
Yazam API
Conventional Security
Unconventional Threats
Conventional Security for third-party applications (such as ● Firewalls ● Antivirus ● Antimalware ● Web proxies ● Secure browsers ● EDR/XDR ● WAF ● Sandboxes) screens against known vulnerabilities and common malware. Yet, these systems often lack the deep content analysis and active neutralization capabilities required to combat complex, polymorphic, or zero-day threats hidden within arrived files.
Risky Pathways
By Third-Party Applications
Organizational websites, organizationally private developed applications, and security systems (such as Web Proxies) frequently involve receiving files from external entities and integrating them into internal workflows. This essential functionality, however, represents a significant entry point for sophisticated file-based cyber threats.
Yazam API
Using the Yazam API (Application Programming Interface) to integrate Yazam's powerful filtering, based on CDR technology, into your organizational website, organizationally developed applications, and security systems (such as Web Proxies). This solution proactively disarms and reconstructs the inbound files, ensuring that only clean, legitimate content enters your protected networks. It provides a robust defense against embedded threats, safeguarding the files entered by your applications
Main features:
-
Yazam API is implemented by some protocols: ● Web Interface ● Distributed COM (DCOM) ● Command Line Utility ● ICAP.
-
The third-party application can be installed near the Yazam Engine or remotely (over the internet).
-
Yazam Engine can be installed on-premise or supplied as a service (SaaS).
-
No human user involvement in the filtering process.
-
API pushes to the Yazam Engine: ● original files ● policy name ● passwords for encrypted files.
-
API pulled from the Yazam Engine: ● filtering results ● filtered files.
-
Isolation between filtering sessions.
-
Logging the CDR filtering results.
-
Quarantines blocked files and objects.
-
Speedy filtering process on standard hardware.


