Protect your business against malware attacks with odix.

Cybersecurity

|

Founded in 2012, odix is a Content Disarm and Reconstruct (CDR) technology company that provides precautionary cybersecurity solutions to businesses of all sizes using a highly effective and cost-efficient approach towards network security. Developed by experts in the industry after years of serving a high-security organization specializing in infrastructure protection, encryption, network security, and mobile devices, odix focuses on providing across the board network safety by defending against malware attacks without any heavy investment in the detection and mitigation associated with current technology.  

Based in Israel, odix has offices in the USA and Europe as well and its ultimate goal is to eliminate malware for safe file usage. It develops and offers advanced anti-malware tools based on its patented CDR technology (TrueCDR) to eliminate all malicious vectors from a wide range of file types overall data channels and ensure a fully secure cyber landscape for their users. Where traditional solutions fail, odix uniquely prevents unrecognizable attacks against their customers before they even reach the network and hence, has become a trusted cybersecurity partner in diverse sectors such as industrial, finance, insurance, government, etc.  

To provide comprehensive protection, odix’s security experts constantly analyze various threats, attack codes, and patterns to stay proactive and preventive without rendering content or converting the file format. In their words, “No one can detect all malware threats – odix simply protects against them!”  

Not just individual users, businesses often think that they are completely safeguarded against any kind of cyber risk by simply employing Anti-Virus and Firewall- but are they? To learn more about odix’s technology and how it defends the enterprises against both known and unknown threats, we sat down with Dr. Oren Eytan, the CEO and founder of odix, and here’s what he told Aspioneer.

“While most legacy systems have proven effective in protecting against known risk, it is still important for a business to be on the lookout for new solutions, like CDR, which can prevent zero-day attacks.

Risk prevention+mitigation

Dr. Oren Eytan: “With over 94% of malware entering secure networks via email, it is becoming increasingly clear that businesses must prioritize the email gateways to prevent the risks of cyber-attacks. Although most of the medium and large enterprises invest millions in cybersecurity tools, many more companies remain vulnerable to new attacks and malware created daily.”  

One of the most notable pressure points of an organization’s cybersecurity infrastructure is its ability to guard against unknown malware, and hidden or embedded malicious elements within files that can bypass the existing cybersecurity systems. While most legacy systems have proven effective in protecting against known risk, it is still important for a business to be on the lookout for new solutions, like CDR, which can prevent zero-day attacks.” 

“odix’s patented CDR technology provides best in class malware prevention solutions to companies. Utilizing a CDR layer to complement traditional cybersecurity elements, our products can disarm malicious code embedded in files while providing a completely accessible sanitized document. odix’s cloud-based and on-premise solutions vary from legacy cybersecurity systems in their focus from detection and sandboxing to prevention and removal of malicious code before it is accessed by the end-user.” 

Dr. Oren Eytan, Founder & CEO, odix.
Dr. Oren Eytan, Founder & CEO, odix.

“Unlike traditional anti-malware technologies, odixing is effective against both known and unrecognized malware.”

Eliminating malware from files

Dr. Oren Eytan: “odix technology purges electronic media of malware by processing all incoming files using set policies. Files from a wide range of file types are tested to confirm that they match the respective file type standards. Then, the odix CDR Engine disarms and neutralizes subspecies code and rebuilds files into clean versions that are sent to end-users for immediate use.”   

“Unlike traditional anti-malware technologies, odixing is effective against both known and unrecognized malware. Our solutions are ideal for organizations that rely on ongoing incoming and outgoing file-based data exchange for productivity. Such exchanges provide numerous opportunities for hacking and insertion of malicious software including viruses, trojans, and worms.” 

“odix offers its patented technology in several products that can be deployed either as cloud service, for instance, FileWall for Microsoft 365 exchange online- plugin for secured email attachments or as deployment at companies’ data centers, for instance, odix NetFolder-a sanitization system for files in transit). All of odix’s malware prevention solutions enable companies to sanitize files from various channels and sources seamlessly.” 

Guiding innovation with simplification 

Dr. Oren Eytan: “CDR technology has been traditionally usually used by large enterprises as it is considered an advanced practice in the cybersecurity arena. When odix decided to make this technology viable to SMBs, the challenge became how to bring such a seemingly complex system to the technological and economic contractions of the SMB business model.” 

“For a product to meet these needs it must involve zero onboarding, low maintenance, and an attractive price point. That’s why we developed FileWall with a grant from the EU’s Horizon 2020 initiative, to make our technology available to anyone in the most attacked channel (email).” 

Upcoming strategies for the latest risks 

Dr. Oren Eytan: “odix’s core CDR technology was engineered with the assumption that attackers are and will continue to use automated tools to generate malware faster than the defenders can detect them. With this asymmetry in mind, we set out to develop capabilities that can prevent malware without relying on detection. Our CDR algorithms are detection-less and can provide effective protection against the multitude of automatically generated malware.”

Share on facebook
Share on twitter
Share on reddit
Share on linkedin
Share on whatsapp
Cybersecurity Leaders, 2020.