Our products
Industry-leading CDR solutions that provide flexible and scalable protection against file-based threats:
.avif)
Embedded Engine
Integrate industry-leading CDR file protection across your organization with the Glasswall Embedded Engine. This is a software development kit (SDK) which includes an API, enables fast and effective integration with new and existing application deployments to remove file-based threats. Supporting both Linux and Windows operating systems, it can be provided in containerized form – making it highly portable and easily deployable.

Glasswall Halo
Implement out-of-the-box zero trust CDR file protection with Glasswall Halo. The solution is Kubernetes-based, which allows it to scale to meet the needs of your organization, whether that’s a small number of files, or huge volumes of documents which need protecting each day. Glasswall Halo comes ready-to-go, enabling security teams to quickly and easily protect their organization against file-based threats. Deployment is rapid via Helm Charts, making the system easy to upgrade.

Meteor
Supercharge your security capabilities with automated zero-trust file protection from Meteor. It's file synchronization and drag and drop processing capabilities work even when offline, making it perfect for isolated machines and remote environments.
.avif)
Constellations
Automatically process and transfer large quantities of data across trust boundaries with Glasswall Constellations. It is a zero-trust file protection solution that complies with NSA's Raise the Bar standards and other industry guidance – utilizing our industry-leading CDR solution to solve the traditional challenges faced by security teams when processing substantial amounts of untrusted data.
How does Glasswall CDR work?
Glasswall CDR employs our patented 4-step approach to protect organizations and individuals against file-based threats. Unlike other cybersecurity solutions, we don’t try to identify the malicious code – we simply remove the ability for it to exist in the file all together.

1. Inspect
Breaks down the complex data format into its constituent components and converts them into document object models (DOMs) presented as SISL/XML files

2. Rebuild
Unknown and invalid file structures are repaired in-line with the file’s specification

3. Clean
Removes high-risk file structures that contain active content based on configurable policy

4. Deliver
Semantic checks ensure the file’s integrity. The safe and fully functional file is now ready to use