Skip to main content

Main Features

Overview

The SHIELDEX file isCDRIdentify the risk factors of files coming from external sources based on technology and extract and reconstruct only safe content.File Security Solutionis.
File Decontamination ProcessingfromPolicy Management, Real-time Monitoring, Detailed Analysis, Report GenerationSupports the entire process of file security up to __PH_0__.

※ Full feature list isFunction SpecificationPlease refer to.


File Sanitization

Existing detection-based security solutions are vulnerable to unknown threats.
SHIELDEX File identifies risk factors within the file.Macro, script, links, etc.) to identify and extract only safe content to recombine into a new file, soBlock Unknown Threats at the Sourcedoes.
The text, images, tables, and layout of the original document are maintained according to the established policy to ensure business continuity.

FunctionDescription
File SanitizationIdentify risk factors within files according to policy and extract only safe content for recombination. Supports various formats including MS Office, PDF, Hancom Office, HTML, images, JSON, and compressed files.
Vaccine InspectionPre-scan files with antivirus to detect known malware before decontamination. Strengthen security with a dual defense system combining CDR and antivirus.
Extension Forgery InspectionCompare the actual format (metadata) of the file with the extension.Extension ForgeryDetection. Blocking the influx of malicious files disguised with extensions.
Decontamination File BackupOriginal file and decontaminated fileAESEncrypt and store. Use for cause analysis and reprocessing in case of a security incident.

Decontamination Policy Management

A uniform security policy can hinder work efficiency, while a flexible policy can create security vulnerabilities. The design team needs CAD files, the marketing team needs image files, and stricter policies are required when exchanging files with external collaborators.
The SHIELDEX file isApply policies segmented by file type and user groupThis allows for the establishment of security levels that match the characteristics of each department's work. Through this, both security and work efficiency can be secured simultaneously, and the organization's security policies can be effectively adhered to.

FunctionDescription
File Type PoliciesDetailed policy settings according to the characteristics of each format such as MS Office (macros, OLE objects, ActiveX, etc.), PDF (JavaScript, Actions, etc.), Hancom Office, HTML, images, JSON, compressed files, etc. Control the threat elements of each file type individually.
Extension Filter and Tampering PreventionSpecify extensions for decontamination processing, specify extensions to block,Extension ForgeryControl file influx through blocking, set allow/block rules according to the organization's security policy.
Individual PolicySpecify and apply different security policies for each user and group. Manage policies that are segmented according to the organizational structure, such as by department, role, or external collaborators. Provide policy change history management and restoration features.

Real-time Monitoring

Detecting system failures or performance degradation in advance and monitoring the status of remediation in real-time is essential for stable operations.
The SHIELDEX file isCheck the status of system resources and decontamination processing at a glanceWe provide dashboards that allow for immediate response in case of issues.

FunctionDescription
Resource MonitoringDisplays the CPU, memory, and disk usage of the server in real-time charts for an at-a-glance understanding of the system status. Detects system failures or performance degradation in advance for immediate response.
Status of Decontamination ProgressReal-time monitoring of the status of the ongoing demilitarization work (total, waiting, in progress, completed). Immediately identify system load conditions and processing delays to utilize for capacity planning.
Summary of Decontamination Treatment ResultsVisualize and summarize the monthly processing results (success/exceptions/blocking) and risk status of files that have been decontaminated. Get a quick overview of the organization's security status and evaluate the effectiveness of security policies.

Analysis of Demilitarization Results

To analyze the cause and respond to a security incident, it is essential to accurately identify which files contained what threat elements and when.
The SHIELDEX file isDetailed information of all processed files andForensic Datato provideTherefore, it provides the data necessary for incident response.

FunctionDescription
Result Inquiry and SearchCheck the success of the harmlessness processing of all files handled by the system, along with risk levels and detailed information in a list. Search and filter based on various conditions such as date range, file name, extension, user, processing result, and risk level.
Decontamination Results DetailsCheck the request time, job ID, file information (before/after size), user information, processing results, decontamination logs, risk level, and detailed analysis information for each file. Accurately identify which file contained what threat elements at what time when an incident occurs.
Forensic DataInformationAnalyze file metadata such as creation/modification history, production tools and versions, permission settings, document format, version, and page count to accurately assess the source and risk level of the file. Utilize for security incident cause analysis.
Download Backup FileDownload the original files stored in an encrypted format and the files that have completed the decryption process for use in incident cause analysis or reprocessing.

Security Statistics and Reports

Data-driven decision-making is essential for establishing security policies and optimizing system operations.
The SHIELDEX file isVisualizing file influx patterns, risk distribution, and threat detection statusBy providing this, it supports accurately understanding the organization's security status and establishing effective security policies.

FunctionDescription
Risk StatisticsVisualize the 6-level risk ratio from 'Safety' to 'Tampering' using a pie chart. Provide representative content types and counts for each risk level, as well as detection counts by threat factors, to understand the organization's security threat level and identify areas where security training or policy enhancement is needed.
Influx and Processing StatisticsCDRVisualize the ratio of processing results (success/exception/block), the number of incoming files by date, distribution by file extension, and processing results by channel. Evaluate the effectiveness of security policies and identify problematic file types or channels for policy improvement.
Report Generation and Downloadstatistical dataCSVDownload in the format and use it to create security reports. Provide data necessary for executive reports or security audits to support security investment decision-making.

Admin Settings

To ensure system security and stable operation, various management functions such as administrator privilege management, access control, and audit logs are required.
The SHIELDEX file is**Integrated provision of core management functions necessary for system operation.**This supports ensuring both compliance with security policies and operational efficiency.

FunctionDescription
Account and Permission ManagementView, register, modify, delete administrator accounts, and set permissions. Separate the permissions of system administrators and channel administrators to apply the principle of least privilege.
Access ControlThe web console enhances system security with IP-based access control (whitelisting), while the API uses channel codes and business codes for access control.
Admin Audit LogView audit logs for administrator actions (menu access, configuration changes, etc.)CSVExport in format. Utilize for security audits and compliance.

Learn more