Alternatives to Sandboxie

Compare Sandboxie alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Sandboxie in 2024. Compare features, ratings, user reviews, pricing, and more from Sandboxie competitors and alternatives in order to make an informed decision for your business.

  • 1
    Thinfinity Workspace

    Thinfinity Workspace

    Cybele Software, Inc.

    Thinfinity® Workspace 7 is a comprehensive, secure platform that offers a zero-trust approach, enabling secure and contextual access to corporate virtual desktops, virtual applications, internal web apps, SaaS, and files, whether they are on Windows, Linux, or mainframes. It supports various deployment models, including cloud, on-premise, and hybrid settings, and can be deployed on any cloud provider of your choice. With its proprietary reverse gateway technology, Thinfinity® Remote Workspace 7 ensures secure reverse connections over SSL with TLS 1.3 encryption. This robust approach doesn't require client-side installations, firewall modifications, or the opening of inbound ports on your network, thereby enhancing the security infrastructure of your business. The platform ensures all browser-based connections are secured over HTTPS, offering a wide variety of authentication options, from straightforward User/Password to sophisticated Active Directory authentication.
    Leader badge
    Partner badge
    Compare vs. Sandboxie View Software
    Visit Website
  • 2
    Kasm Workspaces

    Kasm Workspaces

    Kasm Technologies

    Kasm Workspaces streams your workplace environment directly to your web browser…on any device and from any location. Kasm uses our high-performance streaming and secure isolation technology to provide web-native Desktop as a Service (DaaS), application streaming, and secure/private web browsing. Kasm is not just a service; it is a highly configurable platform with a robust developer API and devops-enabled workflows that can be customized for your use-case, at any scale. Workspaces can be deployed in the cloud (Public or Private), on-premise (Including Air-Gapped Networks or your Homelab), or in a hybrid configuration.
    Leader badge
    Compare vs. Sandboxie View Software
    Visit Website
  • 3
    Ambassador

    Ambassador

    Ambassador Labs

    Ambassador Edge Stack is a Kubernetes-native API Gateway that delivers the scalability, security, and simplicity for some of the world's largest Kubernetes installations. Edge Stack makes securing microservices easy with a comprehensive set of security functionality, including automatic TLS, authentication, rate limiting, WAF integration, and fine-grained access control. The API Gateway contains a modern Kubernetes ingress controller that supports a broad range of protocols including gRPC and gRPC-Web, supports TLS termination, and provides traffic management controls for resource availability. Why use Ambassador Edge Stack API Gateway? - Accelerate Scalability: Manage high traffic volumes and distribute incoming requests across multiple backend services, ensuring reliable application performance. - Enhanced Security: Protect your APIs from unauthorized access and malicious attacks with robust security features. - Improve Productivity & Developer Experience
    Compare vs. Sandboxie View Software
    Visit Website
  • 4
    Google Cloud Run
    Cloud Run is a fully-managed compute platform that lets you run your code in a container directly on top of Google's scalable infrastructure. We’ve intentionally designed Cloud Run to make developers more productive - you get to focus on writing your code, using your favorite language, and Cloud Run takes care of operating your service. Fully managed compute platform for deploying and scaling containerized applications quickly and securely. Write code your way using your favorite languages (Go, Python, Java, Ruby, Node.js, and more). Abstract away all infrastructure management for a simple developer experience. Build applications in your favorite language, with your favorite dependencies and tools, and deploy them in seconds. Cloud Run abstracts away all infrastructure management by automatically scaling up and down from zero almost instantaneously—depending on traffic. Cloud Run only charges you for the exact resources you use. Cloud Run makes app development & deployment simpler.
  • 5
    VMware Fusion Pro
    VMware Fusion gives Mac users the power to run Windows on Mac along with hundreds of other operating systems side by side with Mac applications, without rebooting. Fusion is simple enough for home users and powerful enough for IT professionals, developers and businesses. Running Windows on Mac is only the beginning. VMware Fusion lets you choose from hundreds of supported operating systems, from lesser-known Linux distributions to the latest Windows 10 release, to run side by side with the latest macOS release. Fusion makes it simple to test nearly any OS and app on a Mac. Build and test apps in a sandbox while securely sharing local source files and folders. Fusion Pro now includes a RESTful API to integrate with modern development tools like Docker, Vagrant, Ansible, Chef, and others to fit the power of VMware into today’s Agile and DevOps-oriented production pipelines.
  • 6
    Red Hat OpenShift
    The Kubernetes platform for big ideas. Empower developers to innovate and ship faster with the leading hybrid cloud, enterprise container platform. Red Hat OpenShift offers automated installation, upgrades, and lifecycle management throughout the container stack—the operating system, Kubernetes and cluster services, and applications—on any cloud. Red Hat OpenShift helps teams build with speed, agility, confidence, and choice. Code in production mode anywhere you choose to build. Get back to doing work that matters. Red Hat OpenShift is focused on security at every level of the container stack and throughout the application lifecycle. It includes long-term, enterprise support from one of the leading Kubernetes contributors and open source software companies. Support the most demanding workloads including AI/ML, Java, data analytics, databases, and more. Automate deployment and life-cycle management with our vast ecosystem of technology partners.
    Starting Price: $50.00/month
  • 7
    Docker

    Docker

    Docker

    Docker takes away repetitive, mundane configuration tasks and is used throughout the development lifecycle for fast, easy and portable application development, desktop and cloud. Docker’s comprehensive end-to-end platform includes UIs, CLIs, APIs and security that are engineered to work together across the entire application delivery lifecycle. Get a head start on your coding by leveraging Docker images to efficiently develop your own unique applications on Windows and Mac. Create your multi-container application using Docker Compose. Integrate with your favorite tools throughout your development pipeline, Docker works with all development tools you use including VS Code, CircleCI and GitHub. Package applications as portable container images to run in any environment consistently from on-premises Kubernetes to AWS ECS, Azure ACI, Google GKE and more. Leverage Docker Trusted Content, including Docker Official Images and images from Docker Verified Publishers.
    Starting Price: $7 per month
  • 8
    BUFFERZONE

    BUFFERZONE

    Bufferzone Security

    BUFFERZONE provides a patented containment and disarming solution that defends endpoints against advanced malware and zero-day attacks while maximizing user and IT productivity. By isolating potentially malicious content coming from browsers, email and removable media, BUFFERZONE defends individuals and organizations from advanced threats that evade detection. BUFFERZONE disarms content for securely transferring it from the container to the native endpoint and secure network zones, and provides critical intelligence for enterprise-wide security analytics. Easy to deploy and configure, BUFFERZONE is a lightweight solution that provides cost-effective containment for up to thousands of endpoints.
  • 9
    Cuckoo Sandbox
    You can throw any suspicious file at it and in a matter of minutes Cuckoo will provide a detailed report outlining the behavior of the file when executed inside a realistic but isolated environment. Malware is the swiss-army knife of cybercriminals and any other adversary to your corporation or organization. In these evolving times, detecting and removing malware artifacts is not enough: it's vitally important to understand how they operate in order to understand the context, the motivations, and the goals of a breach. Cuckoo Sandbox is free software that automated the task of analyzing any malicious file under Windows, macOS, Linux, and Android. Cuckoo Sandbox is an advanced, extremely modular, and 100% open source automated malware analysis system with infinite application opportunities. Analyze many different malicious files (executables, office documents, pdf files, emails, etc) as well as malicious websites under Windows, Linux, macOS, and Android virtualized environments.
  • 10
    Joe Sandbox

    Joe Sandbox

    Joe Security

    Tired of high level malware analysis? Perform one of the deepest analysis possible - fully automated or manual - from static to dynamic, from dynamic to hybrid, from hybrid to graph analysis. Rather than focus on one, use the best of multiple technologies including hybrid analysis, instrumentation, hooking, hardware virtualization, emulation and machine learning / AI. Check out our reports to see the difference. Deeply analyze URLs to detect phishing, drive by downloads, tech scam and more. Joe Sandbox uses an advanced AI based algorithm including template matching, perptual hashing, ORB feature detection and more to detect the malicious use of legit brands on websites. Add your own logos and templates to extend the detection capabilities. Interact with the sandbox through Live Interaction - directly from your browser. Click through complex phishing campains or malware installers. Test your software against backdoors, information leakage and exploits (SAST and DAST).
  • 11
    rkt

    rkt

    Red Hat

    rkt is an application container engine developed for modern production cloud-native environments. It features a pod-native approach, a pluggable execution environment, and a well-defined surface area that makes it ideal for integration with other systems. The core execution unit of rkt is the pod, a collection of one or more applications executing in a shared context (rkt's pods are synonymous with the concept in the Kubernetes orchestration system). rkt allows users to apply different configurations (like isolation parameters) at both pod-level and at the more granular per-application level. rkt's architecture means that each pod executes directly in the classic Unix process model (i.e. there is no central daemon), in a self-contained, isolated environment. rkt implements a modern, open, standard container format, the App Container (appc) spec, but can also execute other container images, like those created with Docker.
  • 12
    SHADE Sandbox

    SHADE Sandbox

    SHADE Sandbox

    You browse the internet everywhere and your device is at a threat of malware attack, therefore advanced appliance-based sandboxing is immensely useful. Sandboxing tool is like a protective layer that restrains viruses and malware in the virtual environment. SHADE Sandbox is used to safely execute suspicious code without any risk of causing harm to the network or host device. SHADE Sandbox is a program that creates an isolated environment. It is the most effective shareware sandboxing solution. Downloading and installing SHADE Sandbox for advanced malware attack prevention creates a layer of protection against any security threat, which is previously unseen cyber-attacks and particularly, stealthy malware. The best part of sandbox is what happens in the sandbox remains in it – prohibiting system failures and stopping software vulnerabilities from spreading. SHADE Sandbox and protect your PC!
    Starting Price: $ 21.02 per year
  • 13
    FreeBSD Jails
    Since system administration is a difficult task, many tools have been developed to make life easier for the administrator. These tools often enhance the way systems are installed, configured, and maintained. One of the tools which can be used to enhance the security of a FreeBSD system is jails. Jails have been available since FreeBSD 4.X and continue to be enhanced in their usefulness, performance, reliability, and security. Jails build upon the chroot(2) concept, which is used to change the root directory of a set of processes. This creates a safe environment, separate from the rest of the system. Jails improve on the concept of the traditional chroot environment in several ways. In a traditional chroot environment, processes are only limited in the part of the file system they can access. The rest of the system resources, system users, running processes, and the networking subsystem are shared by the chrooted processes and the processes of the host system.
  • 14
    Mirantis Kubernetes Engine
    Mirantis Kubernetes Engine (formerly Docker Enterprise) provides simple, flexible, and scalable container orchestration and enterprise container management. Use Kubernetes, Swarm, or both, and experience the fastest time to production for modern applications across any environment. Enterprise container orchestration Avoid lock-in. Run Mirantis Kubernetes Engine on bare metal, or on private or public clouds—and on a range of popular Linux distributions. Reduce time-to-value. Hit the ground running with out-of-the-box dependencies including Calico for Kubernetes networking and NGINX for Ingress support. Leverage open source. Save money and maintain control by using a full stack of open source-based technologies that are production-proven, scalable, and extensible. Focus on apps—not infrastructure. Enable your IT team to focus on building business-differentiating applications when you couple Mirantis Kubernetes Engine with OpsCare Plus for a fully-managed K8s experience.
  • 15
    KubeSphere

    KubeSphere

    KubeSphere

    KubeSphere is a distributed operating system for cloud-native application management, using Kubernetes as its kernel. It provides a plug-and-play architecture, allowing third-party applications to be seamlessly integrated into its ecosystem. KubeSphere is also a multi-tenant enterprise-grade open-source Kubernetes container platform with full-stack automated IT operations and streamlined DevOps workflows. It provides developer-friendly wizard web UI, helping enterprises to build out a more robust and feature-rich Kubernetes platform, which includes the most common functionalities needed for enterprise Kubernetes strategies. A CNCF-certified Kubernetes platform, 100% open-source, built and improved by the community. Can be deployed on an existing Kubernetes cluster or Linux machines, supports the online and air-gapped installation. Deliver DevOps, service mesh, observability, application management, multi-tenancy, storage, and networking management in a unified platform.
  • 16
    Cloud Foundry

    Cloud Foundry

    Cloud Foundry

    Cloud Foundry makes it faster and easier to build, test, deploy and scale applications, providing a choice of clouds, developer frameworks, and application services. It is an open source project and is available through a variety of private cloud distributions and public cloud instances. Cloud Foundry has a container-based architecture that runs apps in any programming language. Deploy apps to CF using your existing tools and with zero modification to the code. Instantiate, deploy, and manage high-availability Kubernetes clusters with CF BOSH on any cloud. By decoupling applications from infrastructure, you can make individual decisions about where to host workloads – on premise, in public clouds, or in managed infrastructures – and move those workloads as necessary in minutes, with no changes to the app.
  • 17
    OpenVZ

    OpenVZ

    Virtuozzo

    Open source container-based virtualization for Linux. Multiple secure, isolated Linux containers (otherwise known as VEs or VPSs) on a single physical server enabling better server utilization and ensuring that applications do not conflict. Each container performs and executes exactly like a stand-alone server; a container can be rebooted independently and have root access, users, IP addresses, memory, processes, files, applications, system libraries and configuration files.
  • 18
    FortiSandbox
    Unlike previous generation of viruses that were non-sophisticated and low in volume, antivirus tools were sufficient to provide reasonable protection with their database of signatures. However, today’s modern malware entails new techniques such as use of exploits. Exploiting a vulnerability in a legitimate application can cause anomalous behavior and it’s this behavior that attackers take advantage of to compromise computer systems. The process of an attack by exploiting an unknown software vulnerability is what is known as a zero-day attack aka 0-day attack, and before sandboxing there was no effective means to stop it. A malware sandbox, within the computer security context, is a system that confines the actions of an application, such as opening a Word document, to an isolated environment. Within this safe environment the sandbox analyzes the dynamic behavior of an object and its various application interactions in a pseudo-user environment and uncovers any malicious intent.
  • 19
    Podman

    Podman

    Containers

    What is Podman? Podman is a daemonless container engine for developing, managing, and running OCI Containers on your Linux System. Containers can either be run as root or in rootless mode. Simply put: alias docker=podman. Manage pods, containers, and container images. Supporting docker swarm. We believe that Kubernetes is the defacto standard for composing Pods and for orchestrating containers, making Kubernetes YAML a defacto standard file format. Hence, Podman allows the creation and execution of Pods from a Kubernetes YAML file (see podman-play-kube). Podman can also generate Kubernetes YAML based on a container or Pod (see podman-generate-kube), which allows for an easy transition from a local development environment to a production Kubernetes cluster.
  • 20
    Oracle Container Engine for Kubernetes
    Container Engine for Kubernetes (OKE) is an Oracle-managed container orchestration service that can reduce the time and cost to build modern cloud native applications. Unlike most other vendors, Oracle Cloud Infrastructure provides Container Engine for Kubernetes as a free service that runs on higher-performance, lower-cost compute shapes. DevOps engineers can use unmodified, open source Kubernetes for application workload portability and to simplify operations with automatic updates and patching. Deploy Kubernetes clusters including the underlying virtual cloud networks, internet gateways, and NAT gateways with a single click. Automate Kubernetes operations with web-based REST API and CLI for all actions including Kubernetes cluster creation, scaling, and operations. Oracle Container Engine for Kubernetes does not charge for cluster management. Easily and quickly upgrade container clusters, with zero downtime, to keep them up to date with the latest stable version of Kubernetes.
  • 21
    Comodo Internet Security
    Our sandbox technology automatically locks unknown files in a secure environment while our Valkyrie system tests their behavior in real-time - protecting you against malware that the virus industry hasn’t even discovered yet. Hot spot protection that encrypts all data transmitted over both wired and wireless Internet connections up to 10GB per month. Secure Shopping lets you shop and bank online with confidence. This breakthrough technology isolates your browser inside a secure container which cannot be hacked, tracked or viewed by malware or internet thieves. Tracks down and destroy any existing malware hiding in a PC. Detects spyware threats and destroys each infection. Prevents malicious software turning your PC into a zombie. Protects critical system files and blocks malware before it installs. Cutting-edge protection against sophisticated buffer overflow attacks.
    Starting Price: $29.99 per year
  • 22
    CodeSandbox

    CodeSandbox

    CodeSandbox

    CodeSandbox is a cloud development platform that empowers development teams to code, collaborate, and ship projects of any size from any device in record time. Run your code in powerful microVMs and build anything without limits. We configure your environment for you and keep your code always ready, behind a URL. Boxy, the CodeSandbox AI coding assistant, is also now available to all Pro subscribers.
    Starting Price: $12 per month
  • 23
    V-OS Virtual Secure Element
    V-OS is V-Key’s core patented technology, a virtual secure element. It is a secure sandbox that is embedded within a native iOS or Android mobile app and creates a safe operating environment where data can be stored and cryptographic processes can be executed in isolation from the rest of the mobile app. In this video, we take a step back to introduce and explain the core of our technology, V-OS. With V-OS as the security foundation of your mobile application, your organization can build a wide range of solutions that are secure, trusted and scalable, and customized to your business needs. Layered tamper detection and response mechanisms. Patented cryptographic virtual machine. FIPS 140-2 Level 1 and Common Criteria EAL3+. Minimizes total costs of ownership. Faster market penetration with effortless over-the-air deployment. Flexible and extensible SDK framework. Eradicate costly hardware dependency.
    Starting Price: Free
  • 24
    Shadow Defender

    Shadow Defender

    Shadow Defender

    Shadow Defender is an easy-to-use security solution (for Windows operating systems) that protects your PC/laptop real environment against malicious activities and unwanted changes. Shadow Defender can run your system in a virtual environment called 'Shadow Mode'. 'Shadow Mode' redirects each system change to a virtual environment with no change to your real environment. If you experience malicious activities and/or unwanted changes, perform a reboot to restore your system back to its original state, as if nothing happened. With Shadow Defender, you have the flexibility to specify which files and folders are permanently saved to the real environment. This ensures important files and folders are kept after a reboot. If you want to make a maintenance-free computer, Shadow Defender will be your best choice. Surf the internet safely and eliminate unwanted traces. Eliminate system downtime and maintenance costs. Reboot to restore your system back to its original state.
    Starting Price: $39 one-time payment
  • 25
    MoQuality

    MoQuality

    MoQuality

    MoQuality is a sandbox that enables end-to-end UI testing for your Android and iOS apps. Helps build robust Appium tests. No more flaky tests. Integrates with your continuous testing workflow. Stores all test artifacts (tests, builds and reports) under one dashboard. Generates visual test reports to assist with triaging and test maintenance. Enables advanced functionality over Appium open-source. Write your Appium tests in Python, Java, JavaScript (wd/webdriverio). Build and debug your Appium script on the fly with MoQuality. Run the tests locally on real devices, emulators, and simulators. Test reports are the results of test runs that are saved by the user. You can run your Appium tests locally as many times as you wish. MoQuality supports most Android and iOS real devices, emulators and simulators. We do not restrict the number of users per license. Go ahead and add all your teammates to share the test reports.
    Starting Price: $25 per month
  • 26
    Apache Mesos

    Apache Mesos

    Apache Software Foundation

    Mesos is built using the same principles as the Linux kernel, only at a different level of abstraction. The Mesos kernel runs on every machine and provides applications (e.g., Hadoop, Spark, Kafka, Elasticsearch) with API’s for resource management and scheduling across entire datacenter and cloud environments. Native support for launching containers with Docker and AppC images.Support for running cloud native and legacy applications in the same cluster with pluggable scheduling policies. HTTP APIs for developing new distributed applications, for operating the cluster, and for monitoring. Built-in Web UI for viewing cluster state and navigating container sandboxes.
  • 27
    Oracle Cloud Infrastructure Compute
    Oracle Cloud Infrastructure provides fast, flexible, and affordable compute capacity to fit any workload need from performant bare metal servers and VMs to lightweight containers. OCI Compute provides uniquely flexible VM and bare metal instances for optimal price-performance. Select exactly the number of cores and the memory your applications need. Delivering high performance for enterprise workloads. Simplify application development with serverless computing. Your choice of technologies includes Kubernetes and containers. NVIDIA GPUs for machine learning, scientific visualization, and other graphics processing. Capabilities such as RDMA, high-performance storage, and network traffic isolation. Oracle Cloud Infrastructure consistently delivers better price performance than other cloud providers. Virtual machine-based (VM) shapes offer customizable core and memory combinations. Customers can optimize costs by choosing a specific number of cores.
    Starting Price: $0.007 per hour
  • 28
    IBM WebSphere Hybrid Edition
    WebSphere Hybrid Edition is a flexible, all-in-one solution for WebSphere application server deployments that can enable organizations to meet current and future requirements. It will enable you to optimize your existing WebSphere entitlements, modernize your applications, and build new cloud-native Java EE applications. An all-in-one solution to help you run, modernize and create new Java applications. Use IBM Cloud® Transformation Advisor and IBM Mono2Micro to help assess the cloud readiness of your applications, explore options for containerization and microservices, and get assistance in adapting code. Explore and unlock the benefits of the all-in-one IBM WebSphere Hybrid Edition solution for your application run time and modernization features. Identify which WebSphere applications can easily move to containers for immediate savings. Manage costs, enhancements, and security proactively throughout the application lifecycle.
  • 29
    Oracle Solaris
    We’ve been designing the OS for for more than two decades, always ensuring that we’ve engineered in features to meet the latest market trends while maintaining backward compatibility. Our Application Binary Guarantee gives you the ability to run your newest and legacy applications on modern infrastructure. Integrated lifecycle management technologies allow you to issue a single command to update your entire cloud installation—clear down to the firmware and including all virtualized environments. One large financial services company saw a 16x efficiency gain by managing its virtual machines (VMs) using Oracle Solaris, compared to a third-party open-source platform. New additions to the Oracle Solaris Observability tools allow you to troubleshoot system and application problems in real time, giving you real-time and historical insight and allowing for unprecedented power to diagnose and resolve issues quickly and easily.
  • 30
    AP Lens

    AP Lens

    AP Lens

    AP Lens is a Sandbox Browser that isolates networks using DNS Whitelisting. We stop the attack before it reaches the network. What does AP Lens provide? - Web Filtering: Flexible and user-friendly content blocking. - Anti-Phishing: Stop look-alike domains with 100% accuracy. - Ransomware Protection: Isolate the network without affecting business applications. - Secure Remote Work: Enforce internet usage policies without VPN slowness. - No More 0-Day Attacks: Escape the limits of blacklisting with AP Lens Augmented Whitelist. - Compliant: AP Lens meets regulatory requirements requested by cybersecurity insurance policies. - One-Click Installation: No need for a lengthy setup process or updating from the user's side. - No Maintenance: Stop malware and phishing without continuous monitoring. Our team builds on over 20 years of experience in cyber security, cloud security, and information protection in industries such as private banking and the public sector.
  • 31
    Apozy Airlock
    Apozy Airlock. The browser endpoint detection and response platform that neutralizes web attacks in one click. The Internet is a dangerous place. It doesn’t have to be. Airlock fills the gap in your EPP/EDR by protecting the browser, delivering a safe, clean, and lightning-fast internet experience. Powered by the very first visually-aware native browser isolation platform with over 6 petabytes of visual data, Airlock prevents web attacks in real time. Airlock stops spearfishing in its tracks. With a visual model database of over 67.83 billion pages which analyzes over 12.20 trillion links per year, our technology protects anyone clicking on a malicious link by sandboxing the threat.
    Starting Price: $9/month/user
  • 32
    Cisco Secure Malware Analytics
    Secure Malware Analytics (formerly Threat Grid) combines advanced sandboxing with threat intelligence into one unified solution to protect organizations from malware. With a robust, context-rich malware knowledge base, you will understand what malware is doing, or attempting to do, how large a threat it poses, and how to defend against it. Secure Malware Analytics rapidly analyzes files and suspicious behavior across your environment. Your security teams get context-rich malware analytics and threat intelligence, so they’re armed with insight into what a file is doing and can quickly respond to threats. Secure Malware Analytics analyzes the behavior of a file against millions of samples and billions of malware artifacts. Secure Malware Analytics identifies key behavioral indicators of malware and their associated campaigns. Take advantage of Secure Malware Analytics's robust search capabilities, correlations, and detailed static and dynamic analyses.
  • 33
    VirtualBox
    VirtualBox is a powerful x86 and AMD64/Intel64 virtualization product for enterprise as well as home use. Not only is VirtualBox an extremely feature rich, high performance product for enterprise customers, it is also the only professional solution that is freely available as Open Source Software under the terms of the GNU General Public License (GPL) version 2. See "About VirtualBox" for an introduction. Presently, VirtualBox runs on Windows, Linux, Macintosh, and Solaris hosts and supports a large number of guest operating systems including but not limited to Windows (NT 4.0, 2000, XP, Server 2003, Vista, Windows 7, Windows 8, Windows 10), DOS/Windows 3.x, Linux (2.4, 2.6, 3.x and 4.x), Solaris and OpenSolaris, OS/2, and OpenBSD. VirtualBox is being actively developed with frequent releases and has an ever growing list of features, supported guest operating systems and platforms it runs on. VirtualBox is a community effort backed by a dedicated company.
  • 34
    VMware Workstation Pro
    VMware Workstation Pro is the industry standard for running multiple operating systems as virtual machines (VMs) on a single Linux or Windows PC. IT professionals, developers and businesses who build, test or demo software for any device, platform or cloud rely on Workstation Pro. VMware Workstation Pro allows you to run multiple operating systems at once on the same Windows or Linux PC. Create real Linux and Windows VMs and other desktop, server, and tablet environments, complete with configurable virtual networking and network condition simulation, for use in code development, solution architecting, application testing, product demonstrations and more. Securely connect with vSphere, ESXi or other Workstation servers to launch, control and manage both virtual machines (VMs) and physical hosts. A common VMware hypervisor maximizes productivity and enables easy transfer of VMs to and from your local PC.
  • 35
    CloudSandboxes

    CloudSandboxes

    CloudSandboxes

    Now it is possible to organize your one-day resources in the CloudSandboxes environment. Save up to 80%. To manage resources created during a demo, you need to keep track on them. Create these one-day resources in a sandbox environment. CloudSandboxes will organize the closing after each working day. Quality asks for cloud certified employees. Preparation for exams should be done in a save and cheap sandbox solution. The created resources for this purpose are neatly cleaned up by CloudSandboxes. An architect will experiment with cloud resources before they become part of a user story. Use these temporarily resources in a sandbox solution. They will not clutter dev and test environments. CloudSandboxes will safely close only your one-day resources. CloudSandboxes has no restrictions on its use. You can use CloudSandboxes to manage all your one-day resources. CloudSandboxes will take care of the used one-day resources when their working day is over.
    Starting Price: €199 per month
  • 36
    Ondat

    Ondat

    Ondat

    Accelerate your development by using a storage layer that works natively with your Kubernetes environment. Focus on running your application, while we make sure you have the persistent volumes that give you the scale and stability you need. Reduce complexity and increase efficiency in your app modernization journey by truly integrating stateful storage into Kubernetes. Run your database or any persistent workload in a Kubernetes environment without having to worry about managing the storage layer. Ondat gives you the ability to deliver a consistent storage layer across any platform. We give you the persistent volumes to allow you to run your own databases without paying for expensive hosted options. Take back control of your data layer in Kubernetes. Kubernetes-native storage with dynamic provisioning that works as it should. Fully API-driven, tight integration with your containerized applications.
  • 37
    LXD

    LXD

    Canonical

    LXD is a next generation system container manager. It offers a user experience similar to virtual machines but using Linux containers instead. It's image based with pre-made images available for a wide number of Linux distributions and is built around a very powerful, yet pretty simple, REST API. To get a better idea of what LXD is and what it does, you can try it online! Then if you want to run it locally, take a look at our getting started guide. The LXD project was founded and is currently led by Canonical Ltd with contributions from a range of other companies and individual contributors. The core of LXD is a privileged daemon which exposes a REST API over a local unix socket as well as over the network (if enabled). Clients, such as the command line tool provided with LXD itself then do everything through that REST API. It means that whether you're talking to your local host or a remote server, everything works the same way.
  • 38
    Avira Cloud Sandbox
    The Avira Cloud Sandbox is an award-winning, unlimited-scale automated malware analysis service. It blends multiple advanced analysis technologies to deliver a complete threat intelligence report from an uploaded file. The Cloud Sandbox API delivers a detailed, file-specific, threat intelligence report. It contains valuable, actionable intelligence. The report has a detailed classification of the file, information on the techniques, tactics and procedures (IoCs) present in the threat, and a description of how and why the submitted file was identified as clean, malicious, or suspicious. Avira’s Cloud Sandbox leverages the technologies developed within the Avira Protection Cloud, the cloud security system that underpins the anti-malware and threat intelligence solutions of Avira. Through OEM technology partnerships we protect many of the world’s leading cyber-security vendors, and nearly a billion people world-wide.
  • 39
    NayaOne

    NayaOne

    NayaOne

    NayaOne stands as your gateway to financial technology, offering a unique Sandbox as a Service platform that empowers institutions to innovate, build, and test digital solutions with unmatched speed and security. NayaOne stands as your gateway to financial technology, offering a unique Sandbox as a Service platform that empowers institutions to innovate, build, and test digital solutions with unmatched speed and security. Seamlessly connecting new technologies with existing banking systems often presents significant technical challenges. Adopting new technologies comes with the need to maintain the utmost standards of data security and regulatory compliance. Growing the business in innovative ways is riddled with risks and the majority of the changes require technology from a third party.
  • 40
    ANY.RUN

    ANY.RUN

    ANY.RUN

    ANY.RUN is an online interactive sandbox for DFIR/SOC investigations. The service gives access to fast malware analysis and detection of cybersecurity threats. The effectiveness of the solution has been proven by over 400,000 active users who find new threats with ANY.RUN daily. More than 1000 companies have already taken advantage of ANY.RUN malware analysis sandbox, which is available to businesses of all sizes and at an affordable cost. The easy-to-use service also helps companies improve and simplify malware analysis process and cyber security as a whole. Committed to helping organizations proactively detect and defend against advanced cyber threats, ANY.RUN delivers a cutting-edge interactive solution that empowers companies to quickly analyze malware, which continuously changes and evolves. Learn more at ANY.RUN's website.
    Starting Price: $109 per month
  • 41
    Trellix Intelligent Sandbox
    Advanced detection for stealthy, zero-day malware. Combine in-depth static code analysis, dynamic analysis (malware sandboxing), and machine learning to increase zero-day threat and ransomware detection. Immediately share threat intelligence across your entire infrastructure—including multi-vendor ecosystems—to reduce time from threat encounter to containment. Validate threats and access critical indicators of compromise (IoCs) needed for investigation and threat hunting. Choose virtual or physical appliances, or public cloud deployments in Microsoft Azure. Trellix Intelligent Sandbox works with existing Trellix solutions, third-party email gateways, and other products supporting open standards. Tight product integration enables efficient alert management and maintains throughput and policy enforcement. Support for OpenIOC and STIX over TAXII further enhances integration.
  • 42
    Symantec Content Analysis
    Symantec Content Analysis automatically escalates and brokers potential zero-day threats for dynamic sandboxing and validation before sending content to users. Analyze unknown content from one central location. Leveraging Symantec ProxySG, this malware analyzer uses a unique multi-layer inspection and dual-sandboxing approach to reveal malicious behavior and expose zero-day threats, and safely detonate suspicious files and URLs. Content Analysis delivers multi-layer file inspection to better protect your organization against known and unknown threats. Unknown or suspicious content from sources like ProxySG, messaging gateway, or other tools is delivered to Content Analysis for deep inspection, interrogation, analysis and ultimately blocking, if deemed malicious. Recent enhancements to Content Analysis strengthens this platform even further.
  • 43
    WP Sandbox

    WP Sandbox

    WP Sandbox

    Let your customers try your WordPress solutions in a customized sandbox before they buy. Front-end and back-end, fully customizable. Perfect for WordPress developers, designers, & agencies who want to let clients explore fully-functioning backend demos of their work. We’re loved by customer support teams who need to quickly diagnose issues and share their findings with the rest of the team with a simple reusable link. Give your customers access to full WordPress sandbox demo sites — pre-installed with your plugins and themes, and customized with your settings. Create full WordPress sites, complete with front-end and secure back-end access with one easy link.
    Starting Price: $49 per month
  • 44
    Apptimized SafeBox
    The software you use within the IT environment impacts the productivity of your team and business. But, what if software doesn't fit or you can't use it within the corporate infrastructure? It can cause the growth of Shadow IT and jeopardize your IT estate, from software contamination to the failure of the entire system. Apptimized SafeBox allows you to use a managed sandbox environment in the cloud and work with non-standard workloads depending on your needs. Use cloud-native safeboxes to assess, test, evaluate, package, etc. before installing software on your devices. Any data produced using SafeBox and your installed apps are kept kept as long as you need. Also, SafeBox provides you with a snapshot feature that allows you to switch between SafeBox states, setups, and configurations. If you wish to go back to the initial or intermediate state - simply revert it to a snapshot.
  • 45
    Ostia Portus

    Ostia Portus

    Ostia Software Solutions

    In many of today’s institutions, implementation of a new product idea or product enhancement takes months, if not years. This is the result of complex IT environments and infrastructure; change control and the need for production stability and reliability, security considerations etc. – the list is long. Wouldn’t it be great if one could implement a new product idea in weeks? Portus is a technology for the creation of clever test systems on demand. It tackles the challenge of making complex IT test systems available quickly and on demand by creating simulations of the required links to the back office IT systems. This enables test systems to be made available sooner thus reducing the test timeline from months (according to our reference customers) to weeks or even days. This converts to earlier delivery of new or enhanced applications with less risk and at reduced cost. Portus test systems can be created in days, on cost effective commodity hardware and software.
  • 46
    ToolWiz Time Freeze
    Create a virtual environment as a copy of the real system where allows an unmodified operating system with all of its installed software to run, keeping your actual system frozen and away from unwanted changes and malicious threats. Nothing bad can happen to your PC while Toolwiz Time Freeze is up and running. Run multiple operation systems (real&virtual systems) at the same time on the same PC without reboot and easily switch between them to optimize your PC resources and improve efficiency. Consolidate the management and utilization of your system’s resources to help you build a more flexible and responsive IT infrastructure. No matter what changes are made, no matter what happens, a simple restart will return things to the way they were. Modifications made to the settings can be undone, files downloaded from the web can be removed, and other unwanted changes will all can be undone when you restart your PC.
  • 47
    Open Container Initiative (OCI)

    Open Container Initiative (OCI)

    Open Container Initiative (OCI)

    The Open Container Initiative is an open governance structure for the express purpose of creating open industry standards around container formats and runtimes. Established in June 2015 by Docker and other leaders in the container industry, the OCI currently contains two specifications, the runtime specification (runtime-spec) and the image specification (image-spec). The runtime specification outlines how to run a “filesystem bundle” that is unpacked on disk. At a high-level an OCI implementation would download an OCI Image then unpack that image into an OCI Runtime filesystem bundle. At this point the OCI Runtime Bundle would be run by an OCI Runtime. The Open Container Initiative (OCI) is a lightweight, open governance structure (project), formed under the auspices of the Linux Foundation, for the express purpose of creating open industry standards around container formats and runtime. The OCI was launched on June 22nd 2015 by Docker, CoreOS and other leaders.
  • 48
    Turbo

    Turbo

    Turbo.net

    Turbo lets you publish and manage all of your enterprise applications from a single point to every platform and device. Book a demo with our team to see Turbo in action. Deploy custom containerized applications on desktops, on-premises servers, and public and private clouds. The student digital workspace brings applications to every campus and personal device. Deliver applications everywhere from a single, configurable container environment. Freely migrate between devices and platforms with rich APIs and connectors. Deploy to managed and BYOD PCs with no installs. Stream to HTML5, Mac, and mobile with Turbo Application Server. Publish to existing Citrix and VMware VDI environments. Dynamically image applications onto non-persistent WVD instances. Bring course applications directly inside Canvas, Blackboard, and other major LMS systems. Authoring environment for creating your own containerized applications and components.
    Starting Price: $19 per month
  • 49
    LXC

    LXC

    Canonical

    LXC is a userspace interface for the Linux kernel containment features. Through a powerful API and simple tools, it lets Linux users easily create and manage system or application containers. LXC containers are often considered as something in the middle between a chroot and a full fledged virtual machine. The goal of LXC is to create an environment as close as possible to a standard Linux installation but without the need for a separate kernel. LXC is free software, most of the code is released under the terms of the GNU LGPLv2.1+ license, some Android compatibility bits are released under a standard 2-clause BSD license and some binaries and templates are released under the GNU GPLv2 license. LXC's stable release support relies on the Linux distributions and their own commitment to pushing stable fixes and security updates.
  • 50
    balenaEngine
    An engine purpose-built for embedded and IoT use cases, based on Moby Project technology from Docker. 3.5x smaller than Docker CE, packaged as a single binary. Available for a wide variety of chipset architectures, supporting everything from tiny IoT devices to large industrial gateways. Bandwidth-efficient updates with binary diffs, 10-70x smaller than pulling layers in common scenarios. Extract layers as they arrive to prevent excessive writing to disk, protecting your storage from eventual corruption. Atomic and durable image pulls defend against partial container pulls in the event of power failure. Prevents page cache thrashing during image pull, so your application runs undisturbed in low-memory situations. balenaEngine is a new container engine purpose-built for embedded and IoT use cases and compatible with Docker containers. Based on Moby Project technology from Docker, balenaEngine supports container deltas for 10-70x more efficient bandwidth usage.