The ReSecure solution is completely software-based. ReSec provides you with hardware requirements, and our professional services team will work with you to install the software itself, as well as all dependencies needed.
When the system identifies an encrypted file, the user is prompted to enter a password in order to sanitize the file. Encrypted files (office documents, PDFs and archives) can also be completely blocked.
The system can be deployed as cluster with dynamic load balancing with full Active-Active high availability.
Yes, a URL within the content, body of an email etc. can be analyzed. They can also completely erased or edited and replaced based on an organization set of rules.
The system can process from thousands of files per hour in its basic deployment to millions based on dynamic load balancing cluster deployment.
True file types engine includes over 300 files types.
CDR supports dozen of the most common files such as Office 2003 Office 2007+, Open Office, PDF, Image, RTF, HTML, GIS, Media, Autocad and many more.
All common archive such as Zip, rar, 7zip, tar.ga, arj, sar and many more.
Our multi scan engines will detect known threats, such as viruses, malware, ransomware etc. In addition, CDR will create a threat free replica based on a set of rules without relying on detection or knowledge in advance of the threat, stopping unknown Zero-days and malwares.
ReSecure mail, EndPoint and Web solution are priced per user annual subscription fee. Flat annual subscription fee for vectors (e.g., FTP, File Server, CyberArk etc.). This is usually designed in accordance to expected loads.
ReSec’s solutions are used by dozens of leading brands across major industries including banking and finance, manufacturing, telecom, healthcare and the public sector. The solution was tested numerous time by independent labs contractors by our customers as well as by government and military industry branches the solution was sold to.
Please see our partners page or contact us directly at email@example.com.
ReSec’s Customers and Partners benefit from wide-ranging training that includes web-based training. Online training can help provide baseline certifications, while classroom sessions, if needed, will involve deeper dive technical knowledge.
Product deployment typically takes up to a week. During this period the solution is integrated to organization’s active directory, policies are set and training and testing is done. After this period, the product will be fully operational and ready to produce results.
Please visit our careers section on the website to search and apply for position.