Existing security solutions leave critical data at risk

It is common practice for security teams to deploy detection-based cybersecurity solutions, such as antivirus software and sandboxes, to protect their organization against file-based threats. However, this reliance on detection means no matter how complex a security solution may be, it can still only protect against what it has seen before.
Learn more about how detection falls short
img
Watch demo

Glasswall Meteor:
automated zero-trust file protection

Glasswall Meteor provides zero-trust file protection in an easy to install application. Instead of looking for malicious content, our advanced CDR (Content Disarm and Reconstruction) treats all files as untrusted, validating, rebuilding and cleaning each file to a safe and compliant standard — automatically removing potential threats.

Glasswall Meteor is an easy-to-use application that can be installed locally on a user’s device. There is no need for any special training – users simply drag and drop files on-demand into the Desktop interface, or setup automatic folder synchronisation – ensuring only safe, clean, and fully functioning files enter an organization.
Learn about zero-trust CDR

Embed scalable zero-trust file protection across all critical applications

Instantly disarm threats in files from unknown sources (e.g. a customer’s USB drive)
Give users immediate feedback on original risk level of documents, as well as details on how Glasswall made them safe
Maintain isolation of air-gapped networks with protection that doesn’t rely on the internet or updates

Seamlessly connect with 200+ cloud and network providers

Enhance Meteor’s remote storage connectivity options with our complimentary tool, Meteor Connect, and enable secure file transfer within your current cloud and network environments.

Learn more about Meteor Connect

Discover which version of Meteor is right for you

Essentials

Pro

Pro

Maximum Files Per Day1501,000-10,0001,000-10,000
Supported Document TypesPDF, Word, Excel, PowerPoint, images, audio and moviesPDF, Word, Excel, PowerPoint, images, audio, movies and Zip and 7zip ArchivesPDF, Word, Excel, PowerPoint, images, audio, movies and Zip and 7zip Archives
Adjustable Content
Management Policy
True File Type Detection
Audit Trail Folder
Maximum File Size25 MB1 GB1 GB
Supported File Extensions.pdf, .doc, .dot, .docx, .docm, .dotx, .dotm, .xls, .xlt, .xlsx, .xlsm, .xltx, .xltm, .ppt, .pot, .pps, .pptx, .pptm, .ppsx, .ppam, .potm, .ppsm, .potx, .jpeg, .jpg, .jpe, .png, .gif, .emf, .tif, .tiff, .geotiff, .bmp, .wmf, .wav, .mpg, .mp3, .mp4 .pdf, .doc, .dot, .docx, .docm, .dotx, .dotm, .xls, .xlt, .xlsx, .xlsm, .xltx, .xltm, .ppt, .pot, .pps, .pptx, .pptm, .ppsx, .ppam, .potm, .ppsm, .potx, .jpeg, .jpg, .jpe, .png, .gif, .emf, .tif, .tiff, .geotiff, .bmp, .wmf, .wav, .mpg, .mp3, .mp4, .zip, .7z, .iso, .rar .pdf, .doc, .dot, .docx, .docm, .dotx, .dotm, .xls, .xlt,  .xlsx, .xlsm, .xltx, .xltm, .ppt, .pot, .pps, .pptx, .pptm, .ppsx, .ppam, .potm, .ppsm, .potx, .jpeg, .jpg, .jpe, .png, .gif, .emf, .tif, .tiff, .geotiff, .bmp, .wmf, .wav, .mpg, .mp3, .mp4, .zip, .7z
Nested Archive Support
Operating SystemsWindows (10/11), Windows Servers 2019 onwards Windows (10/11), Windows Servers 2019 onwards Windows (10/11)
Customer Support
PricePrice on requestPrice on requestPOA
Get in touchGet in touchGet in touch

Sync and Clean

Glasswall Meteor's Sync and Clean feature provides users with the power to set up automated CDR file processing quickly and easily for both local and cloud-based folders, including services such as Dropbox and Google Drive.

Any files that enter the nominated folder are automatically processed by our patented zero-trust CDR technology and stored in a user-configured destination.
Watch Sync and Clean in action
Get in touch

Best-in-class file-based protection from Glasswall

Glasswall is the market leader for Content Disarm and Reconstruction (CDR). We supply our zero-trust file protection solutions to nations across the world, including members of NATO, the Five Eyes Alliance and AUKUS. Our CDR technology is infinitely scalable and helps organizations to comply with initiatives such as NCSC's Pattern for Safely Importing Data, NSA's Raise the Bar and NIST Risk Management Framework by the US Department of Commerce.
NATO logoAUKUS logoNational Security Agency logo USAHM government logoNIST (Nastional Institute of Standards and Technology) logo

How we do it better:

  • Complete file analysis – giving users transparency into file non-conformance with industry specifications
  • Complete file protection – threats removed and files returned to known-good specifications
  • Content management options to shape an organization’s security policy based on risk appetite
  • True file type detection going beyond just the file extension or magic number
Contact usBook a demo

Book a demo

Talk to us about our industry-leading CDR solutions

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.