About Glasswall Meteor
    • PDF

    About Glasswall Meteor

    • PDF

    Article Summary

    Users receive files on their work computers in a variety of ways. Automatically remove potential threats from files (including threats antivirus software hasn’t detected yet). With Glasswall Meteor, employees can drag and drop files from the outside world into Glasswall Halo – so they’re free to use files without risk.

    Enable employees to safely work with any file

    • Enable users to work risk-free with any file received outside your organization
    • Instantly disarm threats in files from unknown sources (e.g. a customer’s USB drive)
    • Users get immediate feedback on risks identified in a file and how they were removed
    • Retain both original and rebuilt files for audit purposes

    Use Cases

    • File uploads or downloads from unknown source
    • Malware risk removal
    • Zero Day threat defence

    How it works

    Glasswall Meteor uses the patented Glasswall Halo to inspect, clean and rebuild every file to its known good state in real-time–proactively protecting your organization against the most persistent and complex file-based threats.


    Was this article helpful?