Secure File Gateway
100% Protection from Weaponized Files
Content technology thoroughly examines each file to verify that its format adheres to the vendor’s specifications and to detect impersonation. Disarm technology injects micro changes and roadblocks into the exploit’s execution flow. Macros, scripts, and other suspicious embedded objects and elements are identified and removed. Reconstruction technology somewhat differently from the original file and exhibits a well-known structure based on the file format’s specifications. All malicious code and exploit threats have been disarmed, and all the original functionality of the file is intact.
By design, an exploit targets a vulnerability in an application and typically triggers an intruder’s code. A vulnerability is a “hole” in an application, Adobe Reader (as an example) that can be exploited to launch an attack on a computer or network system. A common method used by attackers to exploit vulnerabilities is spear phishing: sending targeted email messages that contain a malicious attachment and look harmless to the recipients. When a recipient opens the attachment, malware is deployed, and the targeted attack begins.
Votiro products listed below are protected by patents in the Unites States. This web page is provided to satisfy the virtual patent marking provisions of various jurisdictions including the virtual patent marking provisions of the America Invents Act.