Protect and secure your data from cyber attacks
Data Protection
Data Security
Data Insights
The 5 Steps to Cyber Resilience
Cloud & SaaS
Enterprise
Industries
Assess suspicious files and eradicate threats faster within the Cohesity Data Cloud console.
Bad actors are constantly evolving their tactics, techniques, and procedures (TTPs) to evade detection. From zero-day exploits to living-off-the-land (LOTL) methods, these sophisticated threats can slip through traditional defenses. Relying solely on signature-based threat detection is no longer sufficient—it simply can't catch them all, leaving organizations vulnerable to persistent intrusions.
This is where scanning backups emerges as an essential second line of defense. By threat hunting through secondary data with newly available, higher-fidelity signatures and indicators of compromise (IoCs), you can uncover hidden malware that was missed in real-time.
That said, threat hunting often reveals suspicious files that don't match any known signatures. In these cases, a malware sandbox becomes invaluable: it allows safe detonation of the file, observing its behavior to determine if it's malicious or benign, without relying on third-party verification.
We’re excited to announce that Cohesity now offers this capability, helping you to stay one step ahead of evolving threats. Secure sandbox analysis is now available in Cohesity Data Cloud, powered by Google Threat Intelligence (GTI). This feature allows you to assess the danger posed by suspicious files.
(Review documentation – customer login required.)
You can review details of the IoC, then detonate a copy of the file in question inside a secure, isolated sandbox—without exposing production environments or compromising data privacy. It’s the fastest, safest way to assess the danger posed by unknown entities.
Details of an indicator of compromise with a file reputation, powered by GTI.
Our platform, Cohesity Data Cloud, includes threat protection capabilities that identify suspicious files using:
Scans result in files being categorized as:
The “unknown” verdict is problematic. Historically, your options to address this situation have been limited. You could choose to:
Either option potentially breaks data-governance policies and introduces operational and compliance risk. You also risk proliferating infection, losing visibility, and auditability.
Now, you have a much better way to address “unknown” files—Cohesity’s new secure sandbox analysis feature.
Cohesity Data Cloud performs behavioral malware detonation directly from backup data, using Google Threat Intelligence Private Scanning.
Infrastructure and security teams can now use this capability to:
All of this can be done from the Cohesity Data Cloud console without leaving the environment.
Here’s a quick tutorial on private sandbox scanning.
A threat protection scan will then be performed over a range of data sources such as:
If the scan identifies suspicious files, they appear in the Threat Scan Results with IOC context, as shown below.
Threat scan result from Cohesity Data Cloud. Note the “verdict” column on the right.
The user then drills into the file hash and sees the “Unknown” result under the GTI Verdict. Because the file is “Unknown,” you won’t see any details about it.
To better understand the risk posed by this file, the user selects “Detonate in Sandbox / Private Scan.”
A consent pop-up message clearly explains:
No file submission proceeds without explicit user consent.
Consent window to proceed with file submission.
Here’s what happens once the file is submitted:
When the analysis completes, the user receives:
The full behavioral report becomes available in File Details. No more guesswork!
The Secure Sandbox Analysis report includes:
All this data is neatly presented in a single screen, shown below. For advanced analysis, users can download the full report as a PDF or compressed archive.
Cohesity’s secure sandbox analysis is built with privacy-first principles:
Secure sandbox analysis can be suitable for certain regulated industries such as finance, healthcare, and government.
With secure sandbox analysis, you can move beyond threat protection into threat validation—a critical step in modern cyber resilience.
This new practice combines:
Cohesity empowers you to wield a capability in a single workflow that previously required multiple tools and manual interactions.
Want to learn more?
Written By
Jared Ruckle
Sr. Director - Product Marketing, Solutions & Industry
Kamal Deka
Senior Product Manager