Cloud Sandboxing
Block modern cyber threats with an advanced security layer
Tackle Malware That Can Trick Traditional Sandboxing Solutions
Regardless of a user’s geographic coordinates, NourNet Cloud Sandbox can connect them over the Web, inspecting unfamiliar files for advanced threats, such as zero-day campaigns. What makes NourNet capability truly impressive is that it provides complete sandbox protection, without backhauling traffic. Here is a brief overview of how the cloud sandbox works:
Features:
How The Cloud Sandbox Works
- The cloud sandbox waits for requests. Once a request is received, it examines an object (can be a URL or file) from a cyber security tool, along with configuration and OS instructions, the execution parameters, and the time limit of the test.
- The sandbox evaluates the artefacts and returns a final result on the file: safe or unsafe. The sandbox also attaches multiple details of the file, so other cyber security tools can go ahead with any further inspection on the file. These details include behaviour details, logs, features, and ID.
- The sandbox runs a check for the tested object.
- The sandbox gathers artefacts for the given period.