
Banks, insurance agencies, and countless service providers use upload portals to accept a wide variety of sensitive files and documents uploaded by third-parties. And in order to keep business moving freely, these organizations must quickly ingest these files without the risk of hidden threats that can cripple entire systems and expose customer information. But there’s no telling where these files came from or what threats could be hiding inside.
While other file security "solutions" will outright block files or convert them into PDFs, this leaves employees with safe, yet useless files—which is entirely counterproductive. Meanwhile, manual processes like quarantining only serve to hold up business and cause frustration for both team members and third-parties alike. To ensure safe file uploads without sacrificing usability and speed, enterprises need to proactively sanitize files while simultaneously retaining necessary components like macros and other active content.
At Menlo Security, we use time-tested, AI-trained technology to do just that. You may call it CDR or file sanitization. We call it Positive Selection®.
This solution brief covers the solution of Menlo Cloud unified with Next-gen Content Disarm and Reconstruction (CDR)

The availability of a 24/7 web portal is essential for many organizations, allowing customers and vendors to upload forms, documents, and a variety of file types wherever they are. Yet, while they increase productivity, bulk file ingestion can also expose businesses to hidden malware—whether it's via a simple online portal setup or a custom web application.
For enterprises processing hundreds, if not thousands of files per day, security teams simply cannot keep up without forcing bottlenecks or human error. Meanwhile, some malware can evade sandboxes and AV solutions only recognize known threats, which means zero-days are likely to make their way in. Powered by a combination of next-gen file sanitization, hash check, AV, and sandbox, Menlo File Security gives you the ability to close the gaps left behind by traditional solutions like EDR, DLP, and AV/sandboxing when used on their own.
By taking Menlo's proactive approach to file security, teams don't have to wait for a file to breach the endpoint. Instead, all uploads are made safe as they happen – in just milliseconds – before they ever reach cloud applications or storage.
Answers to the burning questions in your mind.
Unlike detection-based solutions like standalone AV, EDR, and DLPs that scan for suspicious elements and block and/or flatten some malicious files and miss others, Menlo’s technology automatically rebuilds every single file to deliver 100% safe content without the need to detect malicious elements—no blocking, just proactive prevention.
Email: Completely secure every email attachment and suspicious URL.
Web Applications: Sanitize uploaded files via web portal.
Web Browser: In just milliseconds, user downloads are disarmed and rebuilt.
Collaboration Tools: User-to-user file sharing is made secure in real-time.
Content Disarm and Reconstruction happens in real-time, in just milliseconds, leaving the experience completely transparent to end-users. This includes an initial AV scan and hash checking that is near-instantaneous within the CDR process. For sandboxing, the process is as short or as long as the security team deems necessary.
No. Menlo File Security is agentless and integrated via open API depending on the use case. In cases where organizations require on-prem installation, Menlo can accommodate.
As an established browser-agnostic security solution, Menlo natively protects customers from malicious web downloads that move beyond the browser.
Absolutely. Our in-depth threat analytics provide teams with the following:
File type and origin – whether the threat came from an email attachment, browser download, API, or cloud collaboration tool.
Type of malicious content removed – including macros, scripts, exploits, and ransomware payloads.
Hashes, file names, and behavioral indicators – identifiers that trace how similar threats evolve or spread.
Recurring campaigns and targeted users – highlighting which departments, users, or workflows are being probed most frequently.
Menlo can sanitize and rebuild over 220 different file types. This includes complex ones like ZIP, archives, and password-protected files.
For a full list, head here.
Take a self-guided tour to observe some of the ways that Menlo products enable secure app access, block sophisticated attacks, and provide critical insight into browsing sessions.
See exactly how Menlo can be tailored to solve your unique security challenges. We offer a live demo customized to your teamʼs goals, showing you how to secure your stack and protect your users. A truly secure browsing experience is one click away.

Discover why organizations around the world rely on Menlo Security to protect the enterprise and enable secure access to applications, preventing attacks that legacy security tools cannot stop.
Jerusalem's ALYN Hospital , a pediatric rehabilitation center, was targeted by a sophisticated phishing email containing a weaponized Word document. The attack used malicious macros and evasion techniques to bypass traditional detection. By using Positive Selection technology , the malicious macro was automatically stripped from the file before the employee opened it, instantly neutralizing the threat. This provided 100% protection and gave the hospital the flexibility to safely download files, a capability their previous vendor, which blocked 70% of desired files, could not offer.