System for isolated access and analysis of suspicious code in a disposable computing environment
摘要:
Providing an isolation system that allows analysts to analyze suspicious information in a way that aids in preventing harmful information from spreading to other applications and systems on a network. A plurality of virtual containers may be used by analysts to analyze suspicious information. The analyst may set the virtual environment configurations (e.g., applications, programs, settings, etc.) of the virtual container. The analyst may determine how the suspicious information effects the virtual environment configuration and/or use tools to analyze the suspicious information. When harmful information is identified the virtual container may be discarded (e.g., folded up and deleted), and a new virtual container may be provided to the analyst to continue to analyze the suspicious information and/or new suspicious information.
信息查询
0/0