Your existing security deployments are leaving you at risk
It is common practice for security teams to deploy detection-based cybersecurity solutions, such as antivirus software and sandboxes, to protect their organization against file-based threats. However, this reliance on detection means no matter how complex a security solution may be, it can still only protect against what it has observed or seen before.
Glasswall REST API:
zero-trust file protection
at blistering speed
Glasswall REST API:
Zero-trust file protection at blistering speed
The Glasswall REST API endpoints enable security teams to present file analysis and file rebuild requests to the Glasswall CDR Platform – securing files in under a second.
Instead of looking for malicious content, our advanced CDR (Content Disarm and Reconstruction) treats all files as untrusted, validating, rebuilding and cleaning each file to a safe and compliant standard – automatically removing potential threats.
The Glasswall CDR Platform’s flexible Kubernetes-based architecture allows standalone machine instances to act together in concert, with a load-balancer configured to allow auto-scaling and self-healing. This is characterized as a disposable Kubernetes cluster configuration.
Integrate flexible and instant
CDR file protection across an organization
- Inject industry leading CDR file protection within existing business applications and protection workflows
- Protect and maintain the useability of approximately 116GBs* of data or 186,000* files in a one-hour with each CDR Platform node possessing 8 (virtual) cores
- Utilize dynamic content management policies that can be set for Microsoft Office and PDF files – enabling different protection options for different user audiences
- Support for a managed Kubernetes Service, with Terraform deployment scripts and helm charts, such as AKS, EKS or OKE for Azure, AWS, Google Cloud and Oracle, or as a standalone machine instance
- Report the true format of a file with our file-detection service, ensuring unwanted file types are not allowed to move into a target environment
Talk to us about our industry-leading CDR
Best-in-class file-based protection
from Glasswall
Glasswall is the market leader for Content Disarm and Reconstruction. Our CDR technology utilizes Kubernetes architecture to provide an infinitely scalable platform that helps organizations to comply with initiatives such as the NCSC’s Pattern for Safely Importing Data, the NSA’s Raise the Bar Initiative and the NIST Risk Management framework by the US Department of Commerce.
How we do it better:
- Complete file analysis – giving users transparency into file non-conformance with industry specifications
- Complete file protection – threats removed and files returned to known-good specifications
- Content management options to shape an organization’s security policy based on risk appetite
- True file type detection going beyond just the file extension or magic number
Industry-leading performance:
Five workload nodes in Kubernetes cluster | ||
---|---|---|
Throughput: | Files processed | MBs processed |
Per hour | 186,000 | 116,522 mb |
Per day | 4,464,000 | 2,796,539 mb |
Median file processing speed | 815 ms | |
API success rate | 99,999 % |
Cluster configuration assumes specific memory and compute allocations for containers. Production performance will ways depend on size and complexities of real world files. Configurations can be optimised to favour throughput or file processing speeds.
20 business files ranging from 17 MB to 0.05 MB in size
- File types include: PowerPoint, Video, Excel, Word, Image, PDF, Audio
- Mean file size = 3.74 MB
- Median file size = 0.64 MB
- 5 Engines per node
- 8 virtual cores
- 28 GB Memory
- Request concurrency to availability of resource is 1:1
Book a demo
Talk to us about our industry-leading CDR
In order to communicate with you effectively, we need to store and process your personal data. You can unsubscribe from Glasswall communications at any time.
For more information on how to unsubscribe, our privacy practices, and how we are committed to protecting and respecting your privacy, please review our Privacy Policy.