
File processing (CDR)
A critical layer of protection for incoming files
The Problem: The Legitimate File Paradox
Files enter an organization from many directions – email, mobile devices, file transfer platforms and sharing systems. Most of these files are completely legitimate and necessary for ongoing work. The problem is that even a regular Word file or business PDF can contain active components – macros, scripts, or embedded code – designed to run in the background and exploit system weaknesses.
The solution: CDR – “Deep Cleaning” technology
CDR – Content Disarm and Reconstruction file processing This works like a sophisticated cleaning facility in a factory. It essentially takes every file that comes in and breaks it down into its smallest parts – like taking apart a car into all its screws and parts. It inspects each part, removes what is potentially dangerous (the malicious code), and rebuilds the file – with only the “good” parts.
The result? A file that looks and works exactly like the original, but without any of the risk.
How it works in practice
Entry points – the sources of risk
- Email:
The most popular way to introduce malware. Seemingly innocent attachments can become a key to open your entire system. - Mobile devices:
That USB or portable drive that an employee brought from home could contain unpleasant surprises from his home computer. - File transfers from the Internet:
Files from suppliers, customers, or websites – it is imperative to ensure that they all go through the cleaning process. - Secure systems:
Even encrypted or digitally signed files can contain dangerous active components.
Why relying only on an antivirus isn’t enough
Think of it this way: An antivirus is like a police officer searching for criminals based on photos from authorities (known signatures). If the criminal has changed in appearance or is new to the scene, the police officer won’t recognize him.
CDR works differently: It doesn’t look for specific criminals. Instead, it removes the ability of any file to be dangerous – like taking away the ability of any stranger to cause harm, before they enter a building, regardless of who they are or what their intentions are.
The practical benefits
- Protection from the unknown:
CDR protects against threats that no one knows about yet – even those that developers created just last night. - Full transparency:
Your users continue to work just as before. They open the files, edit them, and share them – without noticing that they have been whitewashed. - Automation:
There is no need for complex decisions, or security personnel to decide on each file individually. The system simply runs 24/7, non-stop.
How to implement this correctly
- Smart policy definition
Not every file is the same. A PDF file sent via email needs different treatment than an Excel file from a familiar provider. The key is to set up appropriate rules for each type of content and each channel. - Integration with existing tools
CDR is not meant to replace antivirus or other security systems – it complements them. It’s like wearing a seat belt, activating airbags, and driving carefully. - Monitoring and control
It’s important to know what’s happening: how many files were cleaned, where they came from, and what’s in them. This information helps understand attack patterns and improve defense.
Why this is critical nowadays
In a world where working from home has become the norm, files enter an organization from all directions. Employees download files at home, transfer them through various tools, and bring them to work. Each such file is a potential opening for an attacker.
A CDR file laundering system gives you peace of mind: you’ll know that every file that enters the organization has undergone a “thorough inspection” and has come out clean. This is not a technological luxury – it’s basic protection in the digital age.




