IDC: Addressing Advanced Threats Through Multiple Sandbox Options

Complete the form to download

Where does this information come from?

This information comes from publicly available sources and does not use private company data. To simplify the user experience by minimizing the amount of data entry required, our forms use publicly available information to auto populate company contact information.

In this report, Rob Ayoub, Certified Information Security Systems Professional (CISSP) and research director for IDC's Security Products service, explores addressing advanced threats through multiple sandbox options.


  • Why successful attacks are still occurring

  • Why today's sandboxing solutions are effective at catching advanced threats

  • Why sandboxing should be added to the traditional security stack

  • How you can ensure that your sandboxing strategy remains effective

  • What you should look for in a vendor of advanced threat protection solutions