Glasswall Halo

Glasswall Halo is a scalable zero-trust file protection solution, deployable on-prem, in the cloud or in air-gapped networks. Accessible via Web UI, APIs and ICAP Servers.

Key featuresDeployment options

Zero-trust file protection

Glasswall CDR is a data filter that rebuilds files and documents into a safe, clean standard, free from the risks of malware. Our zero-trust approach outperforms antivirus, sandboxing and EDR methods and is essential for secure file transfer across trust boundaries.

Learn more about CDR

Seamless integration with API endpoints and ICAP servers

Our API endpoints ensure our trust file protection capabilities can be delivered and managed at critical stages within document workflows, anywhere files are moved or stored. Glasswall Halo can also be used for real-time threat removal from web traffic, by seamlessly integrating with web appliances, such as firewalls, proxies and Gateways, through ICAP server requests.

View our APIsLearn more about ICAP

Zero-trust CDR anywhere files are moved or stored

Key features

Sync and Async API endpoints for ease of integration with existing services

View our APIs

ICAP integration for web proxy servers, enabling SSL sanitization in real-time

Learn more about ICAP

85+ supported file types and counting

Manage high-risk content in files (such as macros) with tailored security policies

Analyze original file risk with out-of-the-box metrics and reporting

Kubernetes architecture provides highly-scalable protection to meet demand

Deployment options

Supported managed Kubernetes
environments: 

Supported virtual environments: 

Best-in-class file-based protection from Glasswall

Glasswall is the market leader for Content Disarm and Reconstruction (CDR). We supply our battle-hardened zero-trust file protection solutions to the world’s most sophisticated security establishments, including members of NATO, the Five Eyes Alliance and AUKUS. Our CDR technology helps organizations comply with Cross-Domain initiatives such as NSA's Raise the Bar and NCSC's Pattern: Safely Importing Data.
NATO logoAUKUS logoNational Security Agency logo USA
NATO logoAUKUS logoNational Security Agency logo USAHM government logo

How we do it better:

  • Complete file protection - threats removed and files returned to known-good specifications
  • Complete file analysis - giving you transparency into file non-conformance with industry specifications
  • Content management options to shape an organization’s security policy based on risk appetite
  • True file type detection going beyond just the file extension or magic number

Industry-leading performance:

Cluster configuration assumes specific memory and compute allocations for containers. Production performance will always depend on size and complexities of real world files. Configurations can be optimised to favour throughput or file processing speeds.

20 business files ranging from 17 MB to 0.05 MB in size
  • File types include: PowerPoint, Video, Excel, Word, Image, PDF, Audio
  • Mean file size = 3.74 MB
  • Median file size = 0.64 MB
  • 5 Engines per node
  • 8 virtual cores
  • 28 GB Memory
  • Request concurrency to availability of resource is 1:1

Book a demo

Talk to us about our industry-leading CDR solutions

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.