top of page

Yazam API

Conventional Security

Unconventional Threats

Conventional Security for third-party applications (such as ● Firewalls ● Antivirus ● Antimalware ● Web proxies ● Secure browsers ● EDR/XDR ● WAF ● Sandboxes) screens against known vulnerabilities and common malware. Yet, these systems often lack the deep content analysis and active neutralization capabilities required to combat complex, polymorphic, or zero-day threats hidden within arrived files.

Risky Pathways

By Third-Party Applications

Organizational websites, organizationally private developed applications, and security systems (such as Web Proxies) frequently involve receiving files from external entities and integrating them into internal workflows. This essential functionality, however, represents a significant entry point for sophisticated file-based cyber threats.

Yazam API

Using the Yazam API (Application Programming Interface) to integrate Yazam's powerful filtering, based on CDR technology, into your organizational website, organizationally developed applications, and security systems (such as Web Proxies). This solution proactively disarms and reconstructs the inbound files, ensuring that only clean, legitimate content enters your protected networks. It provides a robust defense against embedded threats, safeguarding the files entered by your applications

Main features:

  • Yazam API is implemented by some protocols: ● Web Interface ● Distributed COM (DCOM) ● Command Line Utility ● ICAP.

  • The third-party application can be installed near the Yazam Engine or remotely (over the internet).

  • Yazam Engine can be installed on-premise or supplied as a service (SaaS).

  • No human user involvement in the filtering process.

  • API pushes to the Yazam Engine: ● original files ● policy name ● passwords for encrypted files.

  • API pulled from the Yazam Engine: ● filtering results ● filtered files.

  • Isolation between filtering sessions.

  • Logging the CDR filtering results.

  • Quarantines blocked files and objects.

  • Speedy filtering process on standard hardware.

bottom of page