Content Disarm and Reconstruction (CDR): OPSWAT Deep CDR

Sector: Enterprise
Testing: May to September 2023

 

Content Disarm and Reconstruction (CDR)

Attacker in the middle?

Content Disarm and Reconstruction targets Trojans

CDR tested for removal of known and unknown threats

SE Labs tested OPSWAT Deep CDR against targeted attacks using file-based threats. These attacks are designed to compromise systems and penetrate target networks by hiding threats inside files that appear to be innocent.

Testers hid threats inside a variety of common file formats, such as office documents, web pages and archive files.

Content Disarm and Reconstruction (CDR) vs. hidden threats

These files were assessed by the CDR system, which attempted to remove known and unknown threats. The results show the extent to which the threat prevention system achieved that goal accurately.

Loader Loading…
EAD Logo Taking too long?

Reload Reload document
| Open Open in new tab

Download [0.98 MB]

Product factsheet:

Read this SE Labs assessment of a Content Disarm and Reconstruction (CDR) solution and discover how it handles well-known threats and targeted attacks.

Sign up to our monthly business and personal security newsletters.

Find out more

Our latest reports, for enterprise, small business and home users are now available for free. Please download them and follow us on LinkedIn to receive news, comment, updates and future reports.

Visit our blog for more security testing news, analysis and the Cyber Security DE:CODED podcast.