
Instantly disarm threats, ensuring safe, risk-free file handling

Easy-to-use desktop app with seamless cloud and network integration

Reliable protection both online, offline, and in isolated environments
Find, redact, and block sensitive information
Glasswall Meteor offers advanced Data Loss Prevention, empowering users to create custom rules to identify and remove sensitive information in Office documents.
Unlike traditional DLP tools, Meteor exposes all strings in visual layer, without the risk of executing payloads. This unique approach ensures even the most concealed information is securely removed.

Discover which version of Meteor is right for you
Essentials | Pro | ||
Maximum Files Per Day | 150 | 1,000-10,000 | |
Supported Document Types | PDF, Word, Excel, PowerPoint, images, audio and movies | PDF, Word, Excel, PowerPoint, images, audio, movies and Zip and 7zip Archives | |
Adjustable Content Management Policy | |||
Audit Trail Folder | |||
Maximum File Size | 25 MB | 1 GB | 1 GB |
Supported File Extensions | .pdf, .doc, .dot, .docx, .docm, .dotx, .dotm, .xls, .xlt, .xlsx, .xlsm, .xltx, .xltm, .ppt, .pot, .pps, .pptx, .pptm, .ppsx, .ppam, .potm, .ppsm, .potx, .jpeg, .jpg, .jpe, .png, .gif, .emf, .tif, .tiff, .geotiff, .bmp, .wmf, .wav, .mpg, .mp3, .mp4 | .pdf, .doc, .dot, .docx, .docm, .dotx, .dotm, .xls, .xlt, .xlsx, .xlsm, .xltx, .xltm, .ppt, .pot, .pps, .pptx, .pptm, .ppsx, .ppam, .potm, .ppsm, .potx, .jpeg, .jpg, .jpe, .png, .gif, .emf, .tif, .tiff, .geotiff, .bmp, .wmf, .wav, .mpg, .mp3, .mp4, .zip, .7z, .iso, .rar | |
Nested Archive Support | |||
Operating Systems | Windows (10/11), Windows Servers 2019 onwards | Windows (10/11), Windows Servers 2019 onwards | Windows (10/11) |
Customer Support | |||
Price | Price on request | Price on request | |
Get in touch | Get in touch |

Best-in-class file-based protection from Glasswall
Glasswall is the market leader for Content Disarm and Reconstruction (CDR). We supply our battle-hardened zero-trust file protection solutions to the world’s most sophisticated security establishments, including members of NATO, the Five Eyes Alliance and AUKUS. Our CDR technology helps organizations comply with Cross-Domain initiatives such as NSA's Raise the Bar and NCSC's Pattern: Safely Importing Data.