GateScanner - Smart made simple
WHAT IS CONTENT DISARM AND RECONSTRUCTION (CDR) TECHNOLOGY?
Also known as ‘file sanitization’ or ‘content sanitization’ – Content Disarm and Reconstruction (CDR) is an advanced technology offering superior results in prevention of file-based attacks, such as most APT’s, ransomware and zero-day attacks are. CDR effectively blocks the initial network infiltration phase of these attacks.
Applied to all incoming content – email messages and attachments, portable media uploads, web downloads and cloud-shares – CDR generates for each incoming file a functionally identical yet completely new file that is devoid of any foreign content, transparently, in near real-time.
A major benefit of CDR for the security team is that it eliminates reliance on user judgement or compliance since all incoming content is disarmed directly upon entry, prior to any user interaction.
An added benefit of the technology is the capacity to apply precision data redaction on the outgoing stream, enabling the prevention of data exfiltration or data-loss (DLP), as well as supporting data-protection and privacy policies (GDPR/CCPA) .
How DOES CONTENT DISARM AND RECONSTRUCTION (CDR) TECHNOLOGY WORK?
Content Disarm and Reconstruction dissects each incoming (or outgoing) file to its most elementary components and scans the components with NextGen AI and multi-AV tools with superior results. It then reconstitutes the files, in strict adherence to their vendor specifications, disrupting in process any remaining, undetected (‘signature-less’) malware (see our ‘Before & After CDR Processing‘ samples page).
A good CDR solution combines deep deconstruction/reconstitution processing, coupled with high throughput capacities.
Content Disarm and Reconstruction stages
Excellence. We are certain that our CDR technology is practically impregnable. Our clients’ independent penetration tests repeatedly show up to 99.99 % success rates in the obstruction of unknown, file embedded threats, and that’s the bottom line – but it’s not the whole story.
Modularity. Adding a new component to an existing system can be a major challenge, and flexibility is the key to a successful implementation. With this in mind, we’ve built GateScanner to be modular, highly configurable and easily scalable. Pick and choose any part of the CDR process you want to implement, select which channels to protect, and chain up to ten GateScanner engines on-the-fly, to achieve virtually unlimited processing capacity.
Easily Integrated. Challenged to deliver unique solutions for a wide variety of client configurations, GateScanner features a unique integration engine that enables security teams to insert content sanitization processing at any point along the data flow, either before or after existing security tools, notching-up the security profile of the network significantly.
Customizable. For us, every client is an opportunity to get creative. Our highly dedicated development team works closely with each client to fulfill their most ambitious goals.
We look forward to creating your solution!
Experience. GateScanner is in continuous development since 2013. With a diverse client-base, ranging from government security agencies and defense contractors, through multi-national manufacturing industries and critical infrastructure providers, to financial institutions and national healthcare providers, we consistently deliver our proven technology and maintain our clients’ continuing trust year after year.
CDR deep-scans of deconstructed files with multi antivirus tools, including Next-Gen AI/ML AV, reaching detection levels of up to 2.5 times the rate of detection for the original composite file scan.
Hundreds of file types supported including the entire suite of MS Office, PDF, media files (images, audio, video), AutoCad, Hanword (HWP), Archives, PST, .EML, installation files, XML, HTML, other text files, medical imaging files (DICOM), and customized files. (See “Before & After CDR processing” samples page).
GateScanner implements CDR technology to protect email, portable media uploads, cross-network file transfers, safe browser downloads, Cloud-based file shares, computing appliances and to enable cross domain solutions with unidirectional gateways.
Sasa Software is privately owned by Kibbutz Sasa, Israel, with the majority of profits channeled back into R&D.