The document discusses cybersecurity threats facing organizations and how traditional antivirus solutions are often unable to stop advanced malware. It introduces Glasswall's Content Disarm and Reconstruction (CDR) technology, which regenerates files to remove risks like malware while preserving file contents. CDR analyzes files at the visual, functional, and structural layers to sanitize them according to policy. This allows Glasswall to stay ahead of evolving threats unlike antivirus solutions.
2. The threats organisations face
of organisations say
threats they see can’t be
stopped by anti-virus
solutions
Almost all email-based
cyber attacks begin with
luring employees into
clicking on malicious
content
of advanced malware
launches by opening an
attachment
Every 4.2 seconds a new
variant of malware is
created
Malware morphs and spreads at such a rate that
malicious files are often missed, with disastrous
consequences for organisations
Antivirus and sandboxing technologies seek to
identify and remove dangerous files by focusing
on the ‘known bad’, leaving them a step behind
bad actors
Source: Verizon Source: G DataSource: Cisco 2018
Cyber Security Report
69% 66% 4.2s
Source: Proofpoint 2019
Human Factor Report
1
3. The threats organisations face
The National Cyber Security Centre (NCSC) reports that the average
cost of a cyber security breach is between $0.8m - $1.3m
$0.8m - $1.3m
$133,000
Ransomware attacks (a variant of malware) cost businesses on
average $133,000 per incident, according to the latest ‘State of
Endpoint Security’ survey
$300m
In 2017, Maersk lost $300m due to disruption to operations and
destroyed servers caused by ransomware
$130m
In 2017, a ransomware attack cost the UK’s National Health Service
over $130m
$140m
In January 2020, Travelex lost $140m from one month of suspended
trading caused by ransomware
2
4. Our solution Content, Disarm and
Reconstruction (CDR)
Glasswall regenerates files and
documents to a standard of ‘known
good’, delivering proactive protection.
We remediate file structures back into
line with their published specification
and remove risky Active Content by
policy. This technology is referred to by
Gartner as Content, Disarm and
Reconstruction (CDR).
Files are regenerated in milliseconds
in their original file format with the
visual content completely
untouched.
No blocking, no patching and no
false positives that hold back
important business documents. Only
safe, secure and trusted files.
By regenerating a file to a safe
standard of ‘known good’ we are
always ahead of bad actors, whereas
antivirus solutions are always, at
best, one step behind.
3
5. How it works
Visual
Content layer
This is the layer
presented to the
viewer, the only layer
you see
Functional layer
RISKS:
DOE Ransomware, Malicious
Macro & JavaScript,
Corrupted Acroform and
Phishing URLs
File is threat
free, and now
conforms to a
safe and
trusted
standard
Text, graphics and
formatting are lifted up
Words, context and visual
appearance are in stasis
during regeneration process
Sanitisation
Policy Applied
Removal of DDE, Macros,
JavaScript,Embedded
Files, URL links &
Acroforms
File Structure
Remediation
Fie is regenerated back to
the original. threat-free file
specification, as designed
by the manufacturer
DEEP-FILE INSPECTION REMEDIATION & SANITISATION TECHNOLOGY
File Structure layer
RISKS:
Sophisticated APTs,
Advance ‘File-less’
Malware, Hidden
Malicious Scripts
Visual
Content layer
The user receives an identical
document with complete
integrity and no loss of
resolution
Functional
layer
Controlled by policy, the
customer has total flexibility to
remove unnecessary functional
features in files
File
Structure layer
File is threat-free and now
conforms to a safe and trusted
standard
4
6. What Gartner says about CDR
“CDR neutralises all potentially
malicious content, without
requiring multiple antivirus
scanning or sandboxing.”
“We expect CDR will
ultimately be considered
a best practice.”
“CDR is an important layer
in any organisation’s
defence and content
protection strategies.”
“CDR should be evaluated as
an effective means of
thwarting content borne
attacks.”
“CDR’s near-real-time process is
an effective approach to
removing malware and other
exploits from files.”
“CDR can eliminate one of the
most common infection vectors
that is hard to deal with in other
ways.”
Gartner Benefit Rating:
High
Two to five years to
mainstream adoption
5Source: Gartner ‘Hype Cycle For Network Security’ report, June 2020
7. Competitive advantage
The best file
regeneration rates
in the CDR field
The most resilient
CDR engine
available
The most
comprehensive
remediation
of files
World-class efficiency
of integration and
agility in technical
alliances and projects
Glasswall came out on top in
an NSA assessment of CDR
vendors
6
9. Rebuild SDK
What it is
▪ Software Development Kit for on-premise file regeneration
How it’s deployed
▪ Integrated on-premise into any business process where files are shared or stored
▪ Integrated as a value-added feature into Third Party technologies
Use cases
Guards and Cross Domain Solutions deployed by governments and intelligence agencies
Document sharing and management for government and larger commercial organisations
Hardware integrations, including data diodes, file gateways, USB sanitisers and other file
security devices
8
10. Rebuild for Email (on-premise)
What it is
▪ Regenerates inbound email attachments to a clean, safe standard
How it’s deployed
▪ Installed on virtual machines and databases within the client’s own IT infrastructure
▪ Maintained and managed by the client’s own IT team
Use cases
Preferred by larger and more security-conscious organisations that have their own
messaging infrastructure on-premise, rather than in the cloud
While many larger organisations are now moving to the cloud, a significant number still have
their own messaging infrastructure on-premise
9
11. Rebuild for Email (cloud-hosted)
What it is
▪ Launched in October 2019
▪ Regenerates inbound email attachments to a clean, safe standard
How it’s deployed
▪ Hosted on Microsoft Azure with regional data centres in the UK and US
▪ Maintained by Glasswall and managed by the client’s IT team through a web-based User
Interface
Use cases
Protects attachments for any organisation using a public cloud for email infrastructure
Includes the vast majority of small, medium and increasingly, large businesses
Integrates seamlessly with any cloud-hosted email service, including O365, Exchange Online
and G-Suite
10
12. Rebuild API
What it is
▪ Launched in May 2020
▪ AWS-hosted version of Rebuild SDK
▪ Available in a shared or dedicated cloud environment
How it’s deployed
▪ Integrated into any business process where files are shared or stored
▪ Rebuild API file processing can also be purchased via the Glasswall Store
Use cases
Document management systems for small and medium-sized businesses
Customer portals for safe upload of KYC and AML information
Safe data import for file-heavy projects
11
13. Rebuild ICAP server
What it is
▪ Developed for US Cyber Command in July 2020
▪ Internet Content Adaptation Protocol (ICAP) implements file regeneration for Proxy Servers
▪ Protects users and systems from malicious web content
How it’s deployed
▪ Integrates into existing company proxy solutions via ICAP
▪ Rebuild ICAP Server can be deployed on-premise or in the cloud
Use cases
Protects file sharing platforms, including Teams, OneDrive, SharePoint, Dropbox and Google
Drive
Protects the upload or download of files from websites and specific domains
12
17. A selection of existing OEM partnerships
Use Cases and Integration Options
HTTP UPLOADS AND DOWNLOADS
Secure files transferred between devices and networks,
ensuring security at the ingress points and high levels of
trust of the organisation at the egress points
FILE GATEWAYS
Secure files as they enter, rest or leave
storage facilities
DEVICE-TO-DEVICE
Small footprint allows Glasswall to be integrated
into lightweight or mobile OS
DOCUMENT MANAGEMENT SYSTEMS
Ensures incoming and outgoing files will be clean and safe, and
archived documents will function correctly when retrieved
16
18. The Team
DANNY LOPEZ
CEO
Previously with:
Blippar; UK Foreign Office; London
& Partners; and Barclays Bank
DINIS CRUZ
CTO & CISO
Previously with:
Revolut; Photobox Group; Piaget
Institute
STEVE ROBERTS
CFO
Previously with:
Tellimer Group; GFI Group Inc, The
Kyte Group
ANNE TIEDEMANN
SVP People
Previously with:
Kroll; G4S plc
SAM HUTTON
SVP N America
Previously with:
Fidessa
NICK BLOOM
SVP EMEA
Previously with:
Beanstalk; Crumpton Group; Saatchi & Saatchi
PAUL BURKE
SVP Customer Solutions
Previously with:
Citrix; AVG Technologies; Trend Micro,;
Centrix Software
LUKE ROBBERTSE
Head of Technology Operations
Previously with:
Derivco
17
19. The Board
SIR NIGEL KNOWLES
Chairman DWF and former
Chairman DLA Piper
MICHAEL SPENCER
Founder of ICAP and NEX
Group. Chairman IPGL
CATE PYE
Senior Partner, PA Consulting
& lead on Cyber Security
Transformation
SIR PETER WESTMACOTT
Former British Ambassador to
the US, France and Turkey
STAN BLACK
Former CISO at Citrix
SIR IAIN LOBBAN
Glasswall Advisory Board Chairman
Former GCHQ Director
18
20. Recognition and awards
Finalist
Best Email Security
Winner
Best Email Security Solution
Winner
Best IT Email Security Solution
Winner
Security Innovation of the Year
Winner
Best Email Security Solution
Winner
Innovation
Winner
at British Legal
Technology Awards 2019
19