Resource Center

Knowledge Center

SANDBOX EVASION USING VBA REFERENCING

The sandbox, last line of defense for many networks, isn’t what it used to be. Watch Votiro’s researcher, Amit Dori, shows how attackers can bypass sandbox security, inserting malicious code on servers without getting flagged, by taking advantage of basic rules of how VBA (Visual Basic for Applications) macros and sandboxes operate. If once a...
Knowledge Center
Featured Resource

What is Threat Extraction? And How It Can Prevent Malware from Hiding In Your Files

What is threat extraction? Threat Extraction is a security technology that protects organizations against known and unknown threats hidden within documents by removing malicious content. Threat extraction is also known as file sanitization or Content Disarm and Reconstruction (CDR).  Threat extraction comes in multiple forms. In general, threat extraction does not rely on detection to...
Knowledge Center
Featured Resource

What is a Zero Trust Security Model?

A zero-trust security model is a framework that starts by assuming all users, devices, and applications are compromised. In response, the model requires continuous user and device authentication, authorizations, and security validation before allowing them to connect to networks, applications, and data.  When everyone was connected to local area networks (LAN), simply logging into the...
Knowledge Center
Featured Resource

Votiro Cloud for Web Browser API Short Demo

Votiro Cloud for Web Browser API enables employees to safely download files from Chrome and Edge browsers, without risk of hidden threat or breach. Let your employees surf, download, and click without fear – and without friction: Files download in milliseconds No impact to files fidelity or user experience Protects 150+ file types, including zip...
Knowledge Center
Featured Resource

What is Malware? How to Prevent & the Different Types

With so much news about malware, organizations everywhere are working to protect their systems, networks, software, and devices from infection. However, many are still primarily relying on detection-based solutions that malware can easily evade. Now more than ever, it’s important that organizations implement a malware prevention strategy that focuses on proactive defenses. Learning how to...
Knowledge Center
Featured Resource

Votiro Cloud for Email API Short Demo

Watch the 4 minute Votiro Cloud for Email API demo below. Schedule a demo to see the full product in action.
Knowledge Center
Featured Resource

What is File Sanitization? Everything to Know

Ransomware continues to plague companies as the remote and hybrid workforce models leave new attack vectors. Research notes a 715% year-over-year increase in ransomware during 2020. Now that most disaster recovery and business continuity plans include robust data backup strategies, cyber attackers use a combined ransomware approach that both encrypts data and steals data. The...
Knowledge Center
Featured Resource

Active Content: What It Is & How It Becomes Malicious

Modern business processes rely on sharing information across the cloud. Your users are emailing documents and uploading files to shared drives as part of their jobs. Ensuring safe, secure, clean files is now mission-critical.  Employees know that they shouldn’t open attached files when they don’t know the person sending them, but phishing emails aren’t the...
Knowledge Center
Featured Resource

What is a Secure Email Gateway? Your Complete Guide

This article will focus on Secure Email Gateways, explaining the benefits of this technology as well as raising awareness about its drawbacks. With 3.9 billion global email users in 2019 – and that number projected to rise to 4.48 billion by 2024 – email has become the channel of choice for hackers seeking to carry...
Knowledge Center
Featured Resource

A Complete Guide to Content Disarm and Reconstruction (CDR) Technology

Have you ever heard of Content Disarm and Reconstruction, Content Disarm and Reconstruct, or CDR? If you have, you might recognize these are are all terms used for a technology that can eliminate all file-borne threats. Keep reading as we provide an overview of what CDR is, how it’s used, the history and evolution of...