Head First into the Sandbox White Paper

Provided by: FORTINET
Topic: Tech Industry
Format: PDF
Capable of virtually emulating entire operating systems, a sandbox safely executes suspicious code so its output activity can be observed. Malicious activities including file/disc operations, network connections, registry/system configuration changes and others are exposed so threats can be neutralized.

This paper provides a deeper look into Sandboxing technology, Sandbox evasion techniques and how the key components of Fortinet's FortiSandbox work together to thwart some of the most sophisticated network-based attacks.

Find By Topic