+
+

Related Products

  • ConnectWise SIEM
    191 Ratings
    Visit Website
  • Blumira
    145 Ratings
    Visit Website
  • Control D
    182 Ratings
    Visit Website
  • Criminal IP
    15 Ratings
    Visit Website
  • ThreatLocker
    499 Ratings
    Visit Website
  • UTunnel VPN and ZTNA
    118 Ratings
    Visit Website
  • ManageEngine Log360
    140 Ratings
    Visit Website
  • Auvik
    672 Ratings
    Visit Website
  • ManageEngine EventLog Analyzer
    190 Ratings
    Visit Website
  • SOCRadar Extended Threat Intelligence
    90 Ratings
    Visit Website

About

Threat detection provides deep inspection of every single network packet including transported data with: Network protocol discovery and validation – easily check unknown and hidden protocols. Machine Learning algorithms – proactive traffic risk-scoring. Network steganography detection of hidden network traffic, including data leaks, espionage channels, and botnets. Proprietary steganography detection algorithms – effective way of uncovering methods of hiding information. Proprietary steganography signature database – comprehensive collection of known network steganography methods. Forensics to better measure the ratio of security events against source of traffic. Extraction of high-risk network traffic – easy to analyze and focus on specific threat levels. Storage of processed traffic metadata in extended format – faster trend analysis.

About

Featuring Deep Secure’s unique Threat Removal technology, iX provides 100% guaranteed protection from known and even zero day malware in documents and images. Working on the perimeter, iX acts as a transparent application layer proxy. With support for a wide range of protocols and data formats, it integrates seamlessly into a range of business processes and applications. Documents are intercepted at the boundary and then re-created from scratch, clean and safe on the other side. Nothing travels end-to-end but safe content – 100% guaranteed. Stops malware being infiltrated and prevents covert outbound data loss – for example via image steganography. Deep Secure’s unique content transformation technology intercepts documents at the network boundary and then re-creates them from scratch, clean and safe on the other side. This destroys the threat. Nothing travels end-to-end but safe content.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Cybersecurity solution for anyone

Audience

Cybersecurity software for businesses that need a document malware solution

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Cryptomage
Founded: 2015
Poland
cryptomage.io/cybereye

Company Information

Deep Secure
Founded: 2009
United Kingdom
www.deep-secure.com/information-exchange-ix.php

Alternatives

Alternatives

Glasswall

Glasswall

Glasswall Solutions
Telesoft CERNE

Telesoft CERNE

Telesoft
SandBlast Threat Extraction

SandBlast Threat Extraction

Check Point Software Technologies
NexVision

NexVision

NexVision Lab

Categories

Categories

Integrations

Accellion
Amazon Web Services (AWS)
Boldon James Email Classifier
Sophos Email
iboss

Integrations

Accellion
Amazon Web Services (AWS)
Boldon James Email Classifier
Sophos Email
iboss
Claim Cryptomage and update features and information
Claim Cryptomage and update features and information
Claim Deep Secure and update features and information
Claim Deep Secure and update features and information