Downloads: 5 | Views: 161 | Weekly Hits: ⮙5 | Monthly Hits: ⮙5
Analysis Study Research Paper | Computer Science & Engineering | Saudi Arabia | Volume 13 Issue 3, March 2024 | Popularity: 6.1 / 10
Optimizing Network Security through Inline Sandbox Deployment: A Practical Approach with Trellix
Tahir Bashir
Abstract: This paper examines the deployment of the Trellix sandbox in inline mode to enhance network security within critical infrastructure environments. The primary objective of this study is to evaluate the sandbox?s real time threat detection and mitigation capabilities while ensuring minimal impact on network performance. Performance metrics, including latency, false positive rates, and detection accuracy, were collected during both normal and high traffic scenarios. The results demonstrate a significant improvement in threat detection with minimal latency, underscoring the effectiveness of inline sandbox deployment for organizations managing sensitive and critical data.
Keywords: inline sandbox deployment, Trellix, network security, real time threat detection, cybersecurity
Edition: Volume 13 Issue 3, March 2024
Pages: 1927 - 1929
DOI: https://www.doi.org/10.21275/SR24917162742
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024
Pages: 832 - 839Leveraging Artificial Intelligence for Enhanced Cybersecurity: A Systematic Approach
Mohammed Saleem Sultan, Mohammed Shahid Sultan
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 12, December 2024
Pages: 448 - 453Safeguarding IoT Devices Against Emerging Security Threats: Challenges and Mitigation Strategies
Dr. A. Lavanya
Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 4, April 2024
Pages: 923 - 930Robustness Testing for AI/ML Models: Strategies for Identifying and Mitigating Vulnerabilities
Praveen Kumar, Shailendra Bade
Downloads: 4 | Weekly Hits: ⮙2 | Monthly Hits: ⮙4
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024
Pages: 779 - 789Machine Learning-Based Detection of Synonymous IP Flood Attacks on Server Infrastructure
Surbhi Batra, Chandra Sekhar Dash
Downloads: 5 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 11, November 2022
Pages: 772 - 776Cryptographic Algorithm to Augment Data Security
Vipin R Bharadwaj, Nalina V, Rithvik Mohan V