Sandboxing: Stay Safe from New and Targeted Malware

Cloud Fax for Windows

Boost your anti-threat protection with our AI-powered sandboxing solution for proactive security with intelligent malware analysis.

Wide-Ranging Detection Technologies

Identify complex threats reliably with the ideal blend of behavioral anomaly detection, heuristic analysis, and comprehensive data sources.

Intelligent Pre-filtering

Quicker delivery. We reduce analysis efforts through smart pre-filtering, ensuring that only suspect files are placed in the sandbox.

Global Analysis with No Backchannel

Benefit from 50 billion analyses daily from over 500 million endpoints worldwide – without revealing your data, which always remains secure and private.
MyEAS Sandbox Configuration

The Retarus Advantage

Rule-Based Quarantine

Your administrators manage the settings centrally and efficiently via our myEAS portal or API – easily and conveniently.

Reporting and Monitoring

Receive comprehensive analyses and context details, allowing you to evaluate threats and respond in real time.

Networked Security

All Retarus Email Security components interoperate seamlessly with the sandbox ensuring optimum protection at all levels.

Customer Ratings and Reviews

“Our mail users have no troubles with using the processes related to Retarus. Releasing spam, maintaining personal black- and whitelists and understanding the need of an antispam/antimalware protection.”

Read full review IT Services, Management / Business Consulting

“In Retarus we have found a dependable partner for our email communications. Thanks to their reliable and innovative solutions, we are very well protected against any threats, both now and in the future.”

Read customer story Stefan Hopf, Head of Messaging and Collaboration, Continental AG

“Retarus Email Security is highly reliable and provides excellent detection rates.”

Read customer story Kurt Walther, Director Global IT and Business Intelligence, Puma AG

“Retarus is now so established at medbo that we simply think of you first whenever it comes to email. We get the impression that you all know what you’re doing.”

Read customer story Jürgen Schmalzbauer, Data Center Manager, medbo

“In a few words : The service works fine. It's easy to maintain and nearly self explaining. Our users are very pleased with Retarus. ”

Read full review Consumer Goods, IT
1 | 5

Features

Retarus Pre-filter
Statistical Analysis
Dynamic Analysis
Machine Learning
Data Protection Included
Only truly suspect messages undergo sandboxing. Using intelligent filtering mechanisms, we analyze files in advance – for maximum efficiency and faster delivery.

  • Reputation Analysis
  • URL extraction from files
  • Anti-malware checking
  • Wide range of supported file types: Compressed, Office and HTML

  • Machine Learning, neural networks and behavioral analytics
  • Advanced Anti-evasion mechanisms
  • IOCs and MITRE reporting
  • Custom Hypervisor

  • Reputation Analysis
  • URL extraction from files
  • Anti-malware checking
  • Wide range of supported file types: Compressed, Office and HTML

  • Machine Learning, neural networks and behavioral analytics
  • Advanced Anti-evasion mechanisms
  • IOCs and MITRE reporting
  • Custom Hypervisor

Checks thousands of file properties, allowing malware to be detected early and reliably. In this way, threats can be identified at an early stage, even if they are so new that no signature is available yet. Conventional scanners often run up against their limitations here. Not the case with our analysis.
Runs suspect files in a secure virtual environment, allowing novel malware to be identified through anomalous behavior. One special advantage: Companies using Retarus Patient Zero Detection benefit directly, as the outcomes identified through sandboxing automatically generate alert events to immediately notify all recipients of the same threat who had not yet been identified.

Thanks to leading sandbox technology, you always automatically benefit from cutting-edge machine learning approaches, neural networks and behavior analysis.

Globally networked threat intelligence, based on the analysis of trillions of files, enables the system to even detect novel threats quickly and precisely. This shared pool of data is continuously fed by thousands of companies, authorities and partners around the globe.

The result: AI models which are always up-to-date and continuously improving our detection technology – ensuring reliable protection for your email communication in real time.

We consistently employ the highest data protection standards. For us, safeguarding sensitive information isn’t an optional feature, but rather an integral part of our solution.
  • Private cloud sandbox – run entirely in the EU – contractually guaranteed
  • Hash-based analysis – no personal content, such as files, recipients, subject lines or check results, is shared with third parties
  • Certified security – ISO 27001 and SOC 2 Type II certified, with penetration testing on a regular basis
  • Data minimization in practice – all data is deleted as soon as the analysis has been completed
  • End-to-end encryption – for all transmission and file systems

Why Choose Retarus’ Email Security and Management Solutions?

All-Encompassing, Flexible Cloud Offering

When it comes to email, we are the only provider on the market to take a truly comprehensive approach. Without setting artificial boundaries between workplace, infrastructure or application. At the same time, adaptable enough to allow you to book individual solutions to suit your needs and budget at any time.

Local Processing Guaranteed

Globally active, locally rooted. In all key markets, we run independent infrastructure through our self-sufficient subsidiaries. This ensures that your data remains within your specified region. Contractually guaranteed.

30+ Years of Enterprise Project Experience

Email is in our DNA: With over 30 years of experience, Retarus is an email security pioneer. Let our expertise solve your email infrastructure challenges. No matter how complex.

Real Experts, In-House Support

We value your business. You are consistently assisted by our own dedicated experts and qualified in-house support in the local language. No anonymous support forums or external call centers.

What's Next?

Frequently Asked Questions

Which file types are analyzed by the sandbox?

The sandbox checks a wide variety of file types, including executable files, office documents, PDFs and compressed archive files. Even if data extensions have been manipulated, the sandbox recognizes the actual data type to be analyzed.

How long does it take for a file to be analyzed in the sandbox?

The duration of file analysis varies but is under four minutes in most cases. Checking especially large or complex files, for instance in archives, could take a little longer. Our intelligent pre-filter function assesses the benefit of using sandbox analysis in advance and only forwards emails where sandboxing adds real value. In this way, optimum performance is maintained while assuring security.

Which anti-evasion techniques are used?

With our AI-powered sandboxing, we rely on state-of-the-art approaches to prevent malware from recognizing the analysis environment and adapting its behavior. This includes mechanisms to safeguard against detection of virtual environments as well as methods to expose ploys to delay harmful behavior.

Can the sandbox also analyze URLs contained in emails?

Yes, the sandbox checks URLs embedded in emails by opening the linked content in a secure environment and examining it for harmful behavior.