Skip to main content

Product Introduction

Why is the SHIELDEX File necessary?

Email attachments, file sharing services, cloud storage, etc.Malicious File InfluxThis is emerging as a major attack vector.
existingAntivirusIsandboxis the maliciousness of the fileDetectionin a way that,Zero-Day AttackIt is vulnerable to this variant of malware and requires continuous updates.


Approach to SHIELDEX File

SHIELDEX Fileis not a detection method**CDR(Content Disarm & Reconstruction)Extraction and Reconstruction Method Based on**operates.
By extracting only safe content regardless of whether it is malicious, it is possible to block unknown threats in advance.


1747373768230

Processing Example

  • Extension Spoofing Attack: By checking the document format, we block the infiltration of disguised malicious files where the extension does not match the actual file format.
  • Macro-based attacksBlocks malware attacks that are automatically executed upon document opening by identifying macros.
  • Script-based attacksIdentifies scripts such as JavaScript and VBScript to block phishing site links and malware download attacks.
  • External Link-Based Attacks: Identifies external links and blocks automatic linking attacks to malicious sites.
  • Steganography-based attacksIdentifies hidden malware in images to block malware execution attacks within image files.

CDR vs Existing Security Technologies

itemAntivirus / SandboxCDR
Operating PrincipleSignature / Behavior-Based DetectionZero TrustBase Extraction and Reconstruction
Zero-Day ResponseDetection failure possibilityIdentify risk factors and extract only safe content for response.
Processing Speedslownesshigh
System Loadhighlow
Update DependenciesSignature DB update requiredNo update dependencies

Key Features

FeaturesDescription
Zero-Day AttackResponseReconstruct files with safe content only to block unknown potential sources of risk.
High-Performance ProcessingFast processing based on a high-performance demining enginesandboxExecution process unnecessary)
Support for various formatsSupport for a wide range of formats including MS Office, PDF, Hancom Office, HTML, JSON, images, and compressed files (ZIP/TAR/7Z).
Detailed Analysis6-Step Risk Visualization (Safe → Doubt → Warning → Danger → Serious →Tampering) andForensic DataProvision
Steganography DetectionDetection and Removal of Hidden Malware in Images
Flexible Policy ManagementSupport for detailed policies by file type, policies by user/group, and management of policy change history.

Application Environment

  • Email Gateway: Email Attachment Sanitization
  • Web Gateway: File Download Neutralization via the Web
  • Network interconnection environment: Sanitization during file transfer in a network-separated environment
  • Cloud Storage: Cloud File Sharing Service Integration
  • API Integration: Integration of various systems through REST API

Learn more