Best Content Disarm & Reconstruction (CDR) Software in China

Find and compare the best Content Disarm & Reconstruction (CDR) software in China in 2024

Use the comparison tool below to compare the top Content Disarm & Reconstruction (CDR) software in China on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    FileWall Reviews
    Top Pick

    FileWall

    Odix

    $1 per user, per month
    17 Ratings
    odix, a market leader for Enterprise CDR (Content Disarm and Reconstruction), now offers FileWall, a native cybersecurity app for Microsoft Office 365 mailboxes. FileWall™, which is compatible with Microsoft security solutions like EOP and ATP, ensures complete protection against unknown attacks via email attachments. FileWall™, unlike other Microsoft security solutions, doesn't alter or harm any sender-related security capabilities.
  • 2
    OPSWAT Reviews
    Our goal is to eradicate malware and zero-day threats. We believe that every file and device is a threat. Threats should be addressed at all points, at all times, including entry, exit, and rest. Our products are focused on threat prevention and process generation for secure data transfer and device access. The result is a system that is efficient and minimizes the risk of compromise. 98% of U.S. nuke power plants trust OPSWAT for cybersecurity compliance. Solutions designed to protect critical infrastructure. MetaDefender Kiosk is a digital security guard that inspects all media for malware, vulnerabilities and sensitive data. It ensures compliance with security policies. MetaDefender Drive is a portable perimeter that inspects devices before they start up. MetaDefender Vault protects sensitive files by providing secure file storage and retrieval.
  • 3
    Votiro Reviews
    Positive Selection is the only file security solution that guarantees all files entering your company are safe. Positive Selection is a file security solution that does not scan for suspicious elements or block files. Instead, it identifies the safe elements in each file and ensures that every file that comes into your company is 100% secure. Any file, any time, anywhere. Votiro's Secure File Gateway has a deep and expert understanding of all file types. It eliminates threats from any file, regardless of how it enters your organization.
  • 4
    Ericom Shield Reviews

    Ericom Shield

    Ericom Software

    Ericom Software offers businesses Zero Trust Secure Access to corporate apps, on-premises and in the cloud, from any device or location. Ericom Shield, a clientless enterprise-grade security solution, is designed to meet the needs of IT professionals and security personnel. It also provides transparent Internet access for end users via Remote Browser Isolation. Ericom Shield is available for deployment across any organization, on any device, with any operating system or browser. It does not require the installation of any software or plug ins on endpoints. Before files can be downloaded, they are scanned and cleaned using a Content Disarm and Reconstruction process (CDR).
  • 5
    GateScanner Reviews

    GateScanner

    Sasa Software

    Sasa Software is a leading provider of Content Disarm and Reconstruction (CDR) content sanitization technology. It's Gatescanner solutions provide unparalleled protection from known and unknown content-borne threats - on all incoming routes. GateScanner solutions include - > Secure Email Gateway with CDR > Secure web-based Managed File Transfer and Vaults - with CDR > Secure web-downloading extension for Chromium-based browsers (Chrome/Edge and others) with CDR > Secure import from portable media (USB, CD, DVD) with CDR > CDR delivered via API and ICAP GateScanner CDR solutions are protecting hundreds of sensitive installations in government, critical infrastructure, healthcare, financial and legal services, oil, gas and energy companies, pharmaceuticals and security agencies - since 2013. Sasa Software is a member of the IC3 Israeli Cyber Companies Consortium and a Gartner Cool Vendor for cyber-physical systems for the year 2020.
  • 6
    SandBlast Threat Extraction Reviews

    SandBlast Threat Extraction

    Check Point Software Technologies

    The SandBlast Threat Extract technology is a SandBlast Network capability. It also works with the Harmony Endpoint protection solutions. It removes exploitable information, reconstructs files to eliminate possible threats, and delivers sanitized contents to users in a matter of seconds to maintain business flow. Reconstruct files containing known safe elements from web-downloaded documents or emails. To maintain business flow, you must immediately deliver sanitized files that could be malicious. After background analysis of attacks, access to the original files. SandBlast Network's Threat Extraction technology is used by Harmony Endpoint to quickly deliver safe and sanitized content to their intended destination. After the Threat Emulation Engine has performed background analysis, original files can be accessed. SandBlast Threat Extraction supports all document types currently used in organizations.
  • 7
    Glasswall Reviews

    Glasswall

    Glasswall Solutions

    You are vulnerable to unknown future attacks if you have antivirus. Sandboxing can expose you to advanced malware and slow down productivity. You can now secure documents across your organization without compromising productivity. Our CDR technology instantly cleans, rebuilds and matches files to the manufacturer's standards, automatically removing any potential threats. Protect your files from potential dangers and anomolies by taking proactive steps to remove them. Without the hassles and hidden costs, you can implement in hours instead of months. Our CDR Platform's Glasswall Engine is the core of our CDR Platform. It provides a way to manage analysis and protection workloads. Partners and development teams can embed the core Glasswall Engine. This allows the Glasswall Embedded Engine's capabilities to be harnessed by partners and development teams via an SDK. This facilitates programmatic integration into appliances and software processes.
  • 8
    FortiGate SWG Reviews
    Secure Web Gateway (SWG), enterprise-class protection against web-borne threats Secure Web Gateway (SWG), solutions use web filtering in order to enforce company Internet access policies. They can also filter unwanted software, including malware, from user-initiated Internet connection. SWGs are vital as enterprises continue to improve their WAN Edge. Applications are moving to the cloud rapidly, and the attack surface at branch locations and remote sites is increasing. Security risks are particularly high for web-based traffic. As attack techniques improve, organizations require an integrated approach to protect against both internal and external risks. URL filtering, application control and deep HTTPS/SSL inspection are all part of an SWG solution. Data loss prevention and remote browser isolation capabilities are also included. Flexible deployment options are available with Fortinet's SWG, including explicit, transparent and inline modes.
  • 9
    Deep Secure Reviews
    Deep Secure's Threat Removal technology ensures that iX offers 100% protection against known and zero-day malware in images and documents. iX acts as an application layer proxy and works on the perimeter. It integrates seamlessly with a variety of business processes and applications, as it supports a wide variety of data formats and protocols. Documents are intercepted at each boundary and then re-created cleanly and safely on the other side. Safe content is guaranteed to travel end-to-end. This prevents malware from being infiltrated and prevents outbound data loss. Deep Secure's content transformation technology intercepts documents at network boundaries and then recreates them cleanly and safely on the other side. This eliminates the threat. Safe content is the only thing that can travel end-to-end.
  • 10
    odix Reviews
    odix's patent technology disarms malicious codes from files. Our concept is simple. Instead of trying to detect malware, odix creates a malware-free copy of the file for the user. Incoming files provide total protection against known and unknown threats to the corporate network. odix's malware prevention technology is based on its Deep File inspection and TrueCDR™, patented technology. These algorithms offer a new detection-less approach to File-Based attacks. Core CDR (Content Disarm and Reconstructions), focuses on verifying that the file structure is valid at the binary level and disarms known and unknown threats. This is quite different from anti-virus or sandbox methods which scan for threats, detect a small number of malware and block files. CDR prevents all malware, even zero-days. The user also gets a safe copy the original infected file.
  • 11
    Resec Reviews
    Hackers love to target organizations via email, with over 300 billion emails being sent each day. Resec for Email offers superior protection against advanced threats from both cloud-based and on-premise mail services. Our solution allows users to open attachments and emails safely, without any delay and without unnecessary latency. Fully supported encryption of attachments increases security, reduces falsely blocked emails, and lowers IT overhead. Every email is considered a threat. Resec protects your organization from known and unknown malware attacks. No client-based footprint or agents. Flexible according to group-level policies. Easy to use and maintain. Superior protection against malware and ransomware attacks via emails and attachments.
  • Previous
  • You're on page 1
  • Next