Overview
Product video
What is Glasswall CDR?
Glasswall Content Disarm and Reconstruction (CDR) employs our patented 4-step approach to protect organizations and individuals against file-based threats. Unlike most conventional cyber-security solutions, Glasswall CDR does not rely on detection capabilities. Instead, we follow a zero-trust approach, where only files that have been processed by Glasswall are considered secure. We do not try to identify malicious code, our technology simply removes the ability for it to exist in the document.
All files processed by the Glasswall Embedded Engine are assumed to be malicious. The engine conducts analysis and rebuilds files back to their known-good manufacturers specification, removing any potential threats lurking in the files structure. The act of correcting deeper-rooted structural content is referred to as remediation, whereas removing content which is configurable through policy management (e.g. hyperlinks in office documents) is referred to as sanitization.
Why is CDR better than regular antivirus and sandboxing techniques? Next-generation antivirus software and sandboxes require understanding of a threat in order to defend against it. Glasswall CDR rebuilds every file to the known-good manufacturers specification, without the need to have specific threat knowledge, eliminating the risk that malware can be hidden within the files structure.
Organizations deploying CDR protection do not have to rely on next-generation antivirus or threat intelligence databases, which on average have a protection gap of 18 days for new zero-day threats. Whilst sandbox technology can go beyond relying on hashes and file signatures, and therefore helps to identify novel malware, usability is usually compromised, with business productivity sacrificed for security. Sandboxes are really just instrumented virtual machines. Their success relies on two factors, the first is that the detection of malicious processes is correct. Secondly, the attacker needs to be impatient and launch a suspicious software process whilst the files are still in the Sandbox. These two factors are not guaranteed to happen in isolation or at the same time, illustrating the protection gap that can be left by a Sandbox.
Use Cases
Cross Domain Solutions (CDS): Supercharge new and existing cross domain solutions with CDR technology that removes the reliance on detection and data wrapping, replacing it with a zero-trust approach that treats all files as malicious, validating, rebuilding and cleaning each one to a known good standard.
Glasswall CDR enables government departments and commercial organizations to comply with industry best practice initiatives, such as the NCSCs Pattern for Safely Importing Data, the NSAs Raise the Bar Initiative and the NIST Risk Management framework by the US Department of Commerce.
Secure file upload portals: Halo can be established at various integration points within an organizations security architecture. It provides security teams with the capability to instantly and automatically remove known and zero-day (unknown) file-based threats to deliver secure, visually identical, and full functioning files to the end user.
Cloud migration: Glasswall provides organizations and departments with REST endpoints that harness the power of Halos Kubernetes-based architecture. Clients can process large storage containers at massive scale and at lightning speed, ensuring only safe, clean and fully-functioning files transfer across networks.
Isolated networks: Our patented CDR technology has a zero-trust approach to file protection and does not require an active line for updates. Instead, it assumes all files are malicious, ensuring maximum protection is provided against file-based threats while network insolation is maintained.
Industry critical compliance: Our CDR technology enables compliance with industry guidelines such as the NCSCs Pattern for Safely Importing Data, the NSAs Raise the Bar Initiative and the NIST Risk Management framework by the US Department of Commerce.
In addition, our CDR technology boasts patented and industry-leading features, such as word search and redact, metadata removal and image analyzer.
Highlights
- Zero-trust file protection for 85+ supported file formats and counting.
- Virtual appliance deployment options for custom or air-gapped environments. OVA and VHD images are based on hardened (DoD STIG) Red Hat Enterprise Linux and RKE2 (or RKE Government) with CIS Kubernetes Benchmark 1.6 conformance.
- Deep file inspection, beyond artefacts such as the so-called magic number, to accurately report what file data suggests about the true file type.
Details
Features and programs
Financing for AWS Marketplace purchases
Pricing
Additional AWS infrastructure costs
Type | Cost |
---|---|
EBS General Purpose SSD (gp2) volumes | $0.10/per GB/month of provisioned storage |
Vendor refund policy
https://docs.glasswall.com/docs/halo-refund-policy
Please contact support@glasswall.com for more information about refund requests.
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (x86) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Version release notes
Additional details
Usage instructions
https://docs.glasswall.com/docs/aws-ec2-setup-guide
Log in to AWS Navigate to the EC2 service and click Launch instance.
Name the Instance Enter a name for your instance, e.g., My Halo Instance.
Select the Glasswall Halo AMI Click Browse more AMIs, search for Glasswall Halo, and select the Glasswall Halo 2.5.4 AMI.
Choose Instance Type Select an instance type with at least 16 cores and 32GB memory, e.g., c5.4xlarge.
Set Up a Key Pair Select or create a key pair to securely log in to the instance using a private key.
Configure Network Settings Choose your desired VPC and subnet.
Set Up Security Group Create a security group to allow inbound access on: Port 22 for SSH Port 443 for the Halo API
Update Storage Increase storage to 500GB.
Launch the Instance Click Launch instance to complete the setup.
Configure Halo EC2 instance Health Check After launching the EC2 instance, wait 15 minutes for the Halo services to start. Visit https://<ip-address> in a browser to check if the Glasswall Halo portal is running. Access Halo APIs via the Swagger portal at https://<ip-address>/swagger/index.html. You are now ready to use the Glasswall Halo Portal and API.
License Management Set up a license by following the steps at Glasswall License Management Guide.
Resources
Support
Vendor support
To obtain Support Services, Glasswall Customers must raise a service request ticket with the customer support team. The Customer can raise a Ticket 24/7 and the number of tickets that can be raised by the Customer is not limited.
The Customer must raise a ticket using one of the following channels: By telephone: +44 (0)203 868 6305 (UK) +1 844 527 7925 (USA) By email: support@glasswall.com
The standard support language is English.
When raising a ticket, the Customer must follow the process and provide the information set out in the Customer Support documentation.
Glasswall recommends raising a ticket by email for tracking purposes.
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.