Existing security solutions leave critical data at risk

It is common practice for security teams to deploy detection-based cybersecurity solutions, such as antivirus software and sandboxes, to protect their organization against file-based threats. However, this reliance on detection means no matter how complex a security solution may be, it can still only protect against what it has seen before.
Learn more about how detection falls short
img
Clean Room demo video thumbnail
Watch demo

Glasswall Clean Room:
Browser-based zero-trust
file protection

Glasswall Clean Room provides zero-trust file protection straight to a user’s browser. Instead of looking for malicious content, our advanced CDR (Content Disarm and Reconstruction) treats all files as untrusted, validating, rebuilding and cleaning each to a safe and compliant standard — automatically removing potential threats.

Clean Room’s browser-based design makes Glasswall CDR accessible to anyone – there is no need for any special training. Users simply drag and drop files they wish to sanitize into the browser app, and Clean Room does the rest.
Learn more about zero-trust file protection

Embed scalable zero-trust file protection across all critical applications

2 documents with a tick sign on the upper one
Instantly disarm threats in files from unknown sources (e.g. a customer’s USB drive)
Illustration about a file upload portal
Clean files in a corporate network or intranet with a simple drag-and-drop interface
magnifying glass above data graphs
Give users immediate feedback on original risk level of documents, as well as details on how Glasswall made them safe

Clean Room is available as a freemium and a professional service

Trial Version

Professional

Maximum Files20 at a time100 files or 10 folders at a time
Maximum File Size5 MB1 GB
Browser SupportChrome, Safari and EdgeChrome, Safari and Edge
Supported File Extensions.doc, .dot, .xls, .xlt, .ppt, .pot, .pps,.pdf, .docx, .docm, .dotx, .dotm, .xlsx, .xlsm, .xltx, .xltm, .pptx, .pptm, .ppsx, .ppam, .potm, .ppsm, .potx, .jpeg .jpg, .jpe, .png, .gif, .zip, .emp, .tif, .tiff, .geotiff, .bmp, .wmf, .wmf, .wav, mpg, .mp4, .PE, .dll, .mui, .exe, Mach-o, .coff, ELF.doc, .dot, .xls, .xlt, .ppt, .pot, .pps,.pdf, .docx, .docm, .dotx, .dotm, .xlsx, .xlsm, .xltx, .xltm, .pptx, .pptm, .ppsx, .ppam, .potm, .ppsm, .potx, .jpeg .jpg, .jpe, .png, .gif, .zip, .emp, .tif, .tiff, .geotiff, .bmp, .wmf, .wmf, .wav, mpg, .mp4, .PE, .dll, .mui, .exe, Mach-o, .coff, ELF
Risk Level Feedback
Archive Support
Dedicated Customer Support
PriceFree

Try Clean Room now Try Clean Room now
Price on request

Get in touch
Clean Room versions - comparison table
Clean Room icon

Clean Room Free Trial

Try the freemium version of our browser-based Content Disarm and Reconstruction (CDR) solution. It is a zero-trust solution that protects organizations against the risks of file-based threats – allowing users to access files with full confidence.
Try Clean RoomTry Clean RoomUpgrade to Pro

Best-in-class file-based protection from Glasswall

Glasswall is the the market leader for Content Disarm and Reconstruction (CDR). We supply our zero-trust file protection solutions to nations across the world, including members of NATO, the Five Eyes Alliance and AUKUS. Our CDR technology is infinitely scalable and helps organizations to comply with initiatives such as the NCSC's Pattern for Safely Importing Data, the NSA's Raise the Bar initiative and the NIST Risk Management Framework by the US Department of Commerce.
NATO logoAUKUS logoNational Security Agency logo USANCSC logoNIST (Nastional Institute of Standards and Technology) logo

How we do it better:

  • Complete file analysis – giving users transparency into file non-conformance with industry specifications
  • Complete file protection – threats removed and files returned to known-good specifications
  • Content management options to shape an organization’s security policy based on risk appetite
  • True file type detection going beyond just the file extension or magic number

Industry-leading performance:

Cluster configuration assumes specific memory and compute allocations for containers. Production performance will ways depend on size and complexities of real world files. Configurations can be optimised to favour throughput or file processing speeds.

20 business files ranging from 17 MB to 0.05 MB in size
  • ● File types include: PowerPoint, Video, Excel, Word, Image, PDF, Audio
  • ● Mean file size = 3.74 MB
  • ● Median file size = 0.64 MB
  • ● 5 Engines per node
  • ● 8 virtual cores
  • ● 28 GB Memory
  • ● Request concurrency to availability of resource is 1:1

Book a demo

Talk to us about our industry-leading CDR solutions

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.