Unknown cyber threats keep emerging


Traditional anti-malware solutions are based on detection methods and as a result, they lack the ability to detect Zero-Day attacks. odix’s Detectionless patented process handles all types of commonly used files and uses a unique mathematical algorithm specially adapted to each file type which disarms any hidden malicious code.

odix proprietary Deep File Inspection (TrueCDR™) technology includes a revolutionary process that removes all malware, known and unknown, hidden inside innocent-looking files.

odix-based solutions provide dramatically enhanced information security for organizations, without compromising system performance. The solution comprises several components, all based on odix's core True Content Disarm and Reconstruction (TrueCDR™) technology.


odix FileWall™ is a native CDR plugin for all Microsoft 365 mailboxes.

FileWall™ is a native file sanitization plugin for all Microsoft 365 mailboxes. Leveraging odix’s unique Content Disarm and Reconstruction (CDR) technology, FileWall complements Microsoft’s Exchange Online Protection (EOP) & Defender (formerly Advanced Threat Protection - ATP), providing effective, real-time protection against email attachment-based attacks.

Features, Benefits & Capabilities:

  • One-click service activation for seamless deployment
  • Effective for both internal and external senders
  • Protects against both known and unknown attacks
  • Suitable to work as an add-on with EOP & Defender
  • High level of client adoption with no sandbox-related delays
  • Deep File Inspection including archive, password-protected, etc


odix NetFolder is a secure and simple way to scan and sanitize files on the move. Works with any network files application.

NetFolder can be deployed in multiple scenarios and use cases such as securing web uploads files from a company portal to its network, safe file uploads in the self-service portal, secure FTP between networks, and more.

Features, Benefits & Capabilities:

  • Eliminating the threat of commonly used files from multiple sources to support various business processes such as:
    • Web downloads to the network
    • Web uploads of candidates CV
    • Attachments upload in Self-service portal
    • Safe files upload in suppliers portal
    • Secure FTP between networks
    • Robotic Process Automation (RPA) in which files are processed
    • Virtual vaults
  • Flexible deployment at the customer premises or as managed cloud service on Microsoft Azure.