GateScanner - Smart made simple
Content Disarm and Reconstruction Technology (CDR)
WHAT IS CONTENT DISARM AND RECONSTRUCTION (CDR) TECHNOLOGY?
CDR generates for each incoming email and file, a functionally identical new copy that is devoid of any malicious content or links- transparently, in near real-time.
An added benefit of the technology is the capacity to apply precision data redaction to the outgoing stream, enabling the prevention of data exfiltration or loss, supporting data-protection and privacy policies (GDPR/CCPA) compliance.
How DOES CONTENT DISARM AND RECONSTRUCTION (CDR) TECHNOLOGY WORK?
Content Disarm and Reconstruction dissects each incoming (or outgoing) file to its most elementary components and scans the components with NextGen AI and multi-AV tools with superior results. It then reconstitutes the files, in strict adherence to their vendor specifications, disrupting in process any remaining, undetected (‘signature-less’) malware (see our ‘Before & After CDR Processing’ samples page).
A good CDR solution combines deep Deconstruction/Reconstitution processing, coupled with high-throughput capacity.
Content Disarm and Reconstruction stages
- 1. File deconstructed to its elementary components
- 2. Deep threat detection ('deep CDR'): TrueType identification, highly optimized Multi-AV scans, NextGen AI detection, file signature verification - applied to each component separately.
- 3. Proprietary disarming of the components from any potentially harmful elements such as macros and embedded scripts
- 4. Advanced file reconstruction, removing in the process undetectable weaponized content, exploits and all components that do not meet the designated security policy

Why GateScanner?
Excellence. We are certain that our CDR technology is practically impregnable. Our clients’ independent penetration tests repeatedly show up to 99.99 % success rates in the obstruction of unknown, file embedded threats, and that’s the bottom line – but that’s not the whole story…
Modularity. Adding a new component to an existing system can be a major challenge, and flexibility is the key to a successful implementation. With this in mind, we’ve built GateScanner to be modular, highly configurable and easily scalable. Pick and choose any part of the CDR process you want to implement, select which channels to protect, and chain up to ten GateScanner engines on-the-fly, to achieve virtually unlimited processing capacity.
Easily Integrated. Challenged to deliver unique solutions for a wide variety of client configurations, GateScanner features a unique integration engine that enables security teams to insert content sanitization processing at any point along the data flow, either before or after existing security tools, notching-up the security profile of the network significantly.
Customizable. For us, every client is an opportunity to get creative. Our highly dedicated development team works closely with each client to fulfill their most ambitious goals.
We look forward to creating your solution!
GateScanner features:


CDR deep-scans of deconstructed files with multi antivirus tools, including Next-Gen AI/ML AV, reaching detection levels of up to 2.5 times the rate of detection for the original composite file scan.

Hundreds of file types supported including the entire suite of MS Office, PDF, media files (images, audio, video), AutoCad, Hanword (HWP), Archives, PST, .EML, installation files, XML, HTML, other text files, medical imaging files (DICOM), and customized files. (See “Before & After CDR processing” samples page).



GateScanner implements CDR technology to protect email, portable media uploads, cross-network file transfers, safe browser downloads, Cloud-based file shares, computing appliances and to enable cross domain solutions with unidirectional gateways.


Sasa Software is privately owned by Kibbutz Sasa, Israel, with the majority of profits channeled back into R&D.