CDR works by processing all incoming files of an enterprise network, deconstructing them, and removing the elements that do not match the file type's standards or set policies.3 CDR technology then rebuilds the files into clean versions that can be sent on to end users as intended.4
Because CDR removes all potentially malicious code, it can be effective against zero-day vulnerabilities that rely on being an unknown threat that other security technologies would need to patch against to maintain protection.
CDR can be used to prevent cyber threats from variety of sources:
CDR can be applied to a variety of file formats including:
Santarcangelo, Michael (April 25, 2016). "Why better security prevention that doesn't rely on detection is possible". CSO Online. Retrieved August 16, 2016. http://www.csoonline.com/article/3061220/leadership-management/why-better-security-prevention-that-doesn-t-rely-on-detection-is-possible.html ↩
Zaw, Nyan Tun; Soh, Ken (2021-08-18). "Why is CDR / CDNR so important?". Retrieved 18 August 2021. https://athenadynamics.com/why-is-cdr-cdnr-so-important/ ↩
"Why Today's Phishing Attacks are Harder to Detect and How Proofpoint Can Help" (PDF). Proofpoint. Retrieved August 16, 2016. https://www.gartner.com/imagesrv/media-products/pdf/proofpoint/proofpoint-1-32WKFK7.pdf ↩
Yeroslav, Yakov (2018-07-11). "File-Based Malware: Considering A Different And Specific Security Approach". Retrieved 9 October 2018. https://www.informationsecuritybuzz.com/articles/file-based-malware-considering-a-different-and-specific-security-approach/ ↩
"DocBleach". GitHub. Retrieved 2019-05-30. https://github.com/docbleach/DocBleach/wiki/ ↩
"ExeFilter". decalage.info. Retrieved 2019-05-30. https://www.decalage.info/exefilter ↩