Glasswall Halo icon

Glasswall Halo

Glasswall Halo is a scalable Zero Trust file protection solution, deployable on-prem, in the cloud or in air-gapped networks. Accessible via Web UI, APIs and ICAP Servers.

Zero Trust file protection

Glasswall CDR is a data filter that rebuilds files and documents into a safe, clean standard, free from the risks of malware. Our zero-trust approach outperforms antivirus, sandboxing and EDR methods and is essential for secure file transfer across trust boundaries.

Learn more about CDR

Seamless integration with API endpoints and ICAP servers

Our API endpoints ensure our trust file protection capabilities can be delivered and managed at critical stages within document workflows, anywhere files are moved or stored. Glasswall Halo can also be used for real-time threat removal from web traffic, by seamlessly integrating with web appliances, such as firewalls, proxies and Gateways, through ICAP server requests.

Multiscanning and advanced threat intelligence

ReversingLabs adds additional layers of multiscanning security and real-time threat intelligence to Halo with instant hash lookups and file handling based on malware status. Safe files are automatically approved, while suspicious ones are blocked.

Zero Trust CDR anywhere files are moved or stored

Key features

Sync and Async API endpoints for ease of integration with existing services

View our APIs

ICAP integration for web proxy servers, enabling SSL sanitization in real-time

Bring Zero Trust data protection to your M365 environments with Glasswall Storage Monitoring for SharePoint or OneDrive

View Storage Monitoring

85+ supported file types and counting

Manage high-risk content in files (such as macros) with tailored security policies

Analyze original file risk with real-time classification of files through a vast database of known goodware and malware.

Learn more about ReversingLabs

Deployment options

Supported managed Kubernetes
environments: 

Best-in-class file-based protection from Glasswall

Glasswall is the market leader for Content Disarm and Reconstruction (CDR). We supply our battle-hardened Zero Trust file protection solutions to the world’s most sophisticated security establishments, including members of NATO, the Five Eyes Alliance and AUKUS. Our CDR technology helps organizations comply with Cross-Domain initiatives such as NSA's Raise the Bar and NCSC's Pattern: Safely Importing Data.
NATO logoAUKUS logoNational Security Agency logo USA
NATO logoAUKUS logoNational Security Agency logo USAHM government logo

How we do it better:

  • Complete file protection - threats removed and files returned to known-good specifications
  • Complete file analysis - giving you transparency into file non-conformance with industry specifications
  • Content management options to shape an organization’s security policy based on risk appetite

Industry-leading performance:

Cluster configuration assumes specific memory and compute allocations for containers. Production performance will always depend on size and complexities of real world files. Configurations can be optimised to favour throughput or file processing speeds.

20 business files ranging from 17 MB to 0.05 MB in size
  • File types include: PowerPoint, Video, Excel, Word, Image, PDF, Audio
  • Mean file size = 3.74 MB
  • Median file size = 0.64 MB
  • 5 Engines per node
  • 8 virtual cores
  • 28 GB Memory
  • Request concurrency to availability of resource is 1:1

Talk to us
to strengthen your security

Eliminate malware before it reaches your network and ensure your files are always safe and secure with Glasswall’s Zero Trust and intelligent file protection.

Fill out the form and we’ll be in touch shortly.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

FAQs

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique.

What is Glasswall Halo?

Glasswall Halo is a file security platform that uses Content Disarm and Reconstruction (CDR) technology to remove embedded threats from files. It sanitises documents by rebuilding them to a known-good standard, eliminating malware without relying on detection-based methods.

How does Glasswall Halo work?

Glasswall Halo analyses files at a structural level and reconstructs them according to strict file format standards. Instead of scanning for known malware signatures, it removes any content that does not conform to the file specification, preventing zero-day and unknown threats.

What is the difference between Glasswall Halo and traditional antivirus?

Traditional antivirus tools detect known threats using signatures or behavioural analysis. Glasswall Halo does not rely on detection. It removes potentially malicious elements from files by rebuilding them safely, making it effective against unknown and zero-day attacks.

Does Glasswall Halo protect against zero-day threats?

Yes. Because Glasswall Halo does not depend on malware signatures or prior knowledge of threats, it protects against zero-day exploits and previously unseen file-based attacks.

Can Glasswall Halo be integrated into existing security infrastructure?

Yes. Glasswall Halo can be integrated into email gateways, web gateways, secure file transfer systems, and other security workflows via APIs and deployment options. It is designed to work alongside existing security tools.

Is Glasswall Halo suitable for regulated industries?

Yes. Glasswall Halo is used in highly regulated sectors such as government, defence, financial services, and critical infrastructure, where file-based threats pose significant operational risk.

Does Glasswall Halo alter the content of files?

Glasswall Halo preserves the intended visual and functional integrity of files while removing embedded threats. Any active content that violates file format standards or presents risk may be removed to ensure safety.

How is Glasswall Halo deployed?

Glasswall Halo can be deployed on-premises, in private cloud environments, or within hybrid architectures, depending on organisational requirements and security policies.