Re: The Cloud...
I wish I could offer you more upvotes. Wiser words are rarely spoken.
3 posts • joined 15 Jan 2016
Check Point's Threat Extraction technology does exactly this already. Works slick. Initial PDF/Office attachment is a malware free PDF copy. If the end user requires the original they can request it but it still goes through Sandboxing(Threat Emulation). All configurable as well depending on senders and recipients if you happen to inherently trust one or the other.
Browser plugin coming soon for Chrome that does the same.
Biting the hand that feeds IT © 1998–2022