Security teams often must choose between complete file security or speed and usability. One of the risks they need to address are the file-based threats, which are malicious pieces of code that reside within a file. Cybercriminals use these vulnerabilities to embed threats within everyday files and seemingly safe business documents to target individuals or organizations. Once downloaded and/or opened, these files distribute malware to damage or exploit networks, servers and devices, or initiate ransomware attacks.

Zero-trust file protection ensures that only safe, clean and fully functioning files enter and leave an organization, allowing users to access them with full confidence. It provides rapid zero-trust file protection that maintains original document usability. With CDR technology it instantly removes risk, using a 4-step process (|nspect– Rebuild – Clean – Deliver) to rebuild files back to their manufacturer’s known-good specification. All files processed by the Zero Trust File Protection Engine are assumed to be malicious. The engine will analyse and rebuild the file back to its known-good manufacturer’s specification, removing any potential threats lurking in the file’s structure. The act of correcting deeper-rooted structural content is referred to as remediation, whereas removing content which is configurable through policy management (e.g. hyperlinks in office documents) is referred to as sanitization. There is no dependence on antivirus databases to provide knowledge of a new threat, and security teams no longer deal with disruptions from quarantining files or false positives.

With Zero Trust File Protection you can:
  • Take a zero-trust approach to files
  • Stop security trade off – just safe, usable files at speed
  • Empower security teams with granular risk control
  • Gain ease of deployment and powerful scalability

For the provision of Zero Trust File Protection, we have a cooperation with Glasswall, the vendor that aims to remove the inherent risks of files and documents and offers technology that validates, rebuilds and cleans each file it touches to a safe and compliant standard — automatically removing potential threats.

Want to know more?