I would describe Fortinet FortiSandbox, which has been deployed within our company's network for threat detection, as a proactive solution with multiple functionalities. A few of the functionalities of the product include areas like sandboxing, CDR, pattern-reading, and detection ratio, which are very good. I rate the product's effectiveness in dealing with zero-day threats a seven to eight out of ten, where ten means it is the most effective product for dealing with zero-day threats. As of now, Fortinet FortiSandbox is not integrated with other Fortinet solutions to improve our company's security posture. The tool is integrated with our own existing email security gateway to use anti-spam and anti-virus features. The tool should have more ability to customize from the reporting point of view. The tool should be able to provide more slicing and dicing in data. The users of the product should try to know about threat chains t with the help of the tool's MSPs so that they know the outcome of a threat that may enter their networks. In the MSP model, it would be good if the aforementioned area gets integrated. The reporting and alerting capabilities of the product have helped our company's security area since the tool provides good and deep-dive reports, which include proper reasoning for certain actions that were taken. The report will explain why it blocked or did not block certain aspects. There are detailed reports in terms of the logs that the tool provides its users. The tools also provide details on the areas that were quarantined. In general, the tool provides a very detailed report. The product is easy to maintain since my company gets proper support from Fortinet. In my company, there are many use cases to describe scenarios where the product prevented or mitigated a breach or an attack. My company operates as a managed service provider for Fortinet, and many of our customers use Fortinet FortiSandbox. When my company receives any attacks via links or attachments, FortiMail blocks such emails. I suggest others consider whether they plan to buy a solution from a security company. I will see whether the tool I use for sandboxing is from a security company or not. I will consider the catch rate of the product. I will also consider the other solutions that the vendor can bring in for me that can improve and secure my company's security posture while being easy to use and implement. I will consider whether the vendor who offers our company sandboxing features has a security background. I will look into whether the solution is interoperable or not. There should be interoperability if I need to deploy some other solution as well, like a DLP or a firewall. I rate the overall tool a seven out of ten.