As cyber attacks increase in frequency and complexity, organizations continue to invest in prevention-centric technologies to secure their network perimeter. However, prevention-centric technologies are less than prefect. They protect networks from known threats using a combination of security rules, signatures and reputation lists.
A critical component of today’s network perimeter security is the file-based sandbox. They were created to analyze suspicious files on isolated hosts – many with different operating systems – in a contained environment.