Resource Center

Knowledge Base

A Complete Guide to Content Disarm and Reconstruction (CDR) Technology

Have you ever heard of Content Disarm and Reconstruction, Content Disarm and Reconstruct, or CDR? If you have, you might recognize these are are all terms used for a technology that can eliminate all file-borne threats. Keep reading as we provide an overview of what CDR is, how it’s used, the history and evolution of...
Case Studies
Featured Resource

Votiro & Microsoft 365: International Football League

An international football league has established regular email communication processes with distributed clubs. They needed a way to ensure no malicious threats, known or unknown, could harm their organization through email files or attachments. A zero day attack could severely harm the reputation of the organization and its players. They decided to protect their organization...
Case Studies
Featured Resource

How Votiro Blocked a Weaponized Password-Protected Zip File

Download the case study to learn how Votiro's Positive Selection technology blocked this attack.
Case Studies
Featured Resource

How Votiro Ensured File Security for a Medical Platform

There is No Room for Error in the Healthcare Industry When it comes to the medical space, security will always be a top concern. And for one Medical Cloud Platform, it was time to put a stronger strategy in place.  This Medical Cloud Platform allows healthcare organizations – including physicians, hospitals, health insurance companies, diagnostic...
Case Studies
Featured Resource

How CDR Technology Stopped a Hospital Cyber Attack

ALYN Woldenberg Family Hospital (ALYN Hospital) is a Jerusalem-based rehabilitation center for physically challenged and disabled children, adolescents and young adults. ALYN’s holistic approach, incorporating the treatment of physical symptoms, as well as taking into account the emotional and communal needs of the children and their families, has proven itself throughout the eight decades since...
Case Studies
Featured Resource

How We Prevented Malware Attacks at Hachshara Insurance

Handling as many as 300,000 incoming files each month, Hachshara receives claims forms, identification documents, and other mixed media from clients on a daily basis. With customer-facing services enabling incoming files via email and website upload, the risk of zero-day and other file-borne attacks presented a real challenge. Having no designated protection against file-borne threats,...
Case Studies
Featured Resource

One Bank’s Success with Votiro Cloud for Email API

Seeking an innovative, best-of-breed solution to defend its email gateway, one bank had equipped itself with one of the best-known mail relay servers and a leading sandbox solution to detect all threats attempting to penetrate the bank’s network. On top of those, the bank had also licensed Votiro’s Cloud for Email API.
Case Studies
Featured Resource

How FedEx, UPS & DHL Customers were Tricked by Advanced Phishing

Just a few months ago, Votiro discovered a cleverly disguised, multi-stage phishing campaign targeting UPS, FedEx, and DHL customers. Download the case study, How FedEx, UPS & DHL Customers were Tricked by an Advanced Phishing Campaign to view the emails and Excel attachments from the phishing campaign. The case study also covers: What made these...