Protecting enterprise users and infrastructure with Sandbox
When a malicious piece of software is identified, its signature is usually added to a database. The next time the same signature is observed, it can quickly be flagged after comparing it with a signature already in the database. But how can we identify the signature the first time?
Understanding the need for a sandbox
Enter the sandbox as the solution. In the cloud, it is very easy to provision a sandbox environment, often using automated scripts, then the new piece of code that needs to be tested is executed (a.k.a. detonated) in that environment. From the resulting data, attention is focused on the adverse effects of that code on the environment. Once this is recorded, it is added to the database and propagated to the entire cloud very quickly.
Why do we prefer a cloud sandbox? Consider doing this in an on-premises solution. You need to first provision the hardware necessary and then set up your environment such...