Audience

Cybersecurity software for businesses that need a document malware solution

About Deep Secure

Featuring Deep Secure’s unique Threat Removal technology, iX provides 100% guaranteed protection from known and even zero day malware in documents and images. Working on the perimeter, iX acts as a transparent application layer proxy. With support for a wide range of protocols and data formats, it integrates seamlessly into a range of business processes and applications. Documents are intercepted at the boundary and then re-created from scratch, clean and safe on the other side. Nothing travels end-to-end but safe content – 100% guaranteed. Stops malware being infiltrated and prevents covert outbound data loss – for example via image steganography. Deep Secure’s unique content transformation technology intercepts documents at the network boundary and then re-creates them from scratch, clean and safe on the other side. This destroys the threat. Nothing travels end-to-end but safe content.

Integrations

Ratings/Reviews

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Company Information

Deep Secure
Founded: 2009
United Kingdom
www.deep-secure.com/information-exchange-ix.php

Videos and Screen Captures

You Might Also Like
Intelligent network automation for businesses and organizations Icon
Intelligent network automation for businesses and organizations

Network automation for the hybrid multi-cloud era

BackBox seamlessly integrates with network monitoring and NetOps platforms and automates configuration backups, restores, and change detection. BackBox also provides before and after config diffs for change management, and automated remediation of discovered network security issues.

Product Details

Platforms Supported
SaaS
Training
Documentation
Live Online
Webinars
Support
Phone Support
Online

Deep Secure Frequently Asked Questions

Q: What kinds of users and organization types does Deep Secure work with?
Q: What languages does Deep Secure support in their product?
Q: What kind of support options does Deep Secure offer?
Q: What other applications or services does Deep Secure integrate with?
Q: What type of training does Deep Secure provide?

Deep Secure Product Features

Cybersecurity

IOC Verification
Behavioral Analytics
Whitelisting / Blacklisting
Tokenization
Incident Management
AI / Machine Learning
Endpoint Management
Vulnerability Scanning

Incident Response

Workflow Management
Workflow Automation
Incident Database
Incident Alerting
Incident Reporting
Incident Logs
Threat Intelligence
Security Orchestration
Automated Remediation
SLA Tracking / Management
Forensic Data Retention
Privacy Breach Reporting
Compliance Reporting
SIEM Data Ingestion / Correlation
Timeline Analysis
Attack Behavior Analytics