SlideShare uma empresa Scribd logo
1 de 20
Baixar para ler offline
Safety and Integrity
Through Trusted Files
The threats organisations face
of organisations say
threats they see can’t be
stopped by anti-virus
solutions
Almost all email-based
cyber attacks begin with
luring employees into
clicking on malicious
content
of advanced malware
launches by opening an
attachment
Every 4.2 seconds a new
variant of malware is
created
Malware morphs and spreads at such a rate that
malicious files are often missed, with disastrous
consequences for organisations
Antivirus and sandboxing technologies seek to
identify and remove dangerous files by focusing
on the ‘known bad’, leaving them a step behind
bad actors
Source: Verizon Source: G DataSource: Cisco 2018
Cyber Security Report
69% 66% 4.2s
Source: Proofpoint 2019
Human Factor Report
1
The threats organisations face
The National Cyber Security Centre (NCSC) reports that the average
cost of a cyber security breach is between $0.8m - $1.3m
$0.8m - $1.3m
$133,000
Ransomware attacks (a variant of malware) cost businesses on
average $133,000 per incident, according to the latest ‘State of
Endpoint Security’ survey
$300m
In 2017, Maersk lost $300m due to disruption to operations and
destroyed servers caused by ransomware
$130m
In 2017, a ransomware attack cost the UK’s National Health Service
over $130m
$140m
In January 2020, Travelex lost $140m from one month of suspended
trading caused by ransomware
2
Our solution Content, Disarm and
Reconstruction (CDR)
Glasswall regenerates files and
documents to a standard of ‘known
good’, delivering proactive protection.
We remediate file structures back into
line with their published specification
and remove risky Active Content by
policy. This technology is referred to by
Gartner as Content, Disarm and
Reconstruction (CDR).
Files are regenerated in milliseconds
in their original file format with the
visual content completely
untouched.
No blocking, no patching and no
false positives that hold back
important business documents. Only
safe, secure and trusted files.
By regenerating a file to a safe
standard of ‘known good’ we are
always ahead of bad actors, whereas
antivirus solutions are always, at
best, one step behind.
3
How it works
Visual
Content layer
This is the layer
presented to the
viewer, the only layer
you see
Functional layer
RISKS:
DOE Ransomware, Malicious
Macro & JavaScript,
Corrupted Acroform and
Phishing URLs
File is threat
free, and now
conforms to a
safe and
trusted
standard
Text, graphics and
formatting are lifted up
Words, context and visual
appearance are in stasis
during regeneration process
Sanitisation
Policy Applied
Removal of DDE, Macros,
JavaScript,Embedded
Files, URL links &
Acroforms
File Structure
Remediation
Fie is regenerated back to
the original. threat-free file
specification, as designed
by the manufacturer
DEEP-FILE INSPECTION REMEDIATION & SANITISATION TECHNOLOGY
File Structure layer
RISKS:
Sophisticated APTs,
Advance ‘File-less’
Malware, Hidden
Malicious Scripts
Visual
Content layer
The user receives an identical
document with complete
integrity and no loss of
resolution
Functional
layer
Controlled by policy, the
customer has total flexibility to
remove unnecessary functional
features in files
File
Structure layer
File is threat-free and now
conforms to a safe and trusted
standard
4
What Gartner says about CDR
“CDR neutralises all potentially
malicious content, without
requiring multiple antivirus
scanning or sandboxing.”
“We expect CDR will
ultimately be considered
a best practice.”
“CDR is an important layer
in any organisation’s
defence and content
protection strategies.”
“CDR should be evaluated as
an effective means of
thwarting content borne
attacks.”
“CDR’s near-real-time process is
an effective approach to
removing malware and other
exploits from files.”
“CDR can eliminate one of the
most common infection vectors
that is hard to deal with in other
ways.”
Gartner Benefit Rating:
High
Two to five years to
mainstream adoption
5Source: Gartner ‘Hype Cycle For Network Security’ report, June 2020
Competitive advantage
The best file
regeneration rates
in the CDR field
The most resilient
CDR engine
available
The most
comprehensive
remediation
of files
World-class efficiency
of integration and
agility in technical
alliances and projects
Glasswall came out on top in
an NSA assessment of CDR
vendors
6
PRODUCT
PORTFOLIO
7
Rebuild SDK
What it is
▪ Software Development Kit for on-premise file regeneration
How it’s deployed
▪ Integrated on-premise into any business process where files are shared or stored
▪ Integrated as a value-added feature into Third Party technologies
Use cases
Guards and Cross Domain Solutions deployed by governments and intelligence agencies
Document sharing and management for government and larger commercial organisations
Hardware integrations, including data diodes, file gateways, USB sanitisers and other file
security devices
8
Rebuild for Email (on-premise)
What it is
▪ Regenerates inbound email attachments to a clean, safe standard
How it’s deployed
▪ Installed on virtual machines and databases within the client’s own IT infrastructure
▪ Maintained and managed by the client’s own IT team
Use cases
Preferred by larger and more security-conscious organisations that have their own
messaging infrastructure on-premise, rather than in the cloud
While many larger organisations are now moving to the cloud, a significant number still have
their own messaging infrastructure on-premise
9
Rebuild for Email (cloud-hosted)
What it is
▪ Launched in October 2019
▪ Regenerates inbound email attachments to a clean, safe standard
How it’s deployed
▪ Hosted on Microsoft Azure with regional data centres in the UK and US
▪ Maintained by Glasswall and managed by the client’s IT team through a web-based User
Interface
Use cases
Protects attachments for any organisation using a public cloud for email infrastructure
Includes the vast majority of small, medium and increasingly, large businesses
Integrates seamlessly with any cloud-hosted email service, including O365, Exchange Online
and G-Suite
10
Rebuild API
What it is
▪ Launched in May 2020
▪ AWS-hosted version of Rebuild SDK
▪ Available in a shared or dedicated cloud environment
How it’s deployed
▪ Integrated into any business process where files are shared or stored
▪ Rebuild API file processing can also be purchased via the Glasswall Store
Use cases
Document management systems for small and medium-sized businesses
Customer portals for safe upload of KYC and AML information
Safe data import for file-heavy projects
11
Rebuild ICAP server
What it is
▪ Developed for US Cyber Command in July 2020
▪ Internet Content Adaptation Protocol (ICAP) implements file regeneration for Proxy Servers
▪ Protects users and systems from malicious web content
How it’s deployed
▪ Integrates into existing company proxy solutions via ICAP
▪ Rebuild ICAP Server can be deployed on-premise or in the cloud
Use cases
Protects file sharing platforms, including Teams, OneDrive, SharePoint, Dropbox and Google
Drive
Protects the upload or download of files from websites and specific domains
12
Pricing model
13
A selection of Intelligence/Defence clients
14
A selection of commercial clients
15
A selection of existing OEM partnerships
Use Cases and Integration Options
HTTP UPLOADS AND DOWNLOADS
Secure files transferred between devices and networks,
ensuring security at the ingress points and high levels of
trust of the organisation at the egress points
FILE GATEWAYS
Secure files as they enter, rest or leave
storage facilities
DEVICE-TO-DEVICE
Small footprint allows Glasswall to be integrated
into lightweight or mobile OS
DOCUMENT MANAGEMENT SYSTEMS
Ensures incoming and outgoing files will be clean and safe, and
archived documents will function correctly when retrieved
16
The Team
DANNY LOPEZ
CEO
Previously with:
Blippar; UK Foreign Office; London
& Partners; and Barclays Bank
DINIS CRUZ
CTO & CISO
Previously with:
Revolut; Photobox Group; Piaget
Institute
STEVE ROBERTS
CFO
Previously with:
Tellimer Group; GFI Group Inc, The
Kyte Group
ANNE TIEDEMANN
SVP People
Previously with:
Kroll; G4S plc
SAM HUTTON
SVP N America
Previously with:
Fidessa
NICK BLOOM
SVP EMEA
Previously with:
Beanstalk; Crumpton Group; Saatchi & Saatchi
PAUL BURKE
SVP Customer Solutions
Previously with:
Citrix; AVG Technologies; Trend Micro,;
Centrix Software
LUKE ROBBERTSE
Head of Technology Operations
Previously with:
Derivco
17
The Board
SIR NIGEL KNOWLES
Chairman DWF and former
Chairman DLA Piper
MICHAEL SPENCER
Founder of ICAP and NEX
Group. Chairman IPGL
CATE PYE
Senior Partner, PA Consulting
& lead on Cyber Security
Transformation
SIR PETER WESTMACOTT
Former British Ambassador to
the US, France and Turkey
STAN BLACK
Former CISO at Citrix
SIR IAIN LOBBAN
Glasswall Advisory Board Chairman
Former GCHQ Director
18
Recognition and awards
Finalist
Best Email Security
Winner
Best Email Security Solution
Winner
Best IT Email Security Solution
Winner
Security Innovation of the Year
Winner
Best Email Security Solution
Winner
Innovation
Winner
at British Legal
Technology Awards 2019
19

Mais conteúdo relacionado

Mais procurados

C-Level tools for Cloud security
C-Level tools for Cloud securityC-Level tools for Cloud security
C-Level tools for Cloud securityVladimir Jirasek
 
Herding Pets and Cattle: Extending Foundational Controls Into the Cloud
Herding Pets and Cattle: Extending Foundational Controls Into the CloudHerding Pets and Cattle: Extending Foundational Controls Into the Cloud
Herding Pets and Cattle: Extending Foundational Controls Into the CloudTripwire
 
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...DevOps.com
 
Dev talks 2021 Data Science @crowdstrike
Dev talks 2021   Data Science @crowdstrikeDev talks 2021   Data Science @crowdstrike
Dev talks 2021 Data Science @crowdstrikeRuxandra Burtica
 
Rama Kolappan – The multi-cloud geared for the digital business
Rama Kolappan – The multi-cloud geared for the digital businessRama Kolappan – The multi-cloud geared for the digital business
Rama Kolappan – The multi-cloud geared for the digital businessVeritas Technologies LLC
 
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...Kenneth de Brucq
 
5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use CasesNetskope
 
Automating Event Driven Security in the AWS Cloud - AWS Public Sector Summit ...
Automating Event Driven Security in the AWS Cloud - AWS Public Sector Summit ...Automating Event Driven Security in the AWS Cloud - AWS Public Sector Summit ...
Automating Event Driven Security in the AWS Cloud - AWS Public Sector Summit ...Amazon Web Services
 
The Journey from Zero to SOC: How Citadel built its Security Operations from ...
The Journey from Zero to SOC: How Citadel built its Security Operations from ...The Journey from Zero to SOC: How Citadel built its Security Operations from ...
The Journey from Zero to SOC: How Citadel built its Security Operations from ...Elasticsearch
 
MalCon Future of Security
MalCon Future of SecurityMalCon Future of Security
MalCon Future of SecurityNetskope
 
Pat Gelsinger - Welcome
Pat Gelsinger - WelcomePat Gelsinger - Welcome
Pat Gelsinger - Welcomescoopnewsgroup
 
2012 10 cloud security architecture
2012 10 cloud security architecture2012 10 cloud security architecture
2012 10 cloud security architectureVladimir Jirasek
 
Cloud Security & Privacy Standard Slide
Cloud Security & Privacy Standard SlideCloud Security & Privacy Standard Slide
Cloud Security & Privacy Standard Slideacinfotec
 
What is the Future of SIEM?
What is the Future of SIEM? What is the Future of SIEM?
What is the Future of SIEM? Elasticsearch
 
The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing Moshe Ferber
 
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?scoopnewsgroup
 
Full time PII data protection: How Randstad uses Elastic Security to keep cli...
Full time PII data protection: How Randstad uses Elastic Security to keep cli...Full time PII data protection: How Randstad uses Elastic Security to keep cli...
Full time PII data protection: How Randstad uses Elastic Security to keep cli...Elasticsearch
 
Introducing a Security Feedback Loop to your CI Pipelines
Introducing a Security Feedback Loop to your CI PipelinesIntroducing a Security Feedback Loop to your CI Pipelines
Introducing a Security Feedback Loop to your CI PipelinesCodefresh
 
Defcon 27 - The Future of Command and Control
Defcon 27 - The Future of Command and ControlDefcon 27 - The Future of Command and Control
Defcon 27 - The Future of Command and ControlNetskope
 

Mais procurados (20)

C-Level tools for Cloud security
C-Level tools for Cloud securityC-Level tools for Cloud security
C-Level tools for Cloud security
 
Herding Pets and Cattle: Extending Foundational Controls Into the Cloud
Herding Pets and Cattle: Extending Foundational Controls Into the CloudHerding Pets and Cattle: Extending Foundational Controls Into the Cloud
Herding Pets and Cattle: Extending Foundational Controls Into the Cloud
 
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...
 
Dev talks 2021 Data Science @crowdstrike
Dev talks 2021   Data Science @crowdstrikeDev talks 2021   Data Science @crowdstrike
Dev talks 2021 Data Science @crowdstrike
 
Rama Kolappan – The multi-cloud geared for the digital business
Rama Kolappan – The multi-cloud geared for the digital businessRama Kolappan – The multi-cloud geared for the digital business
Rama Kolappan – The multi-cloud geared for the digital business
 
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
 
5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases
 
Automating Event Driven Security in the AWS Cloud - AWS Public Sector Summit ...
Automating Event Driven Security in the AWS Cloud - AWS Public Sector Summit ...Automating Event Driven Security in the AWS Cloud - AWS Public Sector Summit ...
Automating Event Driven Security in the AWS Cloud - AWS Public Sector Summit ...
 
The Journey from Zero to SOC: How Citadel built its Security Operations from ...
The Journey from Zero to SOC: How Citadel built its Security Operations from ...The Journey from Zero to SOC: How Citadel built its Security Operations from ...
The Journey from Zero to SOC: How Citadel built its Security Operations from ...
 
MalCon Future of Security
MalCon Future of SecurityMalCon Future of Security
MalCon Future of Security
 
Pat Gelsinger - Welcome
Pat Gelsinger - WelcomePat Gelsinger - Welcome
Pat Gelsinger - Welcome
 
October 2020 meetup
October 2020 meetupOctober 2020 meetup
October 2020 meetup
 
2012 10 cloud security architecture
2012 10 cloud security architecture2012 10 cloud security architecture
2012 10 cloud security architecture
 
Cloud Security & Privacy Standard Slide
Cloud Security & Privacy Standard SlideCloud Security & Privacy Standard Slide
Cloud Security & Privacy Standard Slide
 
What is the Future of SIEM?
What is the Future of SIEM? What is the Future of SIEM?
What is the Future of SIEM?
 
The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing
 
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
 
Full time PII data protection: How Randstad uses Elastic Security to keep cli...
Full time PII data protection: How Randstad uses Elastic Security to keep cli...Full time PII data protection: How Randstad uses Elastic Security to keep cli...
Full time PII data protection: How Randstad uses Elastic Security to keep cli...
 
Introducing a Security Feedback Loop to your CI Pipelines
Introducing a Security Feedback Loop to your CI PipelinesIntroducing a Security Feedback Loop to your CI Pipelines
Introducing a Security Feedback Loop to your CI Pipelines
 
Defcon 27 - The Future of Command and Control
Defcon 27 - The Future of Command and ControlDefcon 27 - The Future of Command and Control
Defcon 27 - The Future of Command and Control
 

Semelhante a Organisations Secure Through Trusted Files

Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewDavid J Rosenthal
 
Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ramy Houssaini
 
Keep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINX
Keep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINXKeep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINX
Keep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINXNGINX, Inc.
 
Watson kista summit 2018 box
Watson kista summit 2018 box Watson kista summit 2018 box
Watson kista summit 2018 box IBM Sverige
 
Smart Analytics for The Big Unknown
Smart Analytics for The Big UnknownSmart Analytics for The Big Unknown
Smart Analytics for The Big UnknownAdrian Dumitrescu
 
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGSECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGIRJET Journal
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanSPS Paris
 
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityManage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityCitrix
 
Strengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providersStrengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providersCloudflare
 
wp-security-dbsec-cloud-3225125
wp-security-dbsec-cloud-3225125wp-security-dbsec-cloud-3225125
wp-security-dbsec-cloud-3225125Gabor Bokor
 
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalWave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalQuek Lilian
 
ClouDoc brochure_eng_20160708
ClouDoc brochure_eng_20160708ClouDoc brochure_eng_20160708
ClouDoc brochure_eng_20160708sang yoo
 
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Bloombase
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overviewCisco Canada
 
Best practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWSBest practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWSAmazon Web Services
 
Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the MassesIRJET Journal
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET Journal
 

Semelhante a Organisations Secure Through Trusted Files (20)

Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 Overview
 
Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011
 
Keep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINX
Keep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINXKeep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINX
Keep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINX
 
Watson kista summit 2018 box
Watson kista summit 2018 box Watson kista summit 2018 box
Watson kista summit 2018 box
 
Smart Analytics for The Big Unknown
Smart Analytics for The Big UnknownSmart Analytics for The Big Unknown
Smart Analytics for The Big Unknown
 
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGSECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
 
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityManage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
 
Strengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providersStrengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providers
 
wp-security-dbsec-cloud-3225125
wp-security-dbsec-cloud-3225125wp-security-dbsec-cloud-3225125
wp-security-dbsec-cloud-3225125
 
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalWave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
 
ClouDoc brochure_eng_20160708
ClouDoc brochure_eng_20160708ClouDoc brochure_eng_20160708
ClouDoc brochure_eng_20160708
 
Redington Value Journal - March 2017
Redington Value Journal - March 2017Redington Value Journal - March 2017
Redington Value Journal - March 2017
 
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
 
[SEG] SHIELDEX Email Gateway
[SEG] SHIELDEX Email Gateway[SEG] SHIELDEX Email Gateway
[SEG] SHIELDEX Email Gateway
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
 
Best practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWSBest practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWS
 
Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the Masses
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
 

Mais de Dinis Cruz

Map camp - Why context is your crown jewels (Wardley Maps and Threat Modeling)
Map camp  - Why context is your crown jewels (Wardley Maps and Threat Modeling)Map camp  - Why context is your crown jewels (Wardley Maps and Threat Modeling)
Map camp - Why context is your crown jewels (Wardley Maps and Threat Modeling)Dinis Cruz
 
The benefits of police and industry investigation - NPCC Conference
The benefits of police and industry investigation - NPCC ConferenceThe benefits of police and industry investigation - NPCC Conference
The benefits of police and industry investigation - NPCC ConferenceDinis Cruz
 
Serverless Security Workflows - cyber talks - 19th nov 2019
Serverless  Security Workflows - cyber talks - 19th nov 2019Serverless  Security Workflows - cyber talks - 19th nov 2019
Serverless Security Workflows - cyber talks - 19th nov 2019Dinis Cruz
 
Modern security using graphs, automation and data science
Modern security using graphs, automation and data scienceModern security using graphs, automation and data science
Modern security using graphs, automation and data scienceDinis Cruz
 
Using Wardley Maps to Understand Security's Landscape and Strategy
Using Wardley Maps to Understand Security's Landscape and StrategyUsing Wardley Maps to Understand Security's Landscape and Strategy
Using Wardley Maps to Understand Security's Landscape and StrategyDinis Cruz
 
Dinis Cruz (CV) - CISO and Transformation Agent v1.2
Dinis Cruz (CV) - CISO and Transformation Agent v1.2Dinis Cruz (CV) - CISO and Transformation Agent v1.2
Dinis Cruz (CV) - CISO and Transformation Agent v1.2Dinis Cruz
 
Making fact based decisions and 4 board decisions (Oct 2019)
Making fact based decisions and 4 board decisions (Oct 2019)Making fact based decisions and 4 board decisions (Oct 2019)
Making fact based decisions and 4 board decisions (Oct 2019)Dinis Cruz
 
CISO Application presentation - Babylon health security
CISO Application presentation - Babylon health securityCISO Application presentation - Babylon health security
CISO Application presentation - Babylon health securityDinis Cruz
 
GSBot Commands (Slack Bot used to access Jira data)
GSBot Commands (Slack Bot used to access Jira data)GSBot Commands (Slack Bot used to access Jira data)
GSBot Commands (Slack Bot used to access Jira data)Dinis Cruz
 
OSBot - Data transformation workflow (from GSheet to Jupyter)
OSBot - Data transformation workflow (from GSheet to Jupyter)OSBot - Data transformation workflow (from GSheet to Jupyter)
OSBot - Data transformation workflow (from GSheet to Jupyter)Dinis Cruz
 
Jira schemas - Open Security Summit (Working Session 21th May 2019)
Jira schemas  - Open Security Summit (Working Session 21th May 2019)Jira schemas  - Open Security Summit (Working Session 21th May 2019)
Jira schemas - Open Security Summit (Working Session 21th May 2019)Dinis Cruz
 
Template for "Sharing anonymised risk theme dashboards v0.8"
Template for "Sharing anonymised risk theme dashboards v0.8"Template for "Sharing anonymised risk theme dashboards v0.8"
Template for "Sharing anonymised risk theme dashboards v0.8"Dinis Cruz
 
Owasp and summits (may 2019)
Owasp and summits (may 2019)Owasp and summits (may 2019)
Owasp and summits (may 2019)Dinis Cruz
 
Creating a graph based security organisation - Apr 2019 (OWASP London chapter...
Creating a graph based security organisation - Apr 2019 (OWASP London chapter...Creating a graph based security organisation - Apr 2019 (OWASP London chapter...
Creating a graph based security organisation - Apr 2019 (OWASP London chapter...Dinis Cruz
 
Open security summit 2019 owasp london 25th feb
Open security summit 2019   owasp london 25th febOpen security summit 2019   owasp london 25th feb
Open security summit 2019 owasp london 25th febDinis Cruz
 
Owasp summit 2019 - OWASP London 25th feb
Owasp summit 2019  - OWASP London 25th febOwasp summit 2019  - OWASP London 25th feb
Owasp summit 2019 - OWASP London 25th febDinis Cruz
 
Evolving challenges for modern enterprise architectures in the age of APIs
Evolving challenges for modern enterprise architectures in the age of APIsEvolving challenges for modern enterprise architectures in the age of APIs
Evolving challenges for modern enterprise architectures in the age of APIsDinis Cruz
 
How to not fail at security data analytics (by CxOSidekick)
How to not fail at security data analytics (by CxOSidekick)How to not fail at security data analytics (by CxOSidekick)
How to not fail at security data analytics (by CxOSidekick)Dinis Cruz
 
Thinking in graphs v1.0
Thinking in graphs v1.0Thinking in graphs v1.0
Thinking in graphs v1.0Dinis Cruz
 
Open Security Summit - April 2018
Open Security Summit - April 2018 Open Security Summit - April 2018
Open Security Summit - April 2018 Dinis Cruz
 

Mais de Dinis Cruz (20)

Map camp - Why context is your crown jewels (Wardley Maps and Threat Modeling)
Map camp  - Why context is your crown jewels (Wardley Maps and Threat Modeling)Map camp  - Why context is your crown jewels (Wardley Maps and Threat Modeling)
Map camp - Why context is your crown jewels (Wardley Maps and Threat Modeling)
 
The benefits of police and industry investigation - NPCC Conference
The benefits of police and industry investigation - NPCC ConferenceThe benefits of police and industry investigation - NPCC Conference
The benefits of police and industry investigation - NPCC Conference
 
Serverless Security Workflows - cyber talks - 19th nov 2019
Serverless  Security Workflows - cyber talks - 19th nov 2019Serverless  Security Workflows - cyber talks - 19th nov 2019
Serverless Security Workflows - cyber talks - 19th nov 2019
 
Modern security using graphs, automation and data science
Modern security using graphs, automation and data scienceModern security using graphs, automation and data science
Modern security using graphs, automation and data science
 
Using Wardley Maps to Understand Security's Landscape and Strategy
Using Wardley Maps to Understand Security's Landscape and StrategyUsing Wardley Maps to Understand Security's Landscape and Strategy
Using Wardley Maps to Understand Security's Landscape and Strategy
 
Dinis Cruz (CV) - CISO and Transformation Agent v1.2
Dinis Cruz (CV) - CISO and Transformation Agent v1.2Dinis Cruz (CV) - CISO and Transformation Agent v1.2
Dinis Cruz (CV) - CISO and Transformation Agent v1.2
 
Making fact based decisions and 4 board decisions (Oct 2019)
Making fact based decisions and 4 board decisions (Oct 2019)Making fact based decisions and 4 board decisions (Oct 2019)
Making fact based decisions and 4 board decisions (Oct 2019)
 
CISO Application presentation - Babylon health security
CISO Application presentation - Babylon health securityCISO Application presentation - Babylon health security
CISO Application presentation - Babylon health security
 
GSBot Commands (Slack Bot used to access Jira data)
GSBot Commands (Slack Bot used to access Jira data)GSBot Commands (Slack Bot used to access Jira data)
GSBot Commands (Slack Bot used to access Jira data)
 
OSBot - Data transformation workflow (from GSheet to Jupyter)
OSBot - Data transformation workflow (from GSheet to Jupyter)OSBot - Data transformation workflow (from GSheet to Jupyter)
OSBot - Data transformation workflow (from GSheet to Jupyter)
 
Jira schemas - Open Security Summit (Working Session 21th May 2019)
Jira schemas  - Open Security Summit (Working Session 21th May 2019)Jira schemas  - Open Security Summit (Working Session 21th May 2019)
Jira schemas - Open Security Summit (Working Session 21th May 2019)
 
Template for "Sharing anonymised risk theme dashboards v0.8"
Template for "Sharing anonymised risk theme dashboards v0.8"Template for "Sharing anonymised risk theme dashboards v0.8"
Template for "Sharing anonymised risk theme dashboards v0.8"
 
Owasp and summits (may 2019)
Owasp and summits (may 2019)Owasp and summits (may 2019)
Owasp and summits (may 2019)
 
Creating a graph based security organisation - Apr 2019 (OWASP London chapter...
Creating a graph based security organisation - Apr 2019 (OWASP London chapter...Creating a graph based security organisation - Apr 2019 (OWASP London chapter...
Creating a graph based security organisation - Apr 2019 (OWASP London chapter...
 
Open security summit 2019 owasp london 25th feb
Open security summit 2019   owasp london 25th febOpen security summit 2019   owasp london 25th feb
Open security summit 2019 owasp london 25th feb
 
Owasp summit 2019 - OWASP London 25th feb
Owasp summit 2019  - OWASP London 25th febOwasp summit 2019  - OWASP London 25th feb
Owasp summit 2019 - OWASP London 25th feb
 
Evolving challenges for modern enterprise architectures in the age of APIs
Evolving challenges for modern enterprise architectures in the age of APIsEvolving challenges for modern enterprise architectures in the age of APIs
Evolving challenges for modern enterprise architectures in the age of APIs
 
How to not fail at security data analytics (by CxOSidekick)
How to not fail at security data analytics (by CxOSidekick)How to not fail at security data analytics (by CxOSidekick)
How to not fail at security data analytics (by CxOSidekick)
 
Thinking in graphs v1.0
Thinking in graphs v1.0Thinking in graphs v1.0
Thinking in graphs v1.0
 
Open Security Summit - April 2018
Open Security Summit - April 2018 Open Security Summit - April 2018
Open Security Summit - April 2018
 

Último

Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialJoão Esperancinha
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 

Último (20)

Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorial
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 

Organisations Secure Through Trusted Files

  • 2. The threats organisations face of organisations say threats they see can’t be stopped by anti-virus solutions Almost all email-based cyber attacks begin with luring employees into clicking on malicious content of advanced malware launches by opening an attachment Every 4.2 seconds a new variant of malware is created Malware morphs and spreads at such a rate that malicious files are often missed, with disastrous consequences for organisations Antivirus and sandboxing technologies seek to identify and remove dangerous files by focusing on the ‘known bad’, leaving them a step behind bad actors Source: Verizon Source: G DataSource: Cisco 2018 Cyber Security Report 69% 66% 4.2s Source: Proofpoint 2019 Human Factor Report 1
  • 3. The threats organisations face The National Cyber Security Centre (NCSC) reports that the average cost of a cyber security breach is between $0.8m - $1.3m $0.8m - $1.3m $133,000 Ransomware attacks (a variant of malware) cost businesses on average $133,000 per incident, according to the latest ‘State of Endpoint Security’ survey $300m In 2017, Maersk lost $300m due to disruption to operations and destroyed servers caused by ransomware $130m In 2017, a ransomware attack cost the UK’s National Health Service over $130m $140m In January 2020, Travelex lost $140m from one month of suspended trading caused by ransomware 2
  • 4. Our solution Content, Disarm and Reconstruction (CDR) Glasswall regenerates files and documents to a standard of ‘known good’, delivering proactive protection. We remediate file structures back into line with their published specification and remove risky Active Content by policy. This technology is referred to by Gartner as Content, Disarm and Reconstruction (CDR). Files are regenerated in milliseconds in their original file format with the visual content completely untouched. No blocking, no patching and no false positives that hold back important business documents. Only safe, secure and trusted files. By regenerating a file to a safe standard of ‘known good’ we are always ahead of bad actors, whereas antivirus solutions are always, at best, one step behind. 3
  • 5. How it works Visual Content layer This is the layer presented to the viewer, the only layer you see Functional layer RISKS: DOE Ransomware, Malicious Macro & JavaScript, Corrupted Acroform and Phishing URLs File is threat free, and now conforms to a safe and trusted standard Text, graphics and formatting are lifted up Words, context and visual appearance are in stasis during regeneration process Sanitisation Policy Applied Removal of DDE, Macros, JavaScript,Embedded Files, URL links & Acroforms File Structure Remediation Fie is regenerated back to the original. threat-free file specification, as designed by the manufacturer DEEP-FILE INSPECTION REMEDIATION & SANITISATION TECHNOLOGY File Structure layer RISKS: Sophisticated APTs, Advance ‘File-less’ Malware, Hidden Malicious Scripts Visual Content layer The user receives an identical document with complete integrity and no loss of resolution Functional layer Controlled by policy, the customer has total flexibility to remove unnecessary functional features in files File Structure layer File is threat-free and now conforms to a safe and trusted standard 4
  • 6. What Gartner says about CDR “CDR neutralises all potentially malicious content, without requiring multiple antivirus scanning or sandboxing.” “We expect CDR will ultimately be considered a best practice.” “CDR is an important layer in any organisation’s defence and content protection strategies.” “CDR should be evaluated as an effective means of thwarting content borne attacks.” “CDR’s near-real-time process is an effective approach to removing malware and other exploits from files.” “CDR can eliminate one of the most common infection vectors that is hard to deal with in other ways.” Gartner Benefit Rating: High Two to five years to mainstream adoption 5Source: Gartner ‘Hype Cycle For Network Security’ report, June 2020
  • 7. Competitive advantage The best file regeneration rates in the CDR field The most resilient CDR engine available The most comprehensive remediation of files World-class efficiency of integration and agility in technical alliances and projects Glasswall came out on top in an NSA assessment of CDR vendors 6
  • 9. Rebuild SDK What it is ▪ Software Development Kit for on-premise file regeneration How it’s deployed ▪ Integrated on-premise into any business process where files are shared or stored ▪ Integrated as a value-added feature into Third Party technologies Use cases Guards and Cross Domain Solutions deployed by governments and intelligence agencies Document sharing and management for government and larger commercial organisations Hardware integrations, including data diodes, file gateways, USB sanitisers and other file security devices 8
  • 10. Rebuild for Email (on-premise) What it is ▪ Regenerates inbound email attachments to a clean, safe standard How it’s deployed ▪ Installed on virtual machines and databases within the client’s own IT infrastructure ▪ Maintained and managed by the client’s own IT team Use cases Preferred by larger and more security-conscious organisations that have their own messaging infrastructure on-premise, rather than in the cloud While many larger organisations are now moving to the cloud, a significant number still have their own messaging infrastructure on-premise 9
  • 11. Rebuild for Email (cloud-hosted) What it is ▪ Launched in October 2019 ▪ Regenerates inbound email attachments to a clean, safe standard How it’s deployed ▪ Hosted on Microsoft Azure with regional data centres in the UK and US ▪ Maintained by Glasswall and managed by the client’s IT team through a web-based User Interface Use cases Protects attachments for any organisation using a public cloud for email infrastructure Includes the vast majority of small, medium and increasingly, large businesses Integrates seamlessly with any cloud-hosted email service, including O365, Exchange Online and G-Suite 10
  • 12. Rebuild API What it is ▪ Launched in May 2020 ▪ AWS-hosted version of Rebuild SDK ▪ Available in a shared or dedicated cloud environment How it’s deployed ▪ Integrated into any business process where files are shared or stored ▪ Rebuild API file processing can also be purchased via the Glasswall Store Use cases Document management systems for small and medium-sized businesses Customer portals for safe upload of KYC and AML information Safe data import for file-heavy projects 11
  • 13. Rebuild ICAP server What it is ▪ Developed for US Cyber Command in July 2020 ▪ Internet Content Adaptation Protocol (ICAP) implements file regeneration for Proxy Servers ▪ Protects users and systems from malicious web content How it’s deployed ▪ Integrates into existing company proxy solutions via ICAP ▪ Rebuild ICAP Server can be deployed on-premise or in the cloud Use cases Protects file sharing platforms, including Teams, OneDrive, SharePoint, Dropbox and Google Drive Protects the upload or download of files from websites and specific domains 12
  • 15. A selection of Intelligence/Defence clients 14
  • 16. A selection of commercial clients 15
  • 17. A selection of existing OEM partnerships Use Cases and Integration Options HTTP UPLOADS AND DOWNLOADS Secure files transferred between devices and networks, ensuring security at the ingress points and high levels of trust of the organisation at the egress points FILE GATEWAYS Secure files as they enter, rest or leave storage facilities DEVICE-TO-DEVICE Small footprint allows Glasswall to be integrated into lightweight or mobile OS DOCUMENT MANAGEMENT SYSTEMS Ensures incoming and outgoing files will be clean and safe, and archived documents will function correctly when retrieved 16
  • 18. The Team DANNY LOPEZ CEO Previously with: Blippar; UK Foreign Office; London & Partners; and Barclays Bank DINIS CRUZ CTO & CISO Previously with: Revolut; Photobox Group; Piaget Institute STEVE ROBERTS CFO Previously with: Tellimer Group; GFI Group Inc, The Kyte Group ANNE TIEDEMANN SVP People Previously with: Kroll; G4S plc SAM HUTTON SVP N America Previously with: Fidessa NICK BLOOM SVP EMEA Previously with: Beanstalk; Crumpton Group; Saatchi & Saatchi PAUL BURKE SVP Customer Solutions Previously with: Citrix; AVG Technologies; Trend Micro,; Centrix Software LUKE ROBBERTSE Head of Technology Operations Previously with: Derivco 17
  • 19. The Board SIR NIGEL KNOWLES Chairman DWF and former Chairman DLA Piper MICHAEL SPENCER Founder of ICAP and NEX Group. Chairman IPGL CATE PYE Senior Partner, PA Consulting & lead on Cyber Security Transformation SIR PETER WESTMACOTT Former British Ambassador to the US, France and Turkey STAN BLACK Former CISO at Citrix SIR IAIN LOBBAN Glasswall Advisory Board Chairman Former GCHQ Director 18
  • 20. Recognition and awards Finalist Best Email Security Winner Best Email Security Solution Winner Best IT Email Security Solution Winner Security Innovation of the Year Winner Best Email Security Solution Winner Innovation Winner at British Legal Technology Awards 2019 19