Ericom Shield

Ericom Shield

Ericom Software
+
+

Related Products

  • ManageEngine Log360
    117 Ratings
    Visit Website
  • Cynet All-in-One Cybersecurity Platform
    388 Ratings
    Visit Website
  • Guardz
    96 Ratings
    Visit Website
  • Resolver
    265 Ratings
    Visit Website
  • Blumira
    144 Ratings
    Visit Website
  • Safetica
    375 Ratings
    Visit Website
  • SpamTitan
    814 Ratings
    Visit Website
  • ThreatLocker
    491 Ratings
    Visit Website
  • Jscrambler
    32 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,109 Ratings
    Visit Website

About

Featuring Deep Secure’s unique Threat Removal technology, iX provides 100% guaranteed protection from known and even zero day malware in documents and images. Working on the perimeter, iX acts as a transparent application layer proxy. With support for a wide range of protocols and data formats, it integrates seamlessly into a range of business processes and applications. Documents are intercepted at the boundary and then re-created from scratch, clean and safe on the other side. Nothing travels end-to-end but safe content – 100% guaranteed. Stops malware being infiltrated and prevents covert outbound data loss – for example via image steganography. Deep Secure’s unique content transformation technology intercepts documents at the network boundary and then re-creates them from scratch, clean and safe on the other side. This destroys the threat. Nothing travels end-to-end but safe content.

About

Ericom Software provides businesses with Zero Trust Secure Access to corporate applications, in the cloud and on-premises, from any device or location. Ericom Shield is a clientless enterprise-grade solution that is designed to address the needs of security and IT professionals while providing a transparent Internet experience for end users using Remote Browser Isolation. Ericom Shield can be deployed across organizations of any size, on all devices, using any operating system, or browser and does not require installation of any software or plug-ins on endpoints. Files to be downloaded are scanned and cleansed using a pre-integrated, Content Disarm and Reconstruction (CDR) process, before being released to the user device. When it comes to phishing attacks, user training just isn’t enough. Ericom Shield executes email-embedded URLs away from endpoints, in remote virtual browsers in the cloud or DMZ, so no malware can reach endpoints.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Cybersecurity software for businesses that need a document malware solution

Audience

Companies searching for a solution to manage and improve their operations

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Deep Secure
Founded: 2009
United Kingdom
www.deep-secure.com/information-exchange-ix.php

Company Information

Ericom Software
Founded: 1993
United States
www.ericom.com/solutions/browser-isolation/shield_datasheet.pdf

Alternatives

Glasswall

Glasswall

Glasswall Solutions

Alternatives

FortiGate SWG

FortiGate SWG

Fortinet
Talon Enterprise Browser

Talon Enterprise Browser

Talon Cyber Security

Categories

Categories

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Integrations

Accellion
Amazon Web Services (AWS)
Boldon James Email Classifier
Sasa Software GateScanner
Sophos Email
iboss

Integrations

Accellion
Amazon Web Services (AWS)
Boldon James Email Classifier
Sasa Software GateScanner
Sophos Email
iboss
Claim Deep Secure and update features and information
Claim Deep Secure and update features and information
Claim Ericom Shield and update features and information
Claim Ericom Shield and update features and information