Zero-trust file protection
with Glasswall CDR

A sharp increase in the number of individuals working remotely has supercharged the scale of digital information sharing. This presents an opportunity for cyber criminals to manipulate file vulnerabilities and embed malware with devastating effect.

There are a number of solutions designed to keep organizations safe against file-based threats – however, most share one common issue – a reliance on detection.
3 layers of CDR

Existing security solutions
fall short

A reliance on detection means no matter how complex a security solution may be, it can still only protect its users against what has been seen before – falling short when protecting against zero-day threats. For example:

“Next generation” AV and firewalls

“Next generation” antivirus and firewall systems use detection-based solutions that can only protect against risks already known to them. This leaves organizations at risk, as bad actors are constantly evolving their techniques and finding new vulnerabilities to exploit.

bomb in a box

Sandbox solutions

Sandbox solutions can offer some protection, but cyber criminals now use clever tactics to evade them. Malicious content can be fitted with a delayed ‘detonator’, meaning malware lays dormant and undetected by the sandbox, detonating once it passes through.

illustration for machine learning

Machine learning and AI technologies

Machine learning and AI technologies rely on algorithms to detect known signs and patterns of malicious content. While offering a more effective approach than traditional solutions, machine learning and AI on their own cannot offer absolute, zero-trust protection, and still leave organizations at risk from new (zero-day) threats.

What is zero-trust file protection?

Glasswall’s zero-trust file protection is different. Instead of looking for malicious content, our advanced CDR (Content Disarm and Reconstruction) process treats all files as untrusted, validating, rebuilding and cleaning each one against their manufacturer’s ‘known-good’ specification.

Only safe, clean, and fully functioning files enter and leave an organization, allowing users to access them with full confidence.

Attack surfaces
Glasswall protects:

  • Cloud services
  • Web applications
  • Cross domain
  • Physical storage
  • Web browsers
  • File uploads

What CDR means for you:

Take a zero-trust approach to files

With Glasswall CDR, only safe, clean and fully functioning files enter and leave an organization, allowing users to access them with full confidence.
illustration for zero trust approach: a barbute with swords

No more security trade off – just safe, usable files at speed

Security teams need no longer choose between complete file security or speed and usability. Unlike other CDR vendors who flatten files, Glasswall CDR provides rapid zero-trust file protection that maintains original document usability. There is no dependance on antivirus databases to provide knowledge of a new threat, and security teams no longer deal with disruptions from quarantining files or false positives.

We are set apart from the crowd by our capability to return files to their manufacturer’s ‘known-good’ specification. Each processed document is risk-free, fully functioning and visually identical to the original.

Empower security teams with granular risk control

Glasswall CDR understands files. It provides complete analysis on the risks and active content found within a file. Security teams are given the ability to remove risk and shape their security policy to match their risk appetite. Simultaneously, control over end user actions is regained, as threats are dealt with before a file is delivered to the end user.
illustration for granular risk control
gear and spanner

Ease of deployment and
powerful scalability

Glasswall Halo is Kubernetes-based, meaning that our range of CDR solutions can scale to match business requirements. Glasswall can be deployed in minutes, on-premises, within air-gapped environments, or both public and private clouds as we adhere to open standards. We provide virtual machine images or Kubernetes helm charts to support the deployment of our solutions.
View our technical documentation

Find your industry

Book a demo

Talk to us about our industry-leading CDR solutions

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.