CONTENT DISARM RECONSTRUCTION

Securing Your Company’s Digital Journey

Product Overview

CDR is a security technology where it can neutralize threats that were hidden by attacker. Threats can be like malicious code, macros, binary files, etc. While it neutralize the threats, CDR will also generate an exact file without threats in it. So user as the recipient will receive the clean file.

Content Disarm Reconstruction technology protect from exploits at all stages of the vulnerability life cycle.

Content Disarm and Reconstruction (CDR) solution based on Votiro’s proprietary technology to disarm files from zero-day and other undisclosed attacks to protect end-users of the risk posed by targeted cyber crime activities.

How CDR Works

Break down a file into its basic objects and analyse each individual section and metadata
Neutralise any threats
The cleansed files are reconstructed, while preserving the integrity and functionality of the original file
VULNERABILITIES IS A HOLE

Protect from Vulnerabilties

Vulnerabilities has a life cycle consisting of three stages : Undisclosed, Zero-day, and Patched. Undisclosed is vulnerability unknown to apps vendor but has been discover by cyber warfare. Zero-day is Vulnerability that has just appeared for the first time and no patch has been developed to overcommit. The last is patched, security patch has been released by apps vendor but non-patched environment still have high potential to get attacked.

COMPARED TO ANOTHER TECHNOLOGY

Why CDR is Difference?

CDRSandboxAnti-virus
Not depends on signature database to neutralize the threat
Available
Available
Not Available
Able to protect from zero-day exploits due to signature-less method
Available
Available
Not Available
No need for malware to make action to justify it’s a threat and clean it.
Available
Not Available
Not Available
Minimum hardware requirement
Minimal
Very High
Minimal

We provide cybersecurity to secure your connected world

Mahapatih

Copyright © All right reserved. Mahapatih Sibernusa Teknologi 2019