Our products

Industry-leading CDR solutions that provide flexible and scalable protection against file-based threats:

Glasswall Embedded ENgine illustration

Embedded Engine

Integrate industry-leading CDR file protection across your organization with the Glasswall Embedded Engine. This is a software development kit (SDK) which includes an API, enables fast and effective integration with new and existing application deployments to remove file-based threats. Supporting both Linux and Windows operating systems, it can be provided in containerized form – making it highly portable and easily deployable.

Glasswall Halo icon

Glasswall Halo

Implement out-of-the-box zero trust CDR file protection with Glasswall Halo. The solution is Kubernetes-based, which allows it to scale to meet the needs of your organization, whether that’s a small number of files, or huge volumes of documents which need protecting each day. Glasswall Halo comes ready-to-go, enabling security teams to quickly and easily protect their organization against file-based threats. Deployment is rapid via Helm Charts, making the system easy to upgrade.

Glasswall Meteor icon

Meteor

Supercharge your security capabilities with automated zero-trust file protection from Meteor. It's file synchronization and drag and drop processing capabilities work even when offline, making it perfect for isolated machines and remote environments.

Glasswall Constellations

Constellations

Automatically process and transfer large quantities of data across trust boundaries with Glasswall Constellations. It is a zero-trust file protection solution that complies with NSA's Raise the Bar standards and other industry guidance – utilizing our industry-leading CDR solution to solve the traditional challenges faced by security teams when processing substantial amounts of untrusted data.

How does Glasswall CDR work?

Glasswall CDR (Content Disarm and Reconstruction) employs our patented 4-step approach to protect organizations and individuals against file-based threats. Unlike other cyber security solutions, we don’t try to identify the malicious code – we simply remove the ability for it to exist in the document all together.

CDR process first step: inspection

1. Inspect

Breaks down the file into its constituent components. Validates the file’s structure against its specification
CDR process second step: rebuilding

2. Rebuild

Unknown and invalid file structures are repaired in-line with the manufacturer’s specification
CDR process third step: Cleaning

3. Clean

Removes high-risk file structures that contain active content based on configurable policy
CDR process fourth step: delivering a clean file

4. Deliver

Semantic checks ensure the file’s integrity. The safe and fully functional file is now ready to use

Book a demo

Talk to us about our industry-leading CDR solutions

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.