Listing Thumbnail

    Glasswall Halo

     Info
    Sold by: Glasswall 
    Halo is a cloud-native Content Disarm and Reconstruction (CDR) solution that provides security teams with infinitely scalable zero-trust file protection that removes an organization's reliance on detection.
    Listing Thumbnail

    Glasswall Halo

     Info
    Sold by: Glasswall 

    Overview

    Play video

    What is Glasswall CDR?

    Glasswall Content Disarm and Reconstruction (CDR) employs our patented 4-step approach to protect organizations and individuals against file-based threats. Unlike most conventional cyber-security solutions, Glasswall CDR does not rely on detection capabilities. Instead, we follow a zero-trust approach, where only files that have been processed by Glasswall are considered secure. We do not try to identify malicious code, our technology simply removes the ability for it to exist in the document.

    All files processed by the Glasswall Embedded Engine are assumed to be malicious. The engine conducts analysis and rebuilds files back to their known-good manufacturers specification, removing any potential threats lurking in the files structure. The act of correcting deeper-rooted structural content is referred to as remediation, whereas removing content which is configurable through policy management (e.g. hyperlinks in office documents) is referred to as sanitization.

    Why is CDR better than regular antivirus and sandboxing techniques? Next-generation antivirus software and sandboxes require understanding of a threat in order to defend against it. Glasswall CDR rebuilds every file to the known-good manufacturers specification, without the need to have specific threat knowledge, eliminating the risk that malware can be hidden within the files structure.

    Organizations deploying CDR protection do not have to rely on next-generation antivirus or threat intelligence databases, which on average have a protection gap of 18 days for new zero-day threats. Whilst sandbox technology can go beyond relying on hashes and file signatures, and therefore helps to identify novel malware, usability is usually compromised, with business productivity sacrificed for security. Sandboxes are really just instrumented virtual machines. Their success relies on two factors, the first is that the detection of malicious processes is correct. Secondly, the attacker needs to be impatient and launch a suspicious software process whilst the files are still in the Sandbox. These two factors are not guaranteed to happen in isolation or at the same time, illustrating the protection gap that can be left by a Sandbox.

    Use Cases

    Cross Domain Solutions (CDS): Supercharge new and existing cross domain solutions with CDR technology that removes the reliance on detection and data wrapping, replacing it with a zero-trust approach that treats all files as malicious, validating, rebuilding and cleaning each one to a known good standard.

    Glasswall CDR enables government departments and commercial organizations to comply with industry best practice initiatives, such as the NCSCs Pattern for Safely Importing Data, the NSAs Raise the Bar Initiative and the NIST Risk Management framework by the US Department of Commerce.

    Secure file upload portals: Halo can be established at various integration points within an organizations security architecture. It provides security teams with the capability to instantly and automatically remove known and zero-day (unknown) file-based threats to deliver secure, visually identical, and full functioning files to the end user.

    Cloud migration: Glasswall provides organizations and departments with REST endpoints that harness the power of Halos Kubernetes-based architecture. Clients can process large storage containers at massive scale and at lightning speed, ensuring only safe, clean and fully-functioning files transfer across networks.

    Isolated networks: Our patented CDR technology has a zero-trust approach to file protection and does not require an active line for updates. Instead, it assumes all files are malicious, ensuring maximum protection is provided against file-based threats while network insolation is maintained.

    Industry critical compliance: Our CDR technology enables compliance with industry guidelines such as the NCSCs Pattern for Safely Importing Data, the NSAs Raise the Bar Initiative and the NIST Risk Management framework by the US Department of Commerce.

    In addition, our CDR technology boasts patented and industry-leading features, such as word search and redact, metadata removal and image analyzer.

    Highlights

    • Zero-trust file protection for 85+ supported file formats and counting.
    • Virtual appliance deployment options for custom or air-gapped environments. OVA and VHD images are based on hardened (DoD STIG) Red Hat Enterprise Linux and RKE2 (or RKE Government) with CIS Kubernetes Benchmark 1.6 conformance.
    • Deep file inspection, beyond artefacts such as the so-called magic number, to accurately report what file data suggests about the true file type.

    Details

    Delivery method

    Delivery option
    64-bit (x86) Amazon Machine Image (AMI)

    Latest version

    Operating system
    Rhel 9.0

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Glasswall Halo

     Info
    Pricing and entitlements for this product are managed outside of AWS Marketplace through an external billing relationship between you and the vendor. You activate the product by supplying an existing license purchased outside of AWS Marketplace, while AWS provides the infrastructure required to launch the product. Subscriptions have no end date and may be cancelled any time. However, the cancellation won't affect the status of an active license if it was purchased outside of AWS Marketplace.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    Additional AWS infrastructure costs

    Type
    Cost
    EBS General Purpose SSD (gp2) volumes
    $0.10/per GB/month of provisioned storage

    Vendor refund policy

    https://docs.glasswall.com/docs/halo-refund-policy 

    Please contact support@glasswall.com  for more information about refund requests.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    64-bit (x86) Amazon Machine Image (AMI)

    Amazon Machine Image (AMI)

    An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.

    Additional details

    Usage instructions

    https://docs.glasswall.com/docs/aws-ec2-setup-guide 

    Log in to AWS Navigate to the EC2 service and click Launch instance.

    Name the Instance Enter a name for your instance, e.g., My Halo Instance.

    Select the Glasswall Halo AMI Click Browse more AMIs, search for Glasswall Halo, and select the Glasswall Halo 2.5.4 AMI.

    Choose Instance Type Select an instance type with at least 16 cores and 32GB memory, e.g., c5.4xlarge.

    Set Up a Key Pair Select or create a key pair to securely log in to the instance using a private key.

    Configure Network Settings Choose your desired VPC and subnet.

    Set Up Security Group Create a security group to allow inbound access on: Port 22 for SSH Port 443 for the Halo API

    Update Storage Increase storage to 500GB.

    Launch the Instance Click Launch instance to complete the setup.

    Configure Halo EC2 instance Health Check After launching the EC2 instance, wait 15 minutes for the Halo services to start. Visit https://<ip-address> in a browser to check if the Glasswall Halo portal is running. Access Halo APIs via the Swagger portal at https://<ip-address>/swagger/index.html. You are now ready to use the Glasswall Halo Portal and API.

    License Management Set up a license by following the steps at Glasswall License Management Guide.

    Support

    Vendor support

    To obtain Support Services, Glasswall Customers must raise a service request ticket with the customer support team. The Customer can raise a Ticket 24/7 and the number of tickets that can be raised by the Customer is not limited.

    The Customer must raise a ticket using one of the following channels: By telephone: +44 (0)203 868 6305 (UK) +1 844 527 7925 (USA) By email: support@glasswall.com 

    The standard support language is English.

    When raising a ticket, the Customer must follow the process and provide the information set out in the Customer Support documentation.

    Glasswall recommends raising a ticket by email for tracking purposes.

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Similar products

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 AWS reviews
    No customer reviews yet
    Be the first to write a review for this product.