Announcing Content Disarm and Reconstruction for Linux

Our powerful MetaDefender data sanitization (Content Disarm and Reconstruction) technology is intended to keep any organization safe from document-borne malware, malware-carrying images, and other infected files. We are excited to announce the beta release of data sanitization (CDR) for Linux® to extend this protection to Linux systems.
With this beta release of Linux data sanitization, MetaDefender will be able to protect even more endpoints and systems.

Currently, we support 10 different file types on Linux: DOC, DOCX, XLSX, PPTX, PDF, JPG, BMP, PNG, TIFF, and GIF.
The table below shows the file types and file type conversions supported for this beta release:
Supported File Types for Linux (BETA)
Source File Type | Target Sanitized Types |
DOC | DOC, PDF |
DOCX | DOCX, TXT, HTML, PDF |
XLSX | XLSX, CSV, HTML |
PPTX | PPTX |
PDF, BMP | |
JPG | JPG, BMP, PNG, TIFF, SVG, GIF, PS, EPS, PDF |
BMP | BMP, JPG, PNG, TIFF, SVG, GIF, PS, EPS, PDF |
PNG | PNG, JPG, BMP, TIFF, SVG, GIF, PS, EPS, PDF |
TIFF | TIFF, JPG, BMP, PNG, SVG, GIF, PS, EPS |
GIF | JPG, BMP, PNG, TIFF, SVG, PS, EPS, PDF |
We will continue to build out our Linux Content Disarm and Reconstruction functionality in order to include all the file types we support in our current data sanitization/CDR offering — and more.
Contact support or sales if you would like to evaluate beta Linux data sanitization to try this in your environment.
Linux® is the registered trademark of Linus Torvalds in the U.S. and other countries.
For more information, please contact one of our cybersecurity experts.

- Academy 22
- Advanced Threat Prevention 69
- CEO's Blog 25
- Company Announcements 145
- Company Culture 15
- CVEs 288
- Deep CDR 68
- DevSecOps 3
- Email Security 32
- Engineering Blog 3
- File Upload Security 26
- Industrial Cybersecurity 26
- Kiosk & USB Security 38
- Malware Analysis 83
- OACCP Certification 46
- OESIS Framework 137
- Product Announcements 355
- Reports 28
- Secure Access 27
- Secure Data Storage 26
- Technology Partnerships 42
- Vulnerabilities 29
- File Upload Protection – 10 Best Practices for Preventing Cyber Attacks
- Protecting Critical Infrastructure from Advanced Cyberattacks
- 6 Potential Security Gaps in File Transfer Process for Critical Infrastructure
- How the Energy Industry Can Survive Targeted Attacks
- Smarter Malware Analysis Starts Here
- Research Highlights Significant Challenges for Organizations in Responding to Malware Threats
- MetaDefender Prevents Emotet - The World’s Most Dangerous Malware
- OPSWAT Takes Proactive Steps to Close the Critical Infrastructure Protection Skills Gap
- Can A Video File Contain A Virus?