Optimizing Network Security through Inline Sandbox Deployment: A Practical Approach with Trellix
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 5 | Views: 161 | Weekly Hits: ⮙5 | Monthly Hits: ⮙5

Analysis Study Research Paper | Computer Science & Engineering | Saudi Arabia | Volume 13 Issue 3, March 2024 | Popularity: 6.1 / 10


     

Optimizing Network Security through Inline Sandbox Deployment: A Practical Approach with Trellix

Tahir Bashir


Abstract: This paper examines the deployment of the Trellix sandbox in inline mode to enhance network security within critical infrastructure environments. The primary objective of this study is to evaluate the sandbox?s real time threat detection and mitigation capabilities while ensuring minimal impact on network performance. Performance metrics, including latency, false positive rates, and detection accuracy, were collected during both normal and high traffic scenarios. The results demonstrate a significant improvement in threat detection with minimal latency, underscoring the effectiveness of inline sandbox deployment for organizations managing sensitive and critical data.


Keywords: inline sandbox deployment, Trellix, network security, real time threat detection, cybersecurity


Edition: Volume 13 Issue 3, March 2024


Pages: 1927 - 1929


DOI: https://www.doi.org/10.21275/SR24917162742



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Tahir Bashir, "Optimizing Network Security through Inline Sandbox Deployment: A Practical Approach with Trellix", International Journal of Science and Research (IJSR), Volume 13 Issue 3, March 2024, pp. 1927-1929, https://www.ijsr.net/getabstract.php?paperid=SR24917162742, DOI: https://www.doi.org/10.21275/SR24917162742

Similar Articles

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024

Pages: 832 - 839

Leveraging Artificial Intelligence for Enhanced Cybersecurity: A Systematic Approach

Mohammed Saleem Sultan, Mohammed Shahid Sultan

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 12, December 2024

Pages: 448 - 453

Safeguarding IoT Devices Against Emerging Security Threats: Challenges and Mitigation Strategies

Dr. A. Lavanya

Share this Article

Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 4, April 2024

Pages: 923 - 930

Robustness Testing for AI/ML Models: Strategies for Identifying and Mitigating Vulnerabilities

Praveen Kumar, Shailendra Bade

Share this Article

Downloads: 4 | Weekly Hits: ⮙2 | Monthly Hits: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024

Pages: 779 - 789

Machine Learning-Based Detection of Synonymous IP Flood Attacks on Server Infrastructure

Surbhi Batra, Chandra Sekhar Dash

Share this Article

Downloads: 5 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 11, November 2022

Pages: 772 - 776

Cryptographic Algorithm to Augment Data Security

Vipin R Bharadwaj, Nalina V, Rithvik Mohan V

Share this Article
Top