23 November * Live Demo * Online
FILE SANITIZATION, SAFE FROM ZERO-DAY AND UNDISCLOSED ATTACKS
Softprom — Value Added IT Distributor
JOIN OUR LIVE DEMO AND SEE HOW VOTIRO’S POSITIVE SELECTION WORKS, TECHNOLOGY THAT ALLOWS ONLY SAFE ELEMENTS TO ENTER OR LEAVE YOUR ORGANIZATION
Have you ever heard of Content Disarm and Reconstruction, Content Disarm and Reconstruct, or CDR? You might recognize these are all terms used for a technology that can eliminate all file-borne threats. Join our Votiro Live Demo and see how new technology — referred to as Positive Selection technology — takes CDR to the next level in both security and user experience. 😊
Michael Tal, Votiro Technical Director
How we sanitize files from zero-day and undisclosed attacks? Join our Online Live Demo on 23 November 2023
Join our Online Live Demo and see how we sanitize files and what is Content Disarm and Reconstruction (CDR). Participation is free.
file sanitization from Votiro What is Content Disarm and Reconstruction (CDR)?
Also known as file sanitization, CDR has multiple forms. In general, CDR does not need to rely on detection to prevent threats. Instead of relying on databases of known signatures, the technology assumes all files are malicious and scrutinizes all files that are outside of the approved firewall.
CDR Type 1: Converting files to PDF
This type of CDR technology utilizes file conversion or transformation in order to render the file safe. The technology converts all files into a PDF file format, which eliminates the possibility of a hacker activating malicious code when a user clicks on a link or opens a document.
CDR Type 2: Stripping out active code and embedded objects
The next level of CDR technology aimed to improve on its earlier capabilities. It focuses on stripping out only certain types of content, such as embedded objects or potentially active content, in order to ensure the safety of each file.
CDR Type 3 – Positive Selection technology: CDR evolved
The most advanced form of an evolved CDR, this technology focuses on template-based reconstruction that allows full preservation of features and full functionality. Positive Selection technology rebuilds the document, copying only the known-good, positively selected content and ensuring only the safe template elements remain.
How does Positive Selection technology work? Join our Live Demo | 23 Nov 2023
Votiro Positive Selection Technology
A new approach to file security – one that removes all possible threats without needing to search for them.
Step 1: Identify the File Format
Every file must adhere to strict, vendor-based specifications that are unique to that particular file format. Positive Selection technology uses an intelligent fingerprinting technique that identifies a file’s content type and format based on file structure and characteristics.
Step 2: Generate a New Version of the File
Positive Selection technology then generates a new, clean template of the file and imports over the positively verified content from the original file while leaving behind exploits and malicious objects. This regenerated, safe version of the file, based on known good templates from the file vendors, ensures that all the good content (including active content and embedded objects) is kept in its original format while preserving file functionality.
Step 3: Use the New File
All malicious code and exploit threats are eliminated, positively selected elements are transferred, and the new file preserves the integrity and functionality of the original file. The file is now safe to save, edit, use, and share.
23 NOVEMBER | ONLINE
REGISTRATION
VOTIRO SOLUTIONS
Votiro: what do we have?
Votiro for Email
Votiro Cloud singles out only the elements of emails and attachment content known to be fully secure. Now employees can open emails and file attachments with peace of mind, and without any delays or disruptions to business.
Votiro for Web Browsers
Votiro Secure File Gateway for Web Browser extension works on Chromium browsers, including Google Chrome and Microsoft Edge. When an employee downloads a file from the web – or when a phishing website downloads a file from the browser to a device automatically, without the employee noticing – the file is processed with our Positive Selection® technology. This takes place outside of your organization’s networks and results in files essential for business to be fully sanitized of hidden threats and ready for 100% safe entry
to the organization’s network, without disrupting the workflow.
Votiro for File Transfers
Safe Files in milliseconds, without blocking, quarantining, or Flattening Files
Other file security solutions, like antivirus, block files or convert them into PDFs…which are rendered safe, but useless to your enterprise. Votiro Cloud sanitizes all content in near real-time—while retaining benign macros and other active content—to keep full file fidelity and usability.
Do you want to try Votiro solution? Request now! It's free for 30 days ;)
REQUEST
WHO WE ARE?