It was only a matter of time until that solution became a commodity.

What makes this new approach unique?

It’s a very narrow, closed parameter of things users are doing at work.

Resec Technologies - A New Approach to Cyber Security

It’s as quick as an antivirus, with no latency.

The CDR process produces no false positives, because there’s no need for detection.

How does it work?

Content Disarm and reacconstruction (CDR) - Resec Technologies- A new approach to cyber security

We integrate with active directory to allow policy management per groups.

These will be regenerated according to a set of rules determined by the organization.

Let’s say a PDF contains a url for example.

Content Disarm and reacconstruction (CDR) - Resec Technologies- A new approach to cyber security

We are able to check and modify it, erase it or turn it into text.

This is a specific example of regeneration.

After that, the file is transferred to the user safely.

Content Disarm and reacconstruction (CDR) - Resec Technologies- A new approach to cyber security

What happens when malicious content is identified?

CDR does not identify malicious content.

Rather, it clears elements which have the potential to be malicious.

Article image

It’s a prevention method that doesn’t rely on detection.

How easy is it to deploy ReSec, and does it integrate with existing systems?

ReSecure can also integrate with FTP or as a directory watcher.

Article image

Thousands of files can be transferred per hour.

Deployment can also be done to integrate with existing detection solutions like sandboxes.

This helps structure specific work flow in the way the organization decides.

Article image

Management is also relatively simple.

We define a set of rules and a group of users that the rules apply to.

Typically, we see four types of policies depending on the enterprise’s needs.

Article image

We integrate with SIEM systems, which generates all information for the monitoring tool.

Users can simply log into their dashboard and view information about traffic going by in real time.

Do you have any new features planned in the near future?

Article image

Using CDR in this fashion will allow us to create insights about the content being processed.

We currently have about 40+ enterprises using our solution.

What is your personal perspective on cyber security?

Content Disarm and reacconstruction (CDR) - Resec Technologies- A new approach to cyber security

The cyber security market is thriving, with many vendors doing amazing things to battle the ever growing risks.

CISOs and IT managers need to constantly reevaluate the threat landscape and the organizations weaknesses.

My tip for those individuals is: Determine exactly what is it you’re looking for.

If you need a connection solution, how will you implement it?

What is your goal?

What are the powerful tools you will use to enable identification and more importantly, prevent the threats?

There are no silver bullets so be skeptical of those who have a go at sell you one.

kindly, comment on how to improve this article.