Downloads: 5 | Views: 40 | Weekly Hits: ⮙5 | Monthly Hits: ⮙5
Analysis Study Research Paper | Computer Science & Engineering | Saudi Arabia | Volume 13 Issue 3, March 2024 | Popularity: 6.1 / 10
Optimizing Network Security through Inline Sandbox Deployment: A Practical Approach with Trellix
Tahir Bashir
Abstract: This paper examines the deployment of the Trellix sandbox in inline mode to enhance network security within critical infrastructure environments. The primary objective of this study is to evaluate the sandbox?s real time threat detection and mitigation capabilities while ensuring minimal impact on network performance. Performance metrics, including latency, false positive rates, and detection accuracy, were collected during both normal and high traffic scenarios. The results demonstrate a significant improvement in threat detection with minimal latency, underscoring the effectiveness of inline sandbox deployment for organizations managing sensitive and critical data.
Keywords: inline sandbox deployment, Trellix, network security, real time threat detection, cybersecurity
Edition: Volume 13 Issue 3, March 2024
Pages: 1927 - 1929
Similar Articles
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 4, April 2024
Pages: 923 - 930Robustness Testing for AI/ML Models: Strategies for Identifying and Mitigating Vulnerabilities
Praveen Kumar, Shailendra Bade
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Informative Article, Computer Science & Engineering, India, Volume 12 Issue 12, December 2023
Pages: 2074 - 2078DevSecOps: Integrating Security into the DevOps Pipeline
Dinesh Reddy Chittibala
Downloads: 2 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2
Informative Article, Computer Science & Engineering, India, Volume 11 Issue 8, August 2022
Pages: 1497 - 1500Innovative Approach to Mitigate Man-in-the-Middle Attacks in Secure Communication Channels
Arnab Dey
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024
Pages: 832 - 839Leveraging Artificial Intelligence for Enhanced Cybersecurity: A Systematic Approach
Mohammed Saleem Sultan, Mohammed Shahid Sultan
Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Analysis Study Research Paper, Computer Science & Engineering, United States of America, Volume 13 Issue 5, May 2024
Pages: 251 - 255Automating Threat Intelligence Analysis with Retrieval Augmented Generation (RAG) for Enhanced Cybersecurity Posture
Jatin Pal Singh, Shobhit Agrawal