Introduction to Zscaler Cloud Sandbox

Today we are going to talk about the Zscaler cloud Sandbox and the use case of the solution as well. Now the question is why we required cloud based sandboxing. The critical weakness is that in order to stop a threat with a signature, you need to have prior knowledge of the threat.

What is the purpose of the sandboxing ?
Sandboxing is a software management policy that isolates applications from analytical system resources and other programs. It provides an extra layer of security that prevents malware or damaging applications from adversely affecting your system

The challenge with appliance-based sandboxes is that they are traditionally deployed in centralized gateways, and hub-and-spoke architectures are needed to centrally route all traffic for inspection. 

That means traffic from remote offices must use expensive Multi-protocol Label Switching (MPLS) to backhaul traffic, and mobile users must use slow VPN connections.

Fig 1.1- Zscaler Cloud Based Sandboxing
As per Zscaler, Malicious files are instantly obstructed, quarantined, or flagged based on your defined policies. Unlike appliances, which work in separation, Zscaler Cloud Sandbox is fully integrated into the Zscaler Cloud Security Platform to deliver maximum threat visibility and multilevel defense. Every new threat uncovered by Zscaler Cloud Sandbox is instantly shared across the Zscaler cloud and blocked for all users. Get the power of extended visibility far beyond the scope of any other sandbox offering on the market.

The sandbox provides a safe space, where the code can be run without doing any harm to the user’s system.The purpose of a sandbox is to analyse suspicious files in a protected environment before they can reach the user. 

Fig 1.2- Zscaler Sandboxing Measurements
With Zscaler, you can sandbox any suspicious or unknown file without backhauling traffic to the data center. This means that remote office workers and mobile users get the same level of protection as the users at your headquarters, without costly MPLS links or cumbersome VPN connections.

With Zscaler Cloud Sandbox,you have the flexibility to tailor your security policies to your own protection needs. Zscaler Cloud Sandbox uses cloud intelligence gained from more than 50 billion transactions processed each day at peak periods and more than 120,000 unique security updates. Once a threat is identified anywhere in the Zscaler cloud, it is immediately blocked for all customers.You can write policies that allow you to sandbox files by users, file type, and other criteria