Application Scenarios
The SHIELDEX File can be applied in various ways to fit the organization's IT environment.
Network interconnection environment, Email Gateway, External Upload, API-based IntegrationIt provides major application scenarios, the integration methods for each scenario, and the expected effects.
Network interconnection environment
In a network separation environment, security for files transmitted from the external network to the internal network is particularly important.
Applying SHIELDEX File in a disconnected environment**All files transmitted from the external network to the internal network are sanitized.**This can strengthen the security of the internal network.
| Application Method | Description |
|---|---|
| Integration of Network Connection Solutions | Automatic decontamination processing during file transfer through integration with a managed connection solution and REST API. |
| Independent Deployment | Deploying independently in a disconnected environment to process file transfers safely |
Main EffectsEnhance file security in a network separation environment and block the influx of malicious files from the external network to the internal network.
It has references for integration with existing network linkage solutions such as Hansak, 3Ssoft, HuneSion, and SQubeI, allowing for quick implementation.
Email Gateway Integration
Email is the most frequent route for the influx of malicious files. Through attachmentsMacroVirus,scriptInfrastructure attacks are continuously occurring.
Integrating SHIELDEX File with the email gatewayAutomatically sanitizing email body and attachmentsThis allows you to deliver only safe files to internal users.
| Integration Method | Description |
|---|---|
| SMTP Integration | Automatic sanitization of email body and attachments by integrating with the email server and SMTP protocol. |
| Spam Filter Integration | Delivering only safe emails that have been sanitized through integration with a spam filter and REST API to users. |
Main Effects: It blocks the influx of malicious files through email at the source, identifies risk factors (macros, scripts, etc.) in the email body and attachments, and extracts only safe content to prevent security incidents caused by user mistakes.
External Upload Environment
Files uploaded from external sources, such as public services, B2B services, partners, resumes/applications, etc., have a high risk of containing malicious files.
When applying the SHIELDEX File to an external upload environmentNeutralization of all files uploaded from external sourcesThis allows only safe files to be stored in the work system.
| Integration Method | Description |
|---|---|
| Business System Integration | Automatic sanitization processing during file upload through integration with the business system and REST API. |
| Board System Integration | Automatic sanitization of attached files through integration with the bulletin board system and REST API. |
Main EffectsIdentify the risk factors of files uploaded from external sources and extract only safe content to enhance the security of the business system.
You can safely process files from various sources such as public services, B2B, partners, and resumes.
API-based Integration
You may need to add file security features to the existing system or build an integrated security system by linking various systems.
The SHIELDEX file isProvides a standard REST APIThis allows for flexible integration with various systems such as web gateways and cloud storage.
| Integration Method | Description |
|---|---|
| Web Gateway Integration | Automatic sanitization processing during file download through integration with web gateway and REST API |
| Cloud Storage Integration | Automatic sanitization processing during file upload/download by integrating with cloud storage and REST API. |
| Integration with Other Systems | Integrating REST API into the existing system to add file security features |
Main EffectsYou can add file security features to existing systems through flexible integration with various systems.
Learn more
- Product Introduction: Product Overview and Key Features
- Main Features: Complete list of provided features
- Administrator Guide: How to Use the Web Admin Console
- API Specification: How to Integrate REST API