image

Reporting and alerts

Capture Advanced Threat Protection offers an at-a-glance dashboard with reports that detail the analysis results for files sent to the service, including session information, OS information, OS activity and network activity.