Sandboxing technology for malware protection

One of the essential properties of modern targeted attacks is their ability to penetrate the victim's IT infrastructure without being noticed by security systems. Advanced malware uses camouflage techniques that make it invisible. In such cases, dynamic analysis, which is performed in a specialized environment - a sandbox, can help. Sandbox technologies are central to Trend Micro's Connected Threat Defense. In this post, we will talk about how sandboxing is used in Trend Micro solutions.





About sandboxes

. , , . , . , .





, .





.





. . , , . - . - , , . .





. . , , «» .





, . , , (on-premise) .





β€” on-premise

, β€” . , . .





 β€” , . , on-premise- .   , Β« Β» . SLA.





, , , , . , , , . , , , , .





, on-premise . , - .





, -, : , , , , , .





.





Trend Micro , , .





on-premise-. , .





, . on-premise .





, , . :





  1. -: , ;





  2. -: ,  β€” ;





  3. : , , , ;





  4. : - , , , .





́ Trend Micro

Trend Micro Deep Discovery Analyzer. . , Web Services API.





, - , URL API . Deep Discovery Analyzer , Β« Β» .





, , .





, , , -.








All Articles