Absolute Protection and Document Compliance with Standards
Glasswall’s security software operates across three distinct phases: inspection; remediation; and delivering a secure, clean and compliant file or document to the email user.
Glasswall’s unique file inspection approach utilises content disarm and reconstruction technology to break down each file to its component parts and conducts thousands of structure conformance checks against the respective document manufacturer’s design or ISO standard. In doing so, Glasswall’s software inspects and removes the structural inconsistencies and manipulations in emailed files and documents increasingly exploited by hackers.
Using its content disarm and reconstruction software technology, Glasswall then regenerates a new, compliant and clean version of the original emailed file in order to guarantee email attachment security, allowing the user to interact with the file or document as they normally would: editing, saving and sharing the document with complete confidence that the document is safe.
The combination of these processes, delivered in real time, makes Glasswall a vital component of a well considered cyber defence security strategy.
Try Glasswall for free
A free trial is simple and easy to achieve, using either your organisation’s existing infrastructure or Glasswall’s private Azure cloud. During a 30 day period your staff will be trained on our unique technology and platform, culminating in a risk assessment and threat intelligence report.
documents are the weapon of choice for cyber criminals
74% of cyber-attacks start with an email attachment, yet organisations do not know what is in their documents. Glasswall shifts an organisation from reactive to proactive defence.
Glasswall eliminates malware attacks in email attachments
Glasswall is a unique software technology that regenerates a benign file from an original email attachment, and removes all malware and structural manipulations in real time.
Deep-level inspection and regeneration to known good
The complete regeneration of a file, so that it is compliant with the design specification for that document type, ensures absolute protection from embedded malware and malicious code.