Resource Center

Knowledge Center

The Complete Guide to Content Disarm and Reconstruction (CDR)

If you’re familiar with the cybersecurity industry, you may have heard of Content Disarm and Reconstruction, also known as CDR. If so, you might recognize that this term is used to describe technology that can eliminate all file-borne threats, including novel, zero-days that haven’t been identified by antivirus (AV). In this guide, we provide an...
Featured Resource

A Better Way to Access Websites and Download Files at Your Business

DECEMBER 16, 11:00AM EST Now, more than ever, you have to trust your workforce. To support remote teams, organizations are making greater use of web-based applications, systems, and content portals. But trust alone isn’t enough to keep employees—and the organization—safe. Webpages carry risk of malware delivered through browser exploits, and can flip from good to...
Customer Stories
Featured Resource

How CDR Technology Stopped a Hospital Cyber Attack

ALYN Woldenberg Family Hospital (ALYN Hospital) is a Jerusalem-based rehabilitation center for physically challenged and disabled children, adolescents and young adults. ALYN’s holistic approach, incorporating the treatment of physical symptoms, as well as taking into account the emotional and communal needs of the children and their families, has proven itself throughout the eight decades since...
White Papers
Featured Resource

The Biggest Cyber Threat to Healthcare Insurance Companies in 2021

Every incoming file is a risk for health insurance companies. From a benefit claim sent from a hospital to an approval application uploaded from a patient all the way to a report sent from the CEO’s home computer – there is essentially no such thing as a safe file. Because health insurance companies must remain...
Customer Stories
Featured Resource

How We Prevented Malware Attacks at Hachshara Insurance

Handling as many as 300,000 incoming files each month, Hachshara receives claims forms, identification documents, and other mixed media from clients on a daily basis. With customer-facing services enabling incoming files via email and website upload, the risk of zero-day and other file-borne attacks presented a real challenge. Having no designated protection against file-borne threats,...
Product Info
Featured Resource

Votiro Cloud for Web Downloads API

Do you know what your employees are downloading? Whenever employees download a file, they open your business up to attack. Threats often hide inside innocent-looking files, making them incredibly hard to spot, no matter how much training employees may do. And because today’s detection-based tools aren’t designed to catch every threat, we’re rolling the dice...
Customer Stories
Featured Resource

One Bank’s Success with Votiro Cloud for Email API

Seeking an innovative, best-of-breed solution to defend its email gateway, one bank had equipped itself with one of the best-known mail relay servers and a leading sandbox solution to detect all threats attempting to penetrate the bank’s network. On top of those, the bank had also licensed Votiro’s Cloud for Email API.
Webinars
Featured Resource

Votiro-Thales: Dissecting & Preventing Advanced Phishing Attacks

In this talk, Brent Hansen, Thales TCT’s CTO, and Richard Hosgood, white hat hacker and North American Director of Engineering at Votiro, dissected an April 2020 phishing attack, the gaps that antivirus and next-generation antivirus leave for unknown and zero-day threats, and how an emerging technology called Positive Selection technology can prevent these types of attacks.
White Papers
Featured Resource

How to Best Protect Your Enterprise Email from File-Borne Attacks

Many common cybersecurity technologies are powerless in an environment where undisclosed and zero-day attacks abound. With cybercriminals becoming more sophisticated than ever and investing enormous effort in preparing successful targeted attacks through email, a revolutionary approach to cyber protection is required. Download the eBook to learn more. 
White Papers
Featured Resource

How to Plug the Gaps Found in Antivirus, Next-Gen Antivirus and Sandbox File Security

Many organizations believe that utilizing antivirus (AV), next-gen antivirus (NGAV), and sandbox security technologies is the best practice for file security. While these technologies are certainly important for threat prevention, each has its own vulnerabilities that can be exploited by malicious hackers seeking a way to disrupt business activity and make quick money. This eBook...
White Papers
Featured Resource

Malicious Macros: The Holes in Microsoft Software That Hackers Hope You Don’t Know About

A macro is a mini program that is designed to automate a task within a larger program in order to make the user experience faster and easier. Macros are a legitimate and important component of any productivity software, including common Microsoft Office software for creating documents, spreadsheets, and presentations. Unfortunately, these efficiency-drivers are easily compromised...