
File-borne threats that originate from outside the organization, or those accidently shared within, pose significant security risks that can hobble entire teams, SOCs, third-party vendors, and customers alike. Harboring zero-day malware and ransomware that remain undetectable by traditional solutions like AV or EDR, these attacks use trusted file types to execute a wide range of malware such as rootkits, spyware, malformed scripts, and hidden URLs to quickly propagate throughout an organization–locking down systems while also risking the exfiltration of sensitive and regulated data.
When a day-one threat is a day too late to prevent disaster, and as malware and ransomware threats continue to bypass traditional solutions, organizations require a Zero Trust integration that doesn’t compromise on trust, speed, or function.
Menlo File Security proactively disarms and rebuilds every file before it can enter your ecosystem—without forcing downtime or sacrificing file functionality. Our scalable, Zero Trust solution works behind the scenes to enable the seamless download, upload, storage, and sharing of files, whether that’s via collaboration tools, email, web portals, or other applications.

Also known as Content Disarm and Reconstruction (CDR), our technology ensures all files (unless otherwise specified) are disarmed and rebuilt—no matter where they came from, how many times, or if they’ve been deemed “safe” by elsewhere.

Menlo eliminates zero-day threats created by bad actors or generated by AI platforms and LLMs, which means organizations can save money by consolidating redundant technology and stay ahead of the rising threat of GenAI attacks.

Our patented sanitization technology automatically rebuilds and safely delivers over 220 common and complex file types (i.e., macros, archives, password-protection) to end-users with no loss in fidelity or increase in latency.
Stop Known and Unknown Threats in 220+ File Types, While Safely Preserving Macros
6 minute demo video. Learn how we prevent file-borne threats (and more) during browsing sessions, file downloads, and file uploads.

Menlo is an expert in identifying, disarming, and fully rebuilding over 220 file types, including complex ones like archives, ZIP, and password-protected files. This means, no matter what threat is sent your way or what entry point it uses, the proactive nature of Menlo prevents it from compromising your system without interrupting the file’s intended purpose.

"It’s totally transparent to users. The table stake [was] isolation of my browser activity away from the local browser on the endpoint. Because Menlo’s working at the browser level, it’s actually able to see all the traffic."
— ALYN Hospital Representative
ALYN Woldenberg Family Hospital is a Jerusalem-based rehabilitation center for children and young adults with physical disabilities. For over eighty years, it has offered a holistic approach that addresses the physical, emotional, and social needs of both the patients and their families
Jerusalem's ALYN Hospital , a pediatric rehabilitation center, was targeted by a sophisticated phishing email containing a weaponized Word document. The attack used malicious macros and evasion techniques to bypass traditional detection. By using Positive Selection technology , the malicious macro was automatically stripped from the file before the employee opened it, instantly neutralizing the threat. This provided 100% protection and gave the hospital the flexibility to safely download files, a capability their previous vendor, which blocked 70% of desired files, could not offer.
By combining the power of Menlo Cloud with proactive File Security (CDR/AV/etc.), organizations around the world are able to safely access the web while also downloading, uploading, and sharing essential files with internal team members and third-parties via SaaS applications, collaboration tools, email, web portals, and more.
From critical infrastructure to highly regulated financial services to media and sports outlets, learn why global industries use Menlo to disarm and deliver secure files at scale.

Not satisfied with its traditional approach, a regional credit union replaced a well-known secure email gateway with Menlo to deliver a fast, simplified, and proven solution for file-borne threats. Not only does this stop threats, it prevents the downstream exfiltration of sensitive PCI and PII data.
Menlo solved the file security challenges that faced a major, international shipping company with installations both on-premises and in SaaS, accommodating both its Microsoft Azure and internal infrastructure. This allows the shipping company to receive safe files from its 800+ subsidiaries around the globe.


With upload portals providing threat actors a quick path to hidden malware deployment, a large utility provider chose to secure its own portal with Menlo, safeguarding its network and the 250,000+ files it ingests yearly.
Answers to the burning questions in your mind.
Unlike detection-based solutions like standalone AV, EDR, and DLPs that scan for suspicious elements and block and/or flatten some malicious files and miss others, Menlo’s technology automatically rebuilds every single file to deliver 100% safe content without the need to detect malicious elements—no blocking, just proactive prevention.
Email: Completely secure every email attachment and suspicious URL.
Web Applications: Sanitize uploaded files via web portal.
Web Browser: In just milliseconds, user downloads are disarmed and rebuilt.
Collaboration Tools: User-to-user file sharing is made secure in real-time.
Content Disarm and Reconstruction happens in real-time, in just milliseconds, leaving the experience completely transparent to end-users. This includes an initial AV scan and hash checking that is near-instantaneous within the CDR process. For sandboxing, the process is as short or as long as the security team deems necessary.
No. Menlo File Security is agentless and integrated via open API depending on the use case. In cases where organizations require on-prem installation, Menlo can accommodate.
As an established browser-agnostic security solution, Menlo natively protects customers from malicious web downloads that move beyond the browser.
Absolutely. Our in-depth threat analytics provide teams with the following:
File type and origin – whether the threat came from an email attachment, browser download, API, or cloud collaboration tool.
Type of malicious content removed – including macros, scripts, exploits, and ransomware payloads.
Hashes, file names, and behavioral indicators – identifiers that trace how similar threats evolve or spread.
Recurring campaigns and targeted users – highlighting which departments, users, or workflows are being probed most frequently.
Menlo can sanitize and rebuild over 220 different file types. This includes complex ones like ZIP, archives, and password-protected files.
For a full list, head here.
Take a self-guided tour to observe some of the ways that Menlo products enable secure app access, block sophisticated attacks, and provide critical insight into browsing sessions.
See exactly how Menlo can be tailored to solve your unique security challenges. We offer a live demo customized to your teamʼs goals, showing you how to secure your stack and protect your users. A truly secure browsing experience is one click away.
