Some Thoughts On New Research Concerning Content Disarm & Reconstruction (CDR)
Industry colleagues forwarded me a link to a recently published research report on Content Disarm and Reconstruction (CDR) www.reportlinker.com/CDR. I did not purchase or download the report, but I did briefly scan the table of contents and summary page. Here are a couple of things that stood out:
- The factors expected to drive growth in the CDR market by double digits, are the growing number of Advanced Persistent Threats (APTs), ransomware, and zero-day attacks; and the increasing number of malware and file-based attacks.
- Several of the vendors listed in the “Company Profiles” section of the table of contents have approached OPSWAT to license our CDR technology for their use on an OEM basis.
- The summary makes no mention of a 2018 US government study of CDR solutions which rated OPSWAT as “best” of solutions tested. I encourage OPSWAT customers and prospects interested in seeing, under non-disclosure agreement, data from this study to contact us at https://www.opswat.com/contact referencing “USG study” in the comments field.
Learn more about OPSWAT Data Sanitization (CDR) here.
For more information, please contact one of our cybersecurity experts.

- Academy 22
- Advanced Threat Prevention 69
- CEO's Blog 25
- Company Announcements 145
- Company Culture 15
- CVEs 288
- Deep CDR 68
- DevSecOps 3
- Email Security 32
- Engineering Blog 3
- File Upload Security 26
- Industrial Cybersecurity 26
- Kiosk & USB Security 38
- Malware Analysis 83
- OACCP Certification 46
- OESIS Framework 137
- Product Announcements 355
- Reports 28
- Secure Access 27
- Secure Data Storage 26
- Technology Partnerships 42
- Vulnerabilities 29
- File Upload Protection – 10 Best Practices for Preventing Cyber Attacks
- Protecting Critical Infrastructure from Advanced Cyberattacks
- 6 Potential Security Gaps in File Transfer Process for Critical Infrastructure
- How the Energy Industry Can Survive Targeted Attacks
- Smarter Malware Analysis Starts Here
- Research Highlights Significant Challenges for Organizations in Responding to Malware Threats
- MetaDefender Prevents Emotet - The World’s Most Dangerous Malware
- OPSWAT Takes Proactive Steps to Close the Critical Infrastructure Protection Skills Gap
- Can A Video File Contain A Virus?