23 November * Live Demo * Online
FILE SANITIZATION, SAFE FROM ZERO-DAY AND UNDISCLOSED ATTACKS
Softprom — Value Added IT Distributor
JOIN OUR LIVE DEMO AND SEE HOW VOTIRO’S POSITIVE SELECTION WORKS, TECHNOLOGY THAT ALLOWS ONLY SAFE ELEMENTS TO ENTER OR LEAVE YOUR ORGANIZATION
Have you ever heard of Content Disarm and Reconstruction, Content Disarm and Reconstruct, or CDR? You might recognize these are all terms used for a technology that can eliminate all file-borne threats. Join our Votiro Live Demo and see how new technology — referred to as Positive Selection technology — takes CDR to the next level in both security and user experience. 😊
Michael Tal, Votiro Technical Director
How we sanitize files from zero-day and undisclosed attacks? Join our Online Live Demo on 23 November 2023
Join our Online Live Demo and see how we sanitize files and what is Content Disarm and Reconstruction (CDR). Participation is free.
file sanitization from Votiro What is Content Disarm and Reconstruction (CDR)?
Also known as file sanitization, CDR has multiple forms. In general, CDR does not need to rely on detection to prevent threats. Instead of relying on databases of known signatures, the technology assumes all files are malicious and scrutinizes all files that are outside of the approved firewall.
CDR Type 1: Converting files to PDF
This type of CDR technology utilizes file conversion or transformation in order to render the file safe. The technology converts all files into a PDF file format, which eliminates the possibility of a hacker activating malicious code when a user clicks on a link or opens a document.
CDR Type 2: Stripping out active code and embedded objects
The next level of CDR technology aimed to improve on its earlier capabilities. It focuses on stripping out only certain types of content, such as embedded objects or potentially active content, in order to ensure the safety of each file.
CDR Type 3 – Positive Selection technology: CDR evolved
The most advanced form of an evolved CDR, this technology focuses on template-based reconstruction that allows full preservation of features and full functionality. Positive Selection technology rebuilds the document, copying only the known-good, positively selected content and ensuring only the safe template elements remain.
Votiro Positive Selection Technology
A new approach to file security – one that removes all possible threats without needing to search for them.
Step 1: Identify the File Format
Every file must adhere to strict, vendor-based specifications that are unique to that particular file format. Positive Selection technology uses an intelligent fingerprinting technique that identifies a file’s content type and format based on file structure and characteristics.
Step 2: Generate a New Version of the File
Positive Selection technology then generates a new, clean template of the file and imports over the positively verified content from the original file while leaving behind exploits and malicious objects. This regenerated, safe version of the file, based on known good templates from the file vendors, ensures that all the good content (including active content and embedded objects) is kept in its original format while preserving file functionality.
Step 3: Use the New File
All malicious code and exploit threats are eliminated, positively selected elements are transferred, and the new file preserves the integrity and functionality of the original file. The file is now safe to save, edit, use, and share.
23 NOVEMBER | ONLINE