Head First into the Sandbox White Paper

Capable of virtually emulating entire operating systems, a sandbox safely executes suspicious code so its output activity can be observed. Malicious activities including file/disc operations, network connections, registry/system configuration changes and others are exposed so threats can be neutralized.

This paper provides a deeper look into Sandboxing technology, Sandbox evasion techniques and how the key components of Fortinet’s FortiSandbox work together to thwart some of the most sophisticated network-based attacks.

Resource Details

Fortinet logo
Provided by:
Fortinet
Topic:
Tech Industry
Format:
PDF