A sandboxing solution should be embedded within your threat detection capabilities and provide another layer of detection to:
- Observe malware execution in mutex, registry, API call, file system access, network behavior and artifacts
- Understand malware behavior by observing malware’s Internet access behavior in its full life cycle or simulating interaction with malware execution and recording the network behavior
- Identify malware evasion behaviors such as delayed execution, environment diagnostics and checking human interaction
- Share malware forensics with other security components for immediate prevention and used to protect against future attacks