{"id":13423,"date":"2020-09-20T20:25:04","date_gmt":"2020-09-20T20:25:04","guid":{"rendered":"https:\/\/www.sybercode.com\/?page_id=13423"},"modified":"2021-09-01T13:15:27","modified_gmt":"2021-09-01T13:15:27","slug":"sandbox","status":"publish","type":"page","link":"https:\/\/www.sybercode.com\/en\/sandbox\/","title":{"rendered":"Sandbox"},"content":{"rendered":"<p><strong>Sandbox<\/strong><\/p>\n<div class=\"service_details-desc\">\n<p class=\"paragraph\">In particular, sandbox solutions are used due to the inadequacy of traditional security products against Zero Day attacks. It analyzes its behavior by running applications in an environment isolated against zero-day attacks. As a result of this behavior analysis, if there is a malicious activity, it both does not allow it to be included in the system and prevents its access to the network.<\/p>\n<p class=\"paragraph\"><img decoding=\"async\" class=\"loading\" src=\"http:\/\/mopp.website\/sybercode\/upload\/image\/56631fortinet.jpg\" alt=\"\" data-was-processed=\"true\" \/><\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Sandbox \u00d6zellikle S\u0131f\u0131r\u0131nc\u0131 G\u00fcn ataklar\u0131na kar\u015f\u0131 geleneksel g\u00fcvenlik \u00fcr\u00fcnlerinin yetersizli\u011finden kaynakl\u0131 olarak sandbox \u00e7\u00f6z\u00fcmleri kullan\u0131lmaktad\u0131r. S\u0131f\u0131r\u0131nc\u0131 g\u00fcn ataklar\u0131na kar\u015f\u0131 yal\u0131t\u0131lm\u0131\u015f bir ortamda uygulamalar\u0131 \u00e7al\u0131\u015ft\u0131rarak davran\u0131\u015f\u0131n\u0131 analiz eder. Bu davran\u0131\u015f analizi neticesinde k\u00f6t\u00fc niyetli bir hareket varsa hem sisteme dahil olmas\u0131na [&hellip;]<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/www.sybercode.com\/en\/wp-json\/wp\/v2\/pages\/13423"}],"collection":[{"href":"https:\/\/www.sybercode.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.sybercode.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.sybercode.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sybercode.com\/en\/wp-json\/wp\/v2\/comments?post=13423"}],"version-history":[{"count":2,"href":"https:\/\/www.sybercode.com\/en\/wp-json\/wp\/v2\/pages\/13423\/revisions"}],"predecessor-version":[{"id":14244,"href":"https:\/\/www.sybercode.com\/en\/wp-json\/wp\/v2\/pages\/13423\/revisions\/14244"}],"wp:attachment":[{"href":"https:\/\/www.sybercode.com\/en\/wp-json\/wp\/v2\/media?parent=13423"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}