CONTENT DISARM & RECONSTRUCTION

Securing Your Company’s Digital Journey

Product Overview

Content Disarm & Reconstruction (CDR) is a security technology where it can neutralize threats that were hidden by the attacker. Threats can be like malicious code, macros, binary files, etc. While it neutralizes the threats, CDR will also generate an exact file without risks in it. So user as the recipient will receive the clean data.

CDR technology protect from exploits at all stages of the vulnerability life cycle.

It based on Votiro's proprietary technology to disarm files from zero-day and other undisclosed attacks to protect end-users of the risk posed by targeted cybercrime activities.

How CDR Works

Break down a file into its necessary objects and analyze each section and metadata
Neutralize any threats
The cleansed files are reconstructed while preserving the integrity and functionality of the original file
VULNERABILITY IS A SECURITY HOLE

Protection from Vulnerabilities

Vulnerability has a life cycle consisting of three stages: undisclosed, zero-day, and patched. Undisclosed is vulnerability unknown to apps vendor but has been discovered by cyber warfare. Zero-day is a vulnerability that has just appeared for the first time and no patch has been developed to overcommit. The last is patched, apps vendor has released security patch but non-patched environment still have high potential to get attacked.

COMPARED TO ANOTHER TECHNOLOGY

What does make CDR different?

CDRSandboxAnti-virus
Not depends on signature database to neutralize the threat
Available
Available
Not Available
Able to protect from zero-day exploits due to signature-less method
Available
Available
Not Available
No need for malware to make action to justify it’s a threat and clean it.
Available
Not Available
Not Available
Minimum hardware requirement
Minimal
Very High
Minimal

We provide cybersecurity to secure your connected world

Mahapatih

Copyright © All right reserved. Mahapatih Sibernusa Teknologi 2019