WHAT IS CONTENT DISARM AND RECONSTRUCTION?
Stop known and unknown threatsContent Disarm and Reconstruction is an advanced cyber defense technology that protects against compromises originating from file-borne threats. CDR technology is unique because it proactively combines advanced inspection and prevention from known and unknown threats without rely on detection. CDR technology is highly effective for preventing known and unknown threats, including zero-days.
Gryphon’s advanced deep file inspection methods firstly identify
true format of the file
Gryphon deconstructs a file into its components, identifies and strips away anything that doesn’t comply with international or vendor file type specifications
Gryphon then rebuilds the threat-free file with only known, safe elements in original format
Fortify your defenseKlearis is designed to provide a safe, hassle-free solution for the prevention of file-borne threats. Klearis supports cloud, on-premise and even air-gapped deployments.
Our Gryphon Engine allow organizations to neutralize any potential threats while maintaining usability of the original file and supporting tens of file types. Gryphon has it made every file entering, using inside or leaving the organization is safe, without impacting business continuity.
Millions of files sanitized
File types supported
with preserving usability
of the original file
Different deployment options
cloud, on-premise and even
deploy easily, without hassle
As malware sandbox evasion techniques improve, the use of CDR at the email gateway, as a supplement or alternative to sandboxing will increase. CDR breaks down files into their discrete components, strips away anything that doesn’t conform to that file type’s original specs or company policies, and rebuilds a clean version that continues to the intended destination. This real-time process removes zero-day malware exploits without impacting business productivity.
Organizations should consider using Content Disarm and Reconstruction (CDR) technology to strip or neuter active content found in commonly used file types and documents.
CDR provides the highest security to limit the risk of malware upload.
It breaks down files into their discrete components, strips away anything that doesn’t conform to that file type’s original specification, ISO standard or company policy, and rebuilds a “clean” version. This near-real-time process is an effective and efficient approach to removing malware and exploits from files. Although sandboxing and almost all other techniques depend on detection, CDR protects against exploits and weaponized content that have not been seen before.