Head First into the Sandbox White Paper
Capable of virtually emulating entire operating systems, a sandbox safely executes suspicious code so its output activity can be observed. Malicious activities including file/disc operations, network connections, registry/system configuration changes and others are exposed so threats can be neutralized.
This paper provides a deeper look into Sandboxing technology, Sandbox evasion techniques and how the key components of Fortinet’s FortiSandbox work together to thwart some of the most sophisticated network-based attacks.