Zap Integrate: Our new Shopify product automation tool that helps you manage thousands of products effortlessly. Learn more

Protect your business from file-based threats

87% of ransomware is delivered via malicious documents. Our Content Disarm and Reconstruct (CDR) API removes hidden threats while preserving document functionality.

5 horizontally aligned yellow stars
"Red Eagle's CDR API gave us peace of mind when handling client document uploads."

Sarah M, Legal Services

Content Disarm and Reconstruct API illustration showing document cleaning process

The security challenge

File-based threats remain one of the most common attack vectors leading to data breaches and ransomware infections

87%

of ransomware is delivered via malicious documents

83%

of security breaches involve external actors

59%

of UK medium sized businesses experienced a breach or attack in the last 12 months

£5k

average cost to recover from an information security breach

Traditional antivirus solutions only catch known threats, leaving you vulnerable to zero-day exploits and targeted attacks. Red Eagle Tech's CDR API provides comprehensive protection against all document-based threats.

How Content Disarm and Reconstruction works

A proactive security approach that treats every file as potentially dangerous

CDR process diagram showing disarm and reconstruction phases

Validate file type and consistency. Prevent file-type masquerading attacks by verifying the true file format matches the claimed extension.

Separate the file into discrete components and remove potentially harmful objects such as macros, scripts, embedded objects, links, or any content not conforming to specifications.

Rebuild a safe file and reconstruct metadata, preserving all benign file characteristics that ensure functionality and usability.

Recompile, rename, and deliver the file, preserving file structure integrity so end users can safely use the document with all its original functionality.

Key benefits of our CDR API

Add enterprise-grade document security to your applications with minimal effort

True zero-day protection

Unlike traditional antivirus that relies on signatures, CDR removes threats regardless of whether they've been seen before, providing protection against even the newest attacks.

Simple API integration

Add document security to your applications with our easy-to-use REST API. Submit files for cleaning, track progress, and retrieve sanitised files with just a few lines of code.

Document usability

Our CDR process preserves the functionality and appearance of documents while removing only the potentially harmful elements, ensuring a seamless experience for end users.

Fully managed service

No infrastructure to maintain or security engines to update. Our cloud-based service is always up-to-date, available, and ready to protect your documents.

High performance

Process files quickly with our scalable architecture. Most documents are sanitised in less than a minute, allowing for smooth integration into your workflows.

Wide format support

Support for all major document formats including Microsoft Office documents (Word, Excel, PowerPoint), PDFs, and more. Protect your users regardless of file type.

Common use cases

Protect your organisation wherever documents are handled

File Upload Portals

Sanitise documents uploaded by customers, partners, or employees before storing them in your systems. Prevent malicious files from entering your environment through web applications.

Email Attachments

Clean email attachments before they reach users' inboxes. Integrate with your email gateway or mail processing workflow to neutralise threats before they can be opened.

Supply Chain Security

Secure document exchange between organisations. Ensure that files shared with partners, vendors, or customers are free from malware without affecting document functionality.

Document Management Systems

Integrate CDR with your document management or content management system to ensure all stored documents are sanitised, protecting your users whenever they access files.

Pricing plans

Flexible options to match your security needs and budget

Starter

£50/month

  • 1,000 documents per month
  • All supported file formats
  • REST API access
  • Standard support
  • 25MB maximum file size

Professional

Most Popular

£400/month

  • 10,000 documents per month
  • All supported file formats
  • REST API access
  • Priority support
  • 500MB maximum file size
  • API key management

Enterprise

Custom

  • Unlimited documents
  • All supported file formats
  • REST API access
  • 24/7 Premium support
  • Unlimited file size
  • Multiple API keys
  • Dedicated account manager

Ready to protect your documents from cyber threats?

Book a free, no-obligation consultation to see how the CDR API can safeguard your organisation.

Technical specifications

Designed for easy integration and reliable operation

API Features

  • API Type RESTful
  • Authentication API Key + HMAC Signature
  • Request Format JSON / Multipart Form
  • Response Format JSON
  • Documentation OpenAPI / Swagger

Operational Details

  • File Size Limit Variable per plan (see pricing)
  • Processing Time ~1 minute (typical)
  • Availability 99.9% SLA
  • Data Retention Configurable (up to 7 days)
  • Hosting Microsoft Azure (UK South)

Our CDR API is built on enterprise-grade infrastructure with security and reliability at its core. All data is processed and stored in UK data centres, ensuring compliance with data protection regulations.

Frequently Asked Questions

Content Disarm and Reconstruction (CDR) is a proactive security technology that assumes all files might contain malicious code. It works by disassembling files, removing potentially harmful elements, and rebuilding clean versions that maintain functionality. Unlike traditional detection-based methods, CDR provides protection against known and unknown (zero-day) threats.

Traditional antivirus software works by detecting known threats using signatures or heuristics. This approach can miss zero-day exploits and sophisticated attacks. CDR takes a fundamentally different approach by assuming all files are potentially dangerous and removing any elements that could be used for malicious purposes, regardless of whether they've been seen before.

Our CDR API supports all major document formats including Microsoft Office files (Word, Excel, PowerPoint), PDFs, and more. Specifically, we support DOC, DOCX, XLS, XLSX, XLSM, PPT, PPTX, PDF, and many other variations. Please refer to our technical documentation for a complete list of supported formats.

Integration is straightforward through our REST API. You'll submit files for processing, receive a unique ID, check the processing status, and then retrieve the sanitised file when ready. We provide detailed API documentation, code examples in multiple languages, and dedicated support to help with integration.

Our CDR API is designed to preserve document functionality while removing potentially harmful elements. Basic content, formatting, and structure will remain intact. However, active content like macros, scripts, and certain embedded objects will be removed as these are common malware vectors. For most business documents, users will notice no difference in functionality.

Security is our top priority. The service is hosted on Microsoft Azure with industry-standard security practices in place. All communications use HTTPS with TLS 1.2+. Authentication requires both an API key and HMAC signatures. Files are securely stored and automatically deleted after 7 days. We comply with relevant data protection regulations and can provide details on our security controls upon request.

Ready to dive deeper?

Explore our comprehensive technical documentation to learn more about integrating the CDR API into your applications.

View API Documentation

Book a free, no obligation consultation today.

Press Request free consultation to find out what to expect and make a booking

Choose the service you need below.

There's an option below if you're not sure, too.

I need help with software engineering including:

  • - Website or app development
  • - Business intelligence solutions
  • - System integration

I need help with IT operations including:

  • - Managed services and IT helpdesk support
  • - Cybersecurity solutions
  • - Cloud services

I need help with technology governance including:

  • - Virtual Chief Technology Officer
  • - Compliance and certifications
  • - Consulting and projects

I'm not sure what I need

No worries, let's talk. We can find a solution together.

Our partners

Microsoft Partner logo
CrowdStrike logo
Check Point logo
NinjaOne logo
QuickBooks logo
Shopify Partners logo
Axcient logo
Perimeter 81 logo