Some Thoughts On New Research Concerning Content Disarm & Reconstruction (CDR)
Industry colleagues forwarded me a link to a recently published research report on Content Disarm and Reconstruction (CDR) www.reportlinker.com/CDR. I did not purchase or download the report, but I did briefly scan the table of contents and summary page. Here are a couple of things that stood out:
- The factors expected to drive growth in the CDR market by double digits, are the growing number of Advanced Persistent Threats (APTs), ransomware, and zero-day attacks; and the increasing number of malware and file-based attacks.
- Several of the vendors listed in the “Company Profiles” section of the table of contents have approached OPSWAT to license our CDR technology for their use on an OEM basis.
- The summary makes no mention of a 2018 US government study of CDR solutions which rated OPSWAT as “best” of solutions tested. I encourage OPSWAT customers and prospects interested in seeing, under non-disclosure agreement, data from this study to contact us at https://www.opswat.com/contact referencing “USG study” in the comments field.
Learn more about OPSWAT Data Sanitization (CDR) here.

- ファイルアップロードの保護 – 10 のベストプラクティスで サイバー攻撃を防御
- MetaDefenderによる世界で最も危険なマルウェアEmotetの防御
- OPSWAT Expands Global Availability of Critical Infrastructure Protection
- OPSWAT Announces Expansion of Cybersecurity Training Program
- Avoiding storage data leaks and PII regulation noncompliance
- How OPSWAT Can Help Detect and Prevent the VMware WorkSpace ONE Access exploit (CVE-2020-4006)
- Protecting Critical Infrastructure from Advanced Cyberattacks
- MetaDefender Cloud Hash Reputation Database Now Exceeds 40 Billion
- OPSWAT Continues to Expand OESIS Framework with New Partners
- 6 Potential Security Gaps in File Transfer Process for Critical Infrastructure