OPSWAT Releases New Content Disarm & Reconstruction Report

Share Article

OPSWAT's Content Disarm & Reconstruction Report is a new report that demonstrates the benefits of OPSWAT's data sanitization (CDR) technology. This technology reconstructs complex file formats such as Word documents, PDFs, and images in order to remove malicious embedded scripts or macros.

Content Disarm & Reconstruction Report

Content Disarm and Reconstruction technology is designed to remove embedded objects, exploits, and zero-day attacks from files while preserving the usability of the files.

OPSWAT today announced the release of their Content Disarm & Reconstruction Report, a unique report that provides examples of various types of document-based exploits, and remediation of those exploits by using OPSWAT's next-generation Content Disarm and Reconstruction (CDR) engines. The report provides recent real-world examples of documents that were successfully disarmed and reconstructed, listing the threats that were found in these files prior to CDR and comparing the anti-malware scan results before and after CDR.

Tomas Hertus, Product Manager for Metadefender Cloud at OPSWAT, explained: "Organizations are often attacked via document-borne malware, or malware that is hidden inside a seemingly innocuous file. Such files are often sent to members of an organization in a phishing attack. Content Disarm and Reconstruction (CDR), which we also call 'data sanitization,' is the perfect solution for this kind of problem. This technology is designed to remove embedded objects, exploits, and zero-day attacks from files while preserving the usability of the files. In this report, we wanted to present our unique results and demonstrate the benefits of using this technology."

The data in this report was generated one month after OPSWAT introduced data sanitization (CDR) as a free feature for all Metadefender.com users. The dual purpose of this report is to encourage people to leverage OPSWAT's data sanitization (CDR) either through their web interface or by integrating with OPSWAT's free public REST API, and to showcase various types of documents and exploits hidden in them.

The report's data was collected over the last month from free users of OPSWAT's Metadefender.com, an application and threat intelligence platform that uses next-generation Content Disarm and Reconstruction (CDR) engines, OPSWAT's Vulnerability Engine, and multi-scanning technologies to analyze all submitted files for threats and potential risks. In addition to analyzing files, Metadefender.com can perform analysis on a hash, checking for threats, known vulnerabilities, and application reputation information.

For more information regarding this report, please contact marketing(at)opswat(dot)com.

About OPSWAT

OPSWAT is a San Francisco-based cyber security software company that provides solutions to secure and manage IT infrastructure. Founded in 2002, OPSWAT has delivered solutions and technologies that protect organizations from threats and secure digital data for over a decade. OPSWAT combines next-generation Content Disarm and Reconstruction technology, its cutting-edge Vulnerability Engine, and multi-scanning with over 30 anti-malware engines in its Metadefender suite of products, and its OESIS Framework endpoint security SDK has helped secure over 200 million endpoints. To learn more about OPSWAT, visit OPSWAT.com.

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Anna Dronova
OPSWAT
+1 (415) 590-7348
Email >
@OPSWAT
since: 06/2009
Follow >
Follow us on
Visit website