Main Features
Overview
The SHIELDEX file isCDRIdentify the risk factors of files coming from external sources based on technology and extract and reconstruct only safe content.File Security Solutionis.
File Decontamination ProcessingfromPolicy Management, Real-time Monitoring, Detailed Analysis, Report GenerationSupports the entire process of file security up to __PH_0__.
※ Full feature list isFunction SpecificationPlease refer to.
File Sanitization
Existing detection-based security solutions are vulnerable to unknown threats.
SHIELDEX File identifies risk factors within the file.Macro, script, links, etc.) to identify and extract only safe content to recombine into a new file, soBlock Unknown Threats at the Sourcedoes.
The text, images, tables, and layout of the original document are maintained according to the established policy to ensure business continuity.
| Function | Description |
|---|---|
| File Sanitization | Identify risk factors within files according to policy and extract only safe content for recombination. Supports various formats including MS Office, PDF, Hancom Office, HTML, images, JSON, and compressed files. |
| Vaccine Inspection | Pre-scan files with antivirus to detect known malware before decontamination. Strengthen security with a dual defense system combining CDR and antivirus. |
| Extension Forgery Inspection | Compare the actual format (metadata) of the file with the extension.Extension ForgeryDetection. Blocking the influx of malicious files disguised with extensions. |
| Decontamination File Backup | Original file and decontaminated fileAESEncrypt and store. Use for cause analysis and reprocessing in case of a security incident. |
Decontamination Policy Management
A uniform security policy can hinder work efficiency, while a flexible policy can create security vulnerabilities. The design team needs CAD files, the marketing team needs image files, and stricter policies are required when exchanging files with external collaborators.
The SHIELDEX file isApply policies segmented by file type and user groupThis allows for the establishment of security levels that match the characteristics of each department's work. Through this, both security and work efficiency can be secured simultaneously, and the organization's security policies can be effectively adhered to.
| Function | Description |
|---|---|
| File Type Policies | Detailed policy settings according to the characteristics of each format such as MS Office (macros, OLE objects, ActiveX, etc.), PDF (JavaScript, Actions, etc.), Hancom Office, HTML, images, JSON, compressed files, etc. Control the threat elements of each file type individually. |
| Extension Filter and Tampering Prevention | Specify extensions for decontamination processing, specify extensions to block,Extension ForgeryControl file influx through blocking, set allow/block rules according to the organization's security policy. |
| Individual Policy | Specify and apply different security policies for each user and group. Manage policies that are segmented according to the organizational structure, such as by department, role, or external collaborators. Provide policy change history management and restoration features. |
Real-time Monitoring
Detecting system failures or performance degradation in advance and monitoring the status of remediation in real-time is essential for stable operations.
The SHIELDEX file isCheck the status of system resources and decontamination processing at a glanceWe provide dashboards that allow for immediate response in case of issues.
| Function | Description |
|---|---|
| Resource Monitoring | Displays the CPU, memory, and disk usage of the server in real-time charts for an at-a-glance understanding of the system status. Detects system failures or performance degradation in advance for immediate response. |
| Status of Decontamination Progress | Real-time monitoring of the status of the ongoing demilitarization work (total, waiting, in progress, completed). Immediately identify system load conditions and processing delays to utilize for capacity planning. |
| Summary of Decontamination Treatment Results | Visualize and summarize the monthly processing results (success/exceptions/blocking) and risk status of files that have been decontaminated. Get a quick overview of the organization's security status and evaluate the effectiveness of security policies. |
Analysis of Demilitarization Results
To analyze the cause and respond to a security incident, it is essential to accurately identify which files contained what threat elements and when.
The SHIELDEX file isDetailed information of all processed files andForensic Datato provideTherefore, it provides the data necessary for incident response.
| Function | Description |
|---|---|
| Result Inquiry and Search | Check the success of the harmlessness processing of all files handled by the system, along with risk levels and detailed information in a list. Search and filter based on various conditions such as date range, file name, extension, user, processing result, and risk level. |
| Decontamination Results Details | Check the request time, job ID, file information (before/after size), user information, processing results, decontamination logs, risk level, and detailed analysis information for each file. Accurately identify which file contained what threat elements at what time when an incident occurs. |
| Forensic DataInformation | Analyze file metadata such as creation/modification history, production tools and versions, permission settings, document format, version, and page count to accurately assess the source and risk level of the file. Utilize for security incident cause analysis. |
| Download Backup File | Download the original files stored in an encrypted format and the files that have completed the decryption process for use in incident cause analysis or reprocessing. |
Security Statistics and Reports
Data-driven decision-making is essential for establishing security policies and optimizing system operations.
The SHIELDEX file isVisualizing file influx patterns, risk distribution, and threat detection statusBy providing this, it supports accurately understanding the organization's security status and establishing effective security policies.
| Function | Description |
|---|---|
| Risk Statistics | Visualize the 6-level risk ratio from 'Safety' to 'Tampering' using a pie chart. Provide representative content types and counts for each risk level, as well as detection counts by threat factors, to understand the organization's security threat level and identify areas where security training or policy enhancement is needed. |
| Influx and Processing Statistics | CDRVisualize the ratio of processing results (success/exception/block), the number of incoming files by date, distribution by file extension, and processing results by channel. Evaluate the effectiveness of security policies and identify problematic file types or channels for policy improvement. |
| Report Generation and Download | statistical dataCSVDownload in the format and use it to create security reports. Provide data necessary for executive reports or security audits to support security investment decision-making. |
Admin Settings
To ensure system security and stable operation, various management functions such as administrator privilege management, access control, and audit logs are required.
The SHIELDEX file is**Integrated provision of core management functions necessary for system operation.**This supports ensuring both compliance with security policies and operational efficiency.
| Function | Description |
|---|---|
| Account and Permission Management | View, register, modify, delete administrator accounts, and set permissions. Separate the permissions of system administrators and channel administrators to apply the principle of least privilege. |
| Access Control | The web console enhances system security with IP-based access control (whitelisting), while the API uses channel codes and business codes for access control. |
| Admin Audit Log | View audit logs for administrator actions (menu access, configuration changes, etc.)CSVExport in format. Utilize for security audits and compliance. |
Learn more
- Product Introduction: Product Overview and Key Features
- Function Specification: Detailed Feature List
- Application Scenarios: Real-world application cases and scenarios