Why Content Disarm and Reconstruction ?

If you have, you might recognize these are all terms used for a technology that can eliminate all file-borne threats.

Keep reading as we provide an overview of what CDR is, how it’s used, the history and evolution of the technology, its pros and cons, and how a new technology, takes CDR to the next level in both security and user experience.

Content Disarm and Reconstruction (CDR) is a security technology that depending on the type of CDR involved, flattens malicious files, removes active content or cleanses malicious code from files. Also known as file sanitization, CDR has multiple forms. In general,

CDR does not need to rely on detection to prevent threats.

Instead of relying on databases of known signatures, the technology assumes all files are malicious and scrutinizes all files that are outside of the approved firewall.

Depending on the type of CDR, which is explained in detail below, content disarm and reconstruction can remove malware, strips any embedded code, and rebuilds the file in a way that disrupts any additional covert malicious code.

The end result of using CDR technology is:

• A flattened file delivered as a safe but unfunctional PDF

• A file with active content, macros, and other malicious and safe content removed

• A safe copy of the original file on a clean template, with all functionality intact