What is Browser Sandbox Protection?

Quick Heal Technologies Ltd.
Quick Heal Technologies Ltd.Quick Heal Technologies Ltd.
What is Browser Sandbox
Protection and How Does it Help?
QUICK HEAL TECHNOLOGIES
Understanding the Web Browser Arena
• Understanding the web browser
• Internet Threats
• Eye-opener
• Web based Attacks
• What is Browser Sandbox?
The Web Browser
A web browser (commonly referred to as a
browser) is a software application for retrieving,
presenting and traversing information resources
on the World Wide Web.
An information resource is identified by a
Uniform Resource Identifier (URI/URL) and may
be a web page, image, video or other piece of
content.
Popular web browsers include Firefox, Internet
Explorer, Google Chrome, Opera, and Safari.
POLL 1
Nowadays, you cannot really tell if a website is clean or riddled with malicious
codes. Merely visiting a webpage can automatically drop a malicious code in your
PC.
And this may not only happen in case of lesser known websites. Even trusted and
genuine websites are compromised by hackers to target unaware users.
The Threats that Lurk on the Internet
Eye-opener
• PC starts behaving abnormally
• Blinking popups start appearing all over your screen
• Default search engine gets changed to something else
• Your social media account starts showing unauthorized activities
If your PC starts showing all these symptoms, odds are you have been a
victim of web-based attack
POLL 2
Web-Based Attacks
POLL 3
What Could be the Solution?
Such threats that usually occur without any prior warning, can be effectively
dealt with a proactive security feature such as Browser Sandbox.
What is Browser Sandbox?
Browser Sandbox Protection or ‘Browser
Sandboxing’ is a security technique that
creates a virtual environment and executes
your Internet browsers within this
environment inside your PC.
POLL 4
What Does that Mean?
• Once Sandbox is activated, it takes your Internet browser into a virtual
environment.
• Any file that you download or gets downloaded from the browser, remains
isolated in the sandbox environment.
• So, even if any infection does take place from the download, it will remain
confined inside the virtual environment without affecting the real PC.
And once you close the browser, any
changes that might have occurred in the
environment will be deleted.
This way your actual PC remains
unaffected
Quick Heal offers
Browser
Sandbox
Protection
as one of its
inbuilt features
About Quick Heal’s Sandbox Protection
Quick Heal
offers sandbox
protection as
one of its inbuilt
features
With Quick Heal Browser Sandbox, you can control browser access to your personal
data on the computer. For this you have options to:
• Prevent Internet browsers from accessing confidential folders.
• Prevent Internet browsers from modifying protected data.
• Allow browsers to store all downloads in a specified folder.
At the present time, the most threatening aspect of malware is their evolving
nature. Dealing with such threats should not only involve the best damage
control approach but proactive security as well.
After all, keeping the milk from spilling over is always
better than mopping it.
Thank you
Reach us at : Corporatecommunications@quickheal.co.in
Facebook – www.facebook.com/quickhealav
Twitter – www.twitter.com/quickheal
1 de 19

Recomendados

Computer Security risks Shelly por
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks ShellyAdeel Khurram
1.7K visualizações24 slides
Cyber security standards por
Cyber security standardsCyber security standards
Cyber security standardsVaughan Olufemi ACIB, AICEN, ANIM
3.8K visualizações18 slides
IOT Forensic Challenges por
IOT Forensic ChallengesIOT Forensic Challenges
IOT Forensic ChallengesAnukaJinadasa
535 visualizações32 slides
Computer & internet Security por
Computer & internet SecurityComputer & internet Security
Computer & internet SecurityGerard Lamusse
1.4K visualizações35 slides
The 5 security awareness training generations [CARTOON] por
The 5 security awareness training generations [CARTOON]The 5 security awareness training generations [CARTOON]
The 5 security awareness training generations [CARTOON]Stu Sjouwerman
1.5K visualizações10 slides
PowerPoint Seguridad Informática por
PowerPoint Seguridad InformáticaPowerPoint Seguridad Informática
PowerPoint Seguridad Informáticab1dmiriammunozelespinillo
5.3K visualizações21 slides

Mais conteúdo relacionado

Mais procurados

Application Security | Application Security Tutorial | Cyber Security Certifi... por
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Edureka!
2K visualizações17 slides
Spyware por
SpywareSpyware
SpywareBabur Rahmadi
2.2K visualizações35 slides
Security operations center 5 security controls por
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controlsAlienVault
3.5K visualizações24 slides
Virus & Anti Virus ppt por
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus & Anti Virus pptOECLIB Odisha Electronics Control Library
1.1K visualizações15 slides
Remote File Inclusion (RFI) Vulnerabilities 101 por
Remote File Inclusion (RFI) Vulnerabilities 101Remote File Inclusion (RFI) Vulnerabilities 101
Remote File Inclusion (RFI) Vulnerabilities 101Imperva
4.6K visualizações21 slides
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra... por
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...Edureka!
3.5K visualizações19 slides

Mais procurados(20)

Application Security | Application Security Tutorial | Cyber Security Certifi... por Edureka!
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
Edureka!2K visualizações
Spyware por Babur Rahmadi
SpywareSpyware
Spyware
Babur Rahmadi2.2K visualizações
Security operations center 5 security controls por AlienVault
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controls
AlienVault3.5K visualizações
Remote File Inclusion (RFI) Vulnerabilities 101 por Imperva
Remote File Inclusion (RFI) Vulnerabilities 101Remote File Inclusion (RFI) Vulnerabilities 101
Remote File Inclusion (RFI) Vulnerabilities 101
Imperva4.6K visualizações
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra... por Edureka!
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
Edureka!3.5K visualizações
Ceh v5 module 04 enumeration por Vi Tính Hoàng Nam
Ceh v5 module 04 enumerationCeh v5 module 04 enumeration
Ceh v5 module 04 enumeration
Vi Tính Hoàng Nam2.5K visualizações
Cyber Security por Ramiro Cid
Cyber SecurityCyber Security
Cyber Security
Ramiro Cid6.6K visualizações
Cyber Security por Ncell
Cyber SecurityCyber Security
Cyber Security
Ncell236 visualizações
Cyber crime and cyber security por Keshab Nath
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
Keshab Nath5.2K visualizações
introduction to cyber security por Slamet Ar Rokhim
introduction to cyber securityintroduction to cyber security
introduction to cyber security
Slamet Ar Rokhim194 visualizações
Security Awareness Training by Fortinet por Atlantic Training, LLC.
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
Atlantic Training, LLC.16.3K visualizações
Operating System Forensics por ArunJS5
Operating System ForensicsOperating System Forensics
Operating System Forensics
ArunJS5516 visualizações
Network Security: Attacks, Tools and Techniques por waqasahmad1995
Network Security: Attacks, Tools and TechniquesNetwork Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and Techniques
waqasahmad19952.8K visualizações
Cyber security por TaimoorArshad5
Cyber securityCyber security
Cyber security
TaimoorArshad5485 visualizações
Cybersecurity 1. intro to cybersecurity por sommerville-videos
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
sommerville-videos29.6K visualizações
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014 por Anant Shrivastava
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
Anant Shrivastava41K visualizações
Application security por Hagar Alaa el-din
Application securityApplication security
Application security
Hagar Alaa el-din480 visualizações
Introduction to Cyber Crime por Dr Raghu Khimani
Introduction to Cyber CrimeIntroduction to Cyber Crime
Introduction to Cyber Crime
Dr Raghu Khimani14.7K visualizações

Similar a What is Browser Sandbox Protection?

Internet security por
Internet securityInternet security
Internet securityrfukunaga
1.1K visualizações38 slides
Privacy in private browsing mode por
Privacy in private browsing modePrivacy in private browsing mode
Privacy in private browsing modeAparna “Ash” Himmatramka
1.2K visualizações42 slides
Malware ppt final.pptx por
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptxLakshayNRReddy
381 visualizações22 slides
Virus and malware presentation por
Virus and malware presentationVirus and malware presentation
Virus and malware presentationAmjad Bhutto
7.1K visualizações24 slides
Basic Computer Security for Doctors por
Basic Computer Security for DoctorsBasic Computer Security for Doctors
Basic Computer Security for DoctorsPlus91 Technologies Pvt. Ltd.
3.5K visualizações18 slides
Open Source Software por
Open Source SoftwareOpen Source Software
Open Source SoftwareAndrew Nolen, MCJ/FP, CDCA
277 visualizações68 slides

Similar a What is Browser Sandbox Protection?(20)

Internet security por rfukunaga
Internet securityInternet security
Internet security
rfukunaga1.1K visualizações
Malware ppt final.pptx por LakshayNRReddy
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
LakshayNRReddy381 visualizações
Virus and malware presentation por Amjad Bhutto
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
Amjad Bhutto7.1K visualizações
Security-Web Vulnerabilities-Browser Attacks por Raghu Addanki
Security-Web Vulnerabilities-Browser AttacksSecurity-Web Vulnerabilities-Browser Attacks
Security-Web Vulnerabilities-Browser Attacks
Raghu Addanki883 visualizações
anti_virus por sharq university
anti_virusanti_virus
anti_virus
sharq university363 visualizações
Computer security por Robin E. Beavers
Computer securityComputer security
Computer security
Robin E. Beavers84 visualizações
Computer Security and Ethics por Mohsin Riaz
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
Mohsin Riaz3.2K visualizações
Information security and privacy por Joy Chakraborty
Information security and privacyInformation security and privacy
Information security and privacy
Joy Chakraborty513 visualizações
Information security and privacy por Joy Chakraborty
Information security and privacyInformation security and privacy
Information security and privacy
Joy Chakraborty899 visualizações
computer virus full explain ppt.pptx por TayyabaAbbas4
computer virus full explain ppt.pptxcomputer virus full explain ppt.pptx
computer virus full explain ppt.pptx
TayyabaAbbas46 visualizações
Spikes Security Isla Isolation por Cybryx
Spikes Security Isla IsolationSpikes Security Isla Isolation
Spikes Security Isla Isolation
Cybryx1.3K visualizações
Win the War with Spyware.pdf por PiyushPriyadarshi27
Win the War with Spyware.pdfWin the War with Spyware.pdf
Win the War with Spyware.pdf
PiyushPriyadarshi2714 visualizações
Malware program by mohsin ali dahar khairpur por Mohsin Dahar
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
Mohsin Dahar238 visualizações
Spyware por Ishita Bansal
SpywareSpyware
Spyware
Ishita Bansal2.1K visualizações
Cyber crime por Salma Zafar
Cyber crimeCyber crime
Cyber crime
Salma Zafar618 visualizações
Rajul computer presentation por Neetu Jain
Rajul computer presentationRajul computer presentation
Rajul computer presentation
Neetu Jain2.3K visualizações

Mais de Quick Heal Technologies Ltd.

Digital Threat Landscape por
Digital Threat LandscapeDigital Threat Landscape
Digital Threat LandscapeQuick Heal Technologies Ltd.
1K visualizações9 slides
Cybersecurity in Banking Sector por
Cybersecurity in Banking SectorCybersecurity in Banking Sector
Cybersecurity in Banking SectorQuick Heal Technologies Ltd.
8.7K visualizações15 slides
31 Internet Security Tips on CyberSecurity Month Ocotober por
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month OcotoberQuick Heal Technologies Ltd.
569 visualizações1 slide
How a Ransomware Infects your Computer [INFOGRAPHIC] por
How a Ransomware Infects your Computer [INFOGRAPHIC]How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]Quick Heal Technologies Ltd.
892 visualizações1 slide
Next-Gen Security Solution: Gateway Protection por
Next-Gen Security Solution: Gateway ProtectionNext-Gen Security Solution: Gateway Protection
Next-Gen Security Solution: Gateway ProtectionQuick Heal Technologies Ltd.
497 visualizações17 slides
Centralized Patch Management - Proven Security Approach for Ransomware Protec... por
Centralized Patch Management - Proven Security Approach for Ransomware Protec...Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...Quick Heal Technologies Ltd.
727 visualizações18 slides

Mais de Quick Heal Technologies Ltd.(20)

31 Internet Security Tips on CyberSecurity Month Ocotober por Quick Heal Technologies Ltd.
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober
Quick Heal Technologies Ltd.569 visualizações
Centralized Patch Management - Proven Security Approach for Ransomware Protec... por Quick Heal Technologies Ltd.
Centralized Patch Management - Proven Security Approach for Ransomware Protec...Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Quick Heal Technologies Ltd.727 visualizações
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss por Quick Heal Technologies Ltd.
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data LossSeqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Quick Heal Technologies Ltd.689 visualizações
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24 por Quick Heal Technologies Ltd.
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Quick Heal Technologies Ltd.190 visualizações
Jnana Sangama Day 1 - National convention for higher education por Quick Heal Technologies Ltd.
Jnana Sangama Day 1 - National convention for higher educationJnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher education
Quick Heal Technologies Ltd.153 visualizações

Último

DU Series - Day 4.pptx por
DU Series - Day 4.pptxDU Series - Day 4.pptx
DU Series - Day 4.pptxUiPathCommunity
100 visualizações28 slides
WEB 2.O TOOLS: Empowering education.pptx por
WEB 2.O TOOLS: Empowering education.pptxWEB 2.O TOOLS: Empowering education.pptx
WEB 2.O TOOLS: Empowering education.pptxnarmadhamanohar21
16 visualizações16 slides
information por
informationinformation
informationkhelgishekhar
8 visualizações4 slides
Marketing and Community Building in Web3 por
Marketing and Community Building in Web3Marketing and Community Building in Web3
Marketing and Community Building in Web3Federico Ast
12 visualizações64 slides
IETF 118: Starlink Protocol Performance por
IETF 118: Starlink Protocol PerformanceIETF 118: Starlink Protocol Performance
IETF 118: Starlink Protocol PerformanceAPNIC
186 visualizações22 slides
UiPath Document Understanding_Day 3.pptx por
UiPath Document Understanding_Day 3.pptxUiPath Document Understanding_Day 3.pptx
UiPath Document Understanding_Day 3.pptxUiPathCommunity
101 visualizações25 slides

Último(12)

DU Series - Day 4.pptx por UiPathCommunity
DU Series - Day 4.pptxDU Series - Day 4.pptx
DU Series - Day 4.pptx
UiPathCommunity100 visualizações
WEB 2.O TOOLS: Empowering education.pptx por narmadhamanohar21
WEB 2.O TOOLS: Empowering education.pptxWEB 2.O TOOLS: Empowering education.pptx
WEB 2.O TOOLS: Empowering education.pptx
narmadhamanohar2116 visualizações
information por khelgishekhar
informationinformation
information
khelgishekhar8 visualizações
Marketing and Community Building in Web3 por Federico Ast
Marketing and Community Building in Web3Marketing and Community Building in Web3
Marketing and Community Building in Web3
Federico Ast12 visualizações
IETF 118: Starlink Protocol Performance por APNIC
IETF 118: Starlink Protocol PerformanceIETF 118: Starlink Protocol Performance
IETF 118: Starlink Protocol Performance
APNIC186 visualizações
UiPath Document Understanding_Day 3.pptx por UiPathCommunity
UiPath Document Understanding_Day 3.pptxUiPath Document Understanding_Day 3.pptx
UiPath Document Understanding_Day 3.pptx
UiPathCommunity101 visualizações
How to think like a threat actor for Kubernetes.pptx por LibbySchulze1
How to think like a threat actor for Kubernetes.pptxHow to think like a threat actor for Kubernetes.pptx
How to think like a threat actor for Kubernetes.pptx
LibbySchulze15 visualizações
Is Entireweb better than Google por sebastianthomasbejan
Is Entireweb better than GoogleIs Entireweb better than Google
Is Entireweb better than Google
sebastianthomasbejan12 visualizações
We see everywhere that many people are talking about technology.docx por ssuserc5935b
We see everywhere that many people are talking about technology.docxWe see everywhere that many people are talking about technology.docx
We see everywhere that many people are talking about technology.docx
ssuserc5935b6 visualizações
PORTFOLIO 1 (Bret Michael Pepito).pdf por brejess0410
PORTFOLIO 1 (Bret Michael Pepito).pdfPORTFOLIO 1 (Bret Michael Pepito).pdf
PORTFOLIO 1 (Bret Michael Pepito).pdf
brejess04107 visualizações
𝐒𝐨𝐥𝐚𝐫𝐖𝐢𝐧𝐝𝐬 𝐂𝐚𝐬𝐞 𝐒𝐭𝐮𝐝𝐲 por Infosec train
𝐒𝐨𝐥𝐚𝐫𝐖𝐢𝐧𝐝𝐬 𝐂𝐚𝐬𝐞 𝐒𝐭𝐮𝐝𝐲𝐒𝐨𝐥𝐚𝐫𝐖𝐢𝐧𝐝𝐬 𝐂𝐚𝐬𝐞 𝐒𝐭𝐮𝐝𝐲
𝐒𝐨𝐥𝐚𝐫𝐖𝐢𝐧𝐝𝐬 𝐂𝐚𝐬𝐞 𝐒𝐭𝐮𝐝𝐲
Infosec train9 visualizações
Building trust in our information ecosystem: who do we trust in an emergency por Tina Purnat
Building trust in our information ecosystem: who do we trust in an emergencyBuilding trust in our information ecosystem: who do we trust in an emergency
Building trust in our information ecosystem: who do we trust in an emergency
Tina Purnat92 visualizações

What is Browser Sandbox Protection?

  • 1. What is Browser Sandbox Protection and How Does it Help? QUICK HEAL TECHNOLOGIES
  • 2. Understanding the Web Browser Arena • Understanding the web browser • Internet Threats • Eye-opener • Web based Attacks • What is Browser Sandbox?
  • 3. The Web Browser A web browser (commonly referred to as a browser) is a software application for retrieving, presenting and traversing information resources on the World Wide Web. An information resource is identified by a Uniform Resource Identifier (URI/URL) and may be a web page, image, video or other piece of content. Popular web browsers include Firefox, Internet Explorer, Google Chrome, Opera, and Safari.
  • 5. Nowadays, you cannot really tell if a website is clean or riddled with malicious codes. Merely visiting a webpage can automatically drop a malicious code in your PC. And this may not only happen in case of lesser known websites. Even trusted and genuine websites are compromised by hackers to target unaware users. The Threats that Lurk on the Internet
  • 6. Eye-opener • PC starts behaving abnormally • Blinking popups start appearing all over your screen • Default search engine gets changed to something else • Your social media account starts showing unauthorized activities If your PC starts showing all these symptoms, odds are you have been a victim of web-based attack
  • 10. What Could be the Solution? Such threats that usually occur without any prior warning, can be effectively dealt with a proactive security feature such as Browser Sandbox.
  • 11. What is Browser Sandbox? Browser Sandbox Protection or ‘Browser Sandboxing’ is a security technique that creates a virtual environment and executes your Internet browsers within this environment inside your PC.
  • 13. What Does that Mean? • Once Sandbox is activated, it takes your Internet browser into a virtual environment. • Any file that you download or gets downloaded from the browser, remains isolated in the sandbox environment. • So, even if any infection does take place from the download, it will remain confined inside the virtual environment without affecting the real PC.
  • 14. And once you close the browser, any changes that might have occurred in the environment will be deleted. This way your actual PC remains unaffected
  • 15. Quick Heal offers Browser Sandbox Protection as one of its inbuilt features
  • 16. About Quick Heal’s Sandbox Protection Quick Heal offers sandbox protection as one of its inbuilt features
  • 17. With Quick Heal Browser Sandbox, you can control browser access to your personal data on the computer. For this you have options to: • Prevent Internet browsers from accessing confidential folders. • Prevent Internet browsers from modifying protected data. • Allow browsers to store all downloads in a specified folder.
  • 18. At the present time, the most threatening aspect of malware is their evolving nature. Dealing with such threats should not only involve the best damage control approach but proactive security as well. After all, keeping the milk from spilling over is always better than mopping it.
  • 19. Thank you Reach us at : Corporatecommunications@quickheal.co.in Facebook – www.facebook.com/quickhealav Twitter – www.twitter.com/quickheal