Last line of defense (from Antivirus to Anti-Hacking)
The tBox system puts the user activity in the special environment, which provides two key factors: isolation and self-monitoring. All transactions by a vulnerable application occur only in the current, isolated disposable container. At the same time the behavior of all running programs within each container is continuously analyzed. This process uses a unique technology of an in-depth analysis of the functionality of the programs.
Each container is controlled by a special DDD Agent (deploy, detect, destroy), which deploys the application in a container where malicious functionality is detected and malicious objects are deleted.
This approach allows us to detect and assures the prevention of malicious programs (codes) intrusion into the computer's operating system.