词条 | Content Disarm & Reconstruction |
释义 |
It is used to prevent cyber security threats from entering a corporate network perimeter. Channels that CDR can be used to protect include email and website traffic. Advanced solutions can also provide similar protection on computer endpoints, or cloud email and file sharing services. ApplicationsCDR works by processing all incoming files of an enterprise network, deconstructing them, and removing the elements that do not match the file type's standards or set policies.[2] CDR technology then rebuilds the files into clean versions that can be sent on to end users as intended.[3] Because CDR removes all potentially malicious code, it can be effective against zero-day vulnerabilities that rely on being an unknown threat that other security technologies would need to patch against to maintain protection. CDR can be used to prevent cyber threats from variety of sources:
Commercial availabilityCDR or similar file sanitization technology is commercially available from a number of companies (sorted A-Z):
See also
References1. ^{{cite web | url=http://www.csoonline.com/article/3061220/leadership-management/why-better-security-prevention-that-doesn-t-rely-on-detection-is-possible.html | title=Why better security prevention that doesn’t rely on detection is possible | work=CSO Online | date=April 25, 2016 | accessdate=August 16, 2016 | author=Santarcangelo, Michael}} 2. ^{{cite web | url=https://www.gartner.com/imagesrv/media-products/pdf/proofpoint/proofpoint-1-32WKFK7.pdf | title=Why Today's Phishing Attacks are Harder to Detect and How Proofpoint Can Help | work=Proofpoint | accessdate=August 16, 2016}} 3. ^{{cite web |last1=Yeroslav |first1=Yakov |title=File-Based Malware: Considering A Different And Specific Security Approach |url=https://www.informationsecuritybuzz.com/articles/file-based-malware-considering-a-different-and-specific-security-approach/ |accessdate=9 October 2018}} 4. ^{{Cite web|url=https://www.checkpoint.com/products/threat-extraction/|title=Threat Extraction Ensures Malware Free Documents|website=Check Point Software|language=en-US|access-date=2018-12-30}} 5. ^{{Cite web|url=https://www.deep-secure.com/|title=Deep Secure {{!}} Content Threat Removal|website=Deep Secure|language=en|access-date=2018-12-30}} 6. ^{{Cite web|url=https://help.fortinet.com/fos60hlp/60/Content/FortiOS/fortigate-whats-new/security-content-disarm.htm|title=FortiGuard content disarm and reconstruction|website=help.fortinet.com|language=en-us|access-date=2018-12-30}} 7. ^{{Cite web|url=https://www.glasswallsolutions.com/|title=Advanced Threat Protection (ATP) Security Software: Detect, Prevent, Protect.|website=Glasswall Solutions|language=en-GB|access-date=2018-12-30}} 8. ^{{Cite web|url=https://en.jiransecurity.com/|title=Global Jiransecurity|website=Partner Portal Service|access-date=2018-12-30}} 9. ^{{Cite web|url=https://www.nospamproxy.de/en/|title=NoSpamProxy by Net at Work: Proactive, real-time protection against spam, malware and ransomware.|website=NoSpamProxy|language=en-GB|access-date=2019-02-14}} 10. ^{{Cite web|url=https://www.peraton.com/who-we-are/}} 11. ^{{Cite web|url=https://resec.co/|title=ReSec Technologies: Malware prevention that doesn't depend on detection|last=alonpo|website=ReSec|language=en-US|access-date=2018-12-30}} 12. ^{{Cite web|url=https://odi-x.com/|title=ODI - Content Disarm & Reconstruction|last=|first=|date=|website=ODIX Content Disarm and Reconstruction (CDR)|language=en-US|archive-url=|archive-date=|dead-url=|access-date=2018-12-30}} 13. ^{{Cite web|url=https://www.opswat.com/products/metadefender|title=MetaDefender - Advanced Threat Prevention Platform|website=www.opswat.com|language=en-us|access-date=2018-12-30}} 14. ^{{Cite web|url=https://resec.co/}} 15. ^{{Cite web|url=http://www.sasa-software.com/|title=Sasa Software : Content Disarm and Reconstruction (CDR)|website=Sasa Software : Content Disarm and Reconstruction (CDR)|language=en-US|access-date=2018-12-30}} 16. ^{{Cite web|url=http://www.shieldex.biz/|title=CDR Solution|website=SOFTCAMP CDRㅣContent Disarm & Reconstruction|language=en|access-date=2018-12-30}} 17. ^{{Cite web|url=https://www.votiro.com/|title=Votiro Disarmer Takes Cyber Security to the Next-Generation|language=en-US|access-date=2018-12-30}} 18. ^{{Cite web|url=https://yazamtech.com/|title=YazamTech - Securing Your Network from Infected Files|website=YazamTech|language=en-US|access-date=2018-12-30}} {{DEFAULTSORT:Content Disarm and Reconstruction}} 2 : Computer security|Cloud computing |
随便看 |
|
开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。