Resource Center

Knowledge Base

A Complete Guide to Content Disarm and Reconstruction (CDR) Technology

Have you ever heard of Content Disarm and Reconstruction, Content Disarm and Reconstruct, or CDR? If you have, you might recognize these are are all terms used for a technology that can eliminate all file-borne threats. Keep reading as we provide an overview of what CDR is, how it’s used, the history and evolution of...
White Papers
Featured Resource

Ryuk Ransomware & Government Agencies

Cyber extortion has become an attack of choice for hackers. It is estimated that attacks cost the US more than $7.5 billion in 2019 and malware attacks is expected to increase. As of now, U.S. law generally does not prohibit paying a ransom, but this may change in the future. First discovered in mid-August 2018,...
Brochures
Featured Resource

Votiro Cloud for Web Downloads API Datasheet

Do you know what your employees are downloading? Whenever employees download a file, they open your business up to attack. Threats often hide inside innocent-looking files, making them incredibly hard to spot, no matter how much training employees may do. And because today’s detection-based tools aren’t designed to catch every threat, we’re rolling the dice...
Webinars
Featured Resource

How to Prevent Ransomware Instead of Just Detecting It

The first ransomware attack occurred in 1989. In 2020, more than 30 years later, why is ransomware still such a common issue? Despite adopting various technologies and security solutions, attacks are still taking place—and they are getting more severe. In fact, the average ransomware payment has increased 104% in Q4 of 2019 and business interruption...
Featured Resource

A Better Way to Access Websites and Download Files at Your Business

DECEMBER 16, 11:00AM EST Now, more than ever, you have to trust your workforce. To support remote teams, organizations are making greater use of web-based applications, systems, and content portals. But trust alone isn’t enough to keep employees—and the organization—safe. Webpages carry risk of malware delivered through browser exploits, and can flip from good to...
Case Studies
Featured Resource

How CDR Technology Stopped a Hospital Cyber Attack

ALYN Woldenberg Family Hospital (ALYN Hospital) is a Jerusalem-based rehabilitation center for physically challenged and disabled children, adolescents and young adults. ALYN’s holistic approach, incorporating the treatment of physical symptoms, as well as taking into account the emotional and communal needs of the children and their families, has proven itself throughout the eight decades since...
White Papers
Featured Resource

The Biggest Cyber Threat to Healthcare Insurance Companies in 2021

Every incoming file is a risk for health insurance companies. From a benefit claim sent from a hospital to an approval application uploaded from a patient all the way to a report sent from the CEO’s home computer – there is essentially no such thing as a safe file. Because health insurance companies must remain...
Case Studies
Featured Resource

How We Prevented Malware Attacks at Hachshara Insurance

Handling as many as 300,000 incoming files each month, Hachshara receives claims forms, identification documents, and other mixed media from clients on a daily basis. With customer-facing services enabling incoming files via email and website upload, the risk of zero-day and other file-borne attacks presented a real challenge. Having no designated protection against file-borne threats,...
Brochures
Featured Resource

Votiro Cloud for Web Downloads API

Do you know what your employees are downloading? Whenever employees download a file, they open your business up to attack. Threats often hide inside innocent-looking files, making them incredibly hard to spot, no matter how much training employees may do. And because today’s detection-based tools aren’t designed to catch every threat, we’re rolling the dice...
Case Studies
Featured Resource

One Bank’s Success with Votiro Cloud for Email API

Seeking an innovative, best-of-breed solution to defend its email gateway, one bank had equipped itself with one of the best-known mail relay servers and a leading sandbox solution to detect all threats attempting to penetrate the bank’s network. On top of those, the bank had also licensed Votiro’s Cloud for Email API.
Webinars
Featured Resource

Votiro-Thales: Dissecting & Preventing Advanced Phishing Attacks

In this talk, Brent Hansen, Thales TCT’s CTO, and Richard Hosgood, white hat hacker and North American Director of Engineering at Votiro, dissected an April 2020 phishing attack, the gaps that antivirus and next-generation antivirus leave for unknown and zero-day threats, and how an emerging technology called Positive Selection technology can prevent these types of attacks.