https://store-images.s-microsoft.com/image/apps.11198.76da1024-3e8c-40d4-ada8-52eb5ceed68a.7a3c57a0-52c5-4aba-9d53-c33ed5caa613.7b2b115d-5d5f-4414-8348-98acfc435da1

Glasswall Halo

Glasswall Solutions

Glasswall Halo

Glasswall Solutions

Zero-trust file protection from the world's leading Content Disarm and Reconstruction provider.

Halo is a cloud-native CDR solution that gives security teams out-of-the-box file protection capabilities. Built on a Kubernetes architecture, it provides organizations with protection that can scale infinitely to meet demand.

What is Glasswall CDR?

Glasswall Content Disarm and Reconstruction (CDR) employs our patented 4-step approach to protect organizations and individuals against file-based threats. Unlike most conventional cyber-security solutions, Glasswall CDR does not rely on detection capabilities. Instead, we follow a ‘zero-trust’ approach, where only files that have been processed by Glasswall are considered secure. We don’t try to identify malicious code – our technology simply removes the ability for it to exist in the document.

All files processed by the Glasswall Embedded Engine are assumed to be malicious. The engine conducts analysis and rebuilds files back to their known-good manufacturer's specification, removing any potential threats lurking in the file’s structure. The act of correcting deeper-rooted structural content is referred to as remediation, whereas removing content which is configurable through policy management (e.g. hyperlinks in office documents) is referred to as sanitization.


Why is CDR better than regular antivirus and sandboxing techniques?

Next-generation antivirus software and sandboxes require understanding of a threat in order to defend against it. Glasswall CDR rebuilds every file to the known-good manufacturer's specification, without the need to have specific threat knowledge - eliminating the risk that malware can be hidden within the file’s structure.

Organizations deploying CDR protection do not have to rely on next-generation antivirus or threat intelligence databases, which on average have a protection gap of 18 days for new zero-day threats. Whilst sandbox technology can go beyond relying on hashes and file signatures, and therefore helps to identify novel malware, usability is usually compromised, with business productivity sacrificed for security. Sandboxes are really just instrumented virtual machines. Their success relies on two factors, the first is that the detection of malicious processes is correct. Secondly, the attacker needs to be impatient and launch a suspicious software process whilst the files are still in the Sandbox. These two factors are not guaranteed to happen in isolation or at the same time – illustrating the protection gap that can be left by a Sandbox.


Try Glasswall CDR or contact us here


Use Cases

  • Cross Domain Solutions (CDS)

    Supercharge new and existing cross domain solutions with CDR technology that removes the reliance on detection and data wrapping – replacing it with a zero-trust approach that treats all files as malicious – validating, rebuilding and cleaning each one to a known good standard.

    Glasswall CDR enables government departments and commercial organizations to comply with industry best practice initiatives, such as the NCSC’s Pattern for Safely Importing Data, the NSA’s Raise the Bar Initiative and the NIST Risk Management framework by the US Department of Commerce.

  • Secure file upload portals

    Halo can be established at various integration points within an organization’s security architecture. It provides security teams with the capability to instantly and automatically remove known and zero-day (unknown) file-based threats – delivering secure, visually identical, and full functioning files to the end user.

  • Cloud migration

    Glasswall provides organizations and departments with REST endpoints that harness the power of Halo's Kubernetes-based architecture. Clients can process large storage containers at massive scale and at lightning speed – ensuring only safe, clean and fully-functioning files transfer across networks.

  • Isolated networks

    Our patented CDR technology has a zero-trust approach to file protection and doesn’t require an active line for updates. Instead, it assumes all files are malicious – ensuring maximum protection is provided against file-based threats while network insolation is maintained.

  • Industry critical compliance

    Our CDR technology enables compliance with industry guidelines such as the NCSC’s Pattern for Safely Importing Data, the NSA’s Raise the Bar Initiative and the NIST Risk Management framework by the US Department of Commerce.

    In addition, our CDR technology boasts patented and industry-leading features, such as word search and redact, metadata removal and image analyzer.

https://store-images.s-microsoft.com/image/apps.17840.76da1024-3e8c-40d4-ada8-52eb5ceed68a.343ff8e8-d77e-4be9-8bf8-64d83cfddfec.cfd68434-7dd1-4dc9-af79-9fe44a05e99f
/staticstorage/55c01f2/assets/videoOverlay_7299e00c2e43a32cf9fa.png
https://store-images.s-microsoft.com/image/apps.17840.76da1024-3e8c-40d4-ada8-52eb5ceed68a.343ff8e8-d77e-4be9-8bf8-64d83cfddfec.cfd68434-7dd1-4dc9-af79-9fe44a05e99f
/staticstorage/55c01f2/assets/videoOverlay_7299e00c2e43a32cf9fa.png
https://store-images.s-microsoft.com/image/apps.30449.76da1024-3e8c-40d4-ada8-52eb5ceed68a.343ff8e8-d77e-4be9-8bf8-64d83cfddfec.a403ef46-1f62-4ab3-8144-fd599ed49288
/staticstorage/55c01f2/assets/videoOverlay_7299e00c2e43a32cf9fa.png
https://store-images.s-microsoft.com/image/apps.54203.76da1024-3e8c-40d4-ada8-52eb5ceed68a.343ff8e8-d77e-4be9-8bf8-64d83cfddfec.01227004-f232-4603-9ca4-97472be7cb2f
/staticstorage/55c01f2/assets/videoOverlay_7299e00c2e43a32cf9fa.png
https://store-images.s-microsoft.com/image/apps.59910.76da1024-3e8c-40d4-ada8-52eb5ceed68a.343ff8e8-d77e-4be9-8bf8-64d83cfddfec.9769db6a-fe23-438b-b428-7ea741f068de
/staticstorage/55c01f2/assets/videoOverlay_7299e00c2e43a32cf9fa.png
https://store-images.s-microsoft.com/image/apps.60536.76da1024-3e8c-40d4-ada8-52eb5ceed68a.9d1b6690-a9df-49dd-820a-b69f1185d010.6b58330b-173e-4a2c-bcbf-d2013291c384