AI-Powered Cyberattacks: How to Detect, Prevent & Defend Against Intelligent Threats

Read Now
We utilize artificial intelligence for site translations, and while we strive for accuracy, they may not always be 100% precise. Your understanding is appreciated.

Deep CDR

File Regeneration that Protects from Evasive Malware and Zero-Day Exploits

Traditional antivirus solutions miss unknown threats. Deep CDR eliminates them entirely. Each file is disarmed and regenerated, ensuring only safe, clean and useable content reaches your systems.

Processes Files in Milliseconds

Supports Embedded Objects

Sanitizes 200+
File Types

200+
File Conversion Options

Recursively Scans Archives

Tailored Security Policies

Here’s Why Deep CDR Matters

Insufficient Protection

AI and heuristic-based anti-malware solutions don’t disarm all file-based threats.

Undetected Threats

Zero-day threats, targeted attacks, and evasive malware may go undetected by antivirus engines.

Evasive Malware Tactics

Evasive malware avoids detection by using obfuscation techniques like steganography to deliver compressed, archived, or encrypted payloads.

Macro and Script Limitations

Outright bans on macros in Office docs and JavaScript in PDFs are difficult to enforce and may limit vital functionality.

Incomplete Archive Scanning

Traditional CDR solutions are incapable of recursively scanning archives and zip files.

How It Works

By focusing on prevention rather than just detection, Deep CDR enhances anti-malware defenses, protecting organizations from file-based attacks, including targeted threats. It neutralizes potentially harmful objects in files traversing network traffic, email, uploads, downloads, and portable media before they reach your network.

Step 1

Evaluate & Verify

Step 1

Evaluate & Verify

The file type and consistency are evaluated, ensuring the correct file extensions to prevent file masquerading attacks.

Step 2

Create & Hold

Step 2

Create & Hold

A placeholder file is created to securely hold approved content during the sanitization process.

Step 3

Disarm & Rebuild

Step 3

Disarm & Rebuild

The original file is disarmed, and approved objects are moved into the placeholder, preserving the original file’s structure before regenerating usable components like pointers and tables.

Step 4

Test & Validate

Step 4

Test & Validate

The regenerated file undergoes integrity testing to ensure it remains fully functional and threat-free.

Step 5

Quarantine & Protect

Step 5

Quarantine & Protect

The original file is quarantined for security and further analysis, preventing any residual threats from accessing the network.

  • Step 1

    Evaluate & Verify

    The file type and consistency are evaluated, ensuring the correct file extensions to prevent file masquerading attacks.

  • Step 2

    Create & Hold

    A placeholder file is created to securely hold approved content during the sanitization process.

  • Step 3

    Disarm & Rebuild

    The original file is disarmed, and approved objects are moved into the placeholder, preserving the original file’s structure before regenerating usable components like pointers and tables.

  • Step 4

    Test & Validate

    The regenerated file undergoes integrity testing to ensure it remains fully functional and threat-free.

  • Step 5

    Quarantine & Protect

    The original file is quarantined for security and further analysis, preventing any residual threats from accessing the network.

Core Benefits

Comprehensive

Protection from out-of-policy or potentially malicious code, with support for a wide range of objects beyond just macros.

Powerful

Enough to defeat obfuscation techniques, including steganography, by removing potential threats.

Reliable

Threat removal for complex files that maintains file usability

Flexible

Configuration enables allowlisting, removing, or examining active content such as macros or URLs.

In-Depth

Reporting of sanitized components and forensic data for malware analysis.

Efficient

Enough to disarm and regenerate new, usable files in milliseconds.

See It in Action

Zero-day Protection

Effectively eliminate zero-day targeted attacks by relying on prevention rather than detection

Deep CDR

Real-time data enhances visibility and control.

Sanitized Objects

Object listing enhances visibility into all processed objects within a sanitized file.

Customizable Action

Customize how potentially harmful objects are handled to align with your specific goals.

File Type Verification

Object listing enhances visibility into all processed objects within a sanitized file.

Deep Diagnostic Data Export

Deep CDR technology returns detailed forensic info for the disarmed files.

  • Zero-day Protection

    Effectively eliminate zero-day targeted attacks by relying on prevention rather than detection

  • Deep CDR

    Real-time data enhances visibility and control.

  • Sanitized Objects

    Object listing enhances visibility into all processed objects within a sanitized file.

  • Customizable Action

    Customize how potentially harmful objects are handled to align with your specific goals.

  • File Type Verification

    Object listing enhances visibility into all processed objects within a sanitized file.

  • Deep Diagnostic Data Export

    Deep CDR technology returns detailed forensic info for the disarmed files.

Explore 200+ Supported File Types

Explore the file types below and click through to see performance data, supported versions and review sample files.

Deployment Options

MetaDefender Cloud

Easy scalability, 24/7 availability, and minimal overhead

MetaDefender AMI

Deployment in your AWS account to process files

MetaDefender Core

Ideal for on-premises deployments with strict constraints

Deep CDR Reports & Diagnostics

Customers Talk about Deep CDR

  • “We believe that OPSWAT and FileZen S are indispensable to our city in order to conduct operations that are safe and do not compromise efficiency.”

    Sho Sawada
    Chief of ICT Promotion Section , Planning and Finance Department, Muroran City Hall
  • “...OPSWAT’s Deep CDR gives us the broadest list of supported files, the best integrations to third parties, and the easiest management interface.”

    Tamir Shahar
    Infrastructure Architect, Clalit Health Services
  • "With OPSWAT’s MetaDefender [Email Security] in place, every entry point is covered.... Knowing that no malicious content can enter our network gives us peace of mind."

    Guy Elmalem
    IT and Cyber Infrastructure Manager, Hapool Insurance
  • “OPSWAT’s was far superior compared to the sanitization engines proposed by other companies.”

    Kouji Daicho
    Senior Manager of the Information System Section,
    Digital Promotion Office, Fuji City
  • “With a CDR solution [like OPSWAT], we can be sure that files uploaded to our platform are clean of all malware.”

    Tamir Ronen
    Chief Information Security Officer, HiBob
  • “We rigorously evaluated Deep CDR's capabilities, focusing on its ability to pre-empt disruptions to productivity, safeguard data integrity...”

    Simon Edwards
    CEO and founder of SE Labs
  • “You have to control what goes onto your network, period. It's going to take holistic solutions like OPSWAT... to reduce that threat.”

    Brian Feucht
    President, Unique Wire

Recommended Resources

  • Blog

    How Base64 Encoding Opens the Door for Malware

    This article details Base64 encoding as a technique to obfuscate HTML smuggled payloads. We examine the difficulties inherent in detecting Base64-encoded threats and how organizations can implement robust defenses against this tactic using OPSWAT advanced threat prevention solutions.

  • Blog

    How Emerging Image-Based Malware Attacks Threaten Enterprise Defenses

    OPSWAT Deep Content Disarm and Reconstruction (CDR) prevents stealthy image-based attacks by sanitizing image files, removing any potentially malicious code and reconstructing them so they can be safely used in any digital environment.

  • Blog

    Stop QR Code Phishing - Protect Critical Infrastructure

    Nineteen years after their development, QR codes have progressed from niche barcode alternatives to enabling trillions of dollars in financial transactions. They connect the physical and digital worlds. Now, they're used to attack critical infrastructure….

  • Blog

    Is there anything you can do about Follina?

    Microsoft Office Zero-Day Vulnerability Abused To Execute PowerShell On May 27, 2022, a zero-day remote code execution bug in Microsoft Office was discovered by Nao_Sec (1) and dubbed "Follina" by...

  • Blog

    Deep CDR prevents Advanced Maldoc Techniques - VBA Stomping

    Macros remain the most popular vector for malware and payload delivery. In fact, malware authors are switching to attack methodologies that leverage MS Office and script-based threats. There was a...

  • Blog

    BLINDINGCAN: A New Trojan Strain Abusing Microsoft Attached Document Template

    The US Federal Bureau of Investigation (FBI) and Cybersecurity and Infrastructure Security Agency (CISA) have published Malware Analysis Report (AR20-232A) warning of a new strain of malware named...
  • Blog

    Automating Content Disarm and Reconstruction (CDR) Testing with OPSWAT Visual Comparison

    Deep Content Disarm and Reconstruction (Deep CDR) is an advanced threat prevention technology. Unlike detection-based methods, Deep CDR is designed for eliminating all potential malicious...

  • Blog

    Preventing Evasion Techniques in Excel Files with Deep CDR

    Originally published on June 05, 2020.Malware is ever-evolving, and so are malware evasion techniques. In a study conducted by the University of Genoa which analyzes 180,000 Windows malware...

  • Blog

    67 Reasons Why You Need Deep CDR

    Tuesday, October 15th wasn’t patch 2’s-day for Adobe, it was patch 67-day for Acrobat and Reader. The good news is that out of the 67 patched vulnerabilities, 23 of them were not critical—they...

  • Blog

    Questions to Ask When Selecting a CDR Vendor

    Content Disarm and Reconstruction (CDR) is an advanced threat prevention technology increasingly used by organizations as part of their zero-trust security approach to protect against both known and...

  • Blog

    Deep CDR brought to you by OPSWAT and F5

    Author: Laura Arciniegas Deep Content Disarm and Reconstruction can be considered a proactive security tool that will allow you to accept productivity files while eliminating the risk of hidden...

  • Blog

    Deep CDR Sanitizes Hidden Threats in an archive file

    Cybercriminals usually choose archive files to conceal malware and distribute infections. A statistic shows that 37% of detected malicious file extension is an archive, which is quite similar to...
  • Customer Story

    Protecting an Automotive Manufacturer from File-Borne Threats

    Securing File Scanning, Transfers, and Visitor Management for a Global Automotive Manufacturer with OPSWAT Solutions

Learn How Deep CDR Protects Your Organization from File-Borne Attacks