Audience

Cybersecurity software for businesses that need a document malware solution

About Deep Secure

Featuring Deep Secure’s unique Threat Removal technology, iX provides 100% guaranteed protection from known and even zero day malware in documents and images. Working on the perimeter, iX acts as a transparent application layer proxy. With support for a wide range of protocols and data formats, it integrates seamlessly into a range of business processes and applications. Documents are intercepted at the boundary and then re-created from scratch, clean and safe on the other side. Nothing travels end-to-end but safe content – 100% guaranteed. Stops malware being infiltrated and prevents covert outbound data loss – for example via image steganography. Deep Secure’s unique content transformation technology intercepts documents at the network boundary and then re-creates them from scratch, clean and safe on the other side. This destroys the threat. Nothing travels end-to-end but safe content.

Integrations

Ratings/Reviews

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Company Information

Deep Secure
Founded: 2009
United Kingdom
www.deep-secure.com/information-exchange-ix.php

Videos and Screen Captures

Other Useful Business Software
AI-powered service management for IT and enterprise teams Icon
AI-powered service management for IT and enterprise teams

Enterprise-grade ITSM, for every business

Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
Try it Free

Product Details

Platforms Supported
Cloud
Training
Documentation
Live Online
Webinars
Support
Phone Support
Online

Deep Secure Frequently Asked Questions

Q: What kinds of users and organization types does Deep Secure work with?
Q: What languages does Deep Secure support in their product?
Q: What kind of support options does Deep Secure offer?
Q: What other applications or services does Deep Secure integrate with?
Q: What type of training does Deep Secure provide?

Deep Secure Product Features

Cybersecurity

IOC Verification
Behavioral Analytics
Whitelisting / Blacklisting
Tokenization
Incident Management
AI / Machine Learning
Endpoint Management
Vulnerability Scanning

Incident Response

Workflow Management
Workflow Automation
Incident Database
Incident Alerting
Incident Reporting
Incident Logs
Threat Intelligence
Security Orchestration
Automated Remediation
SLA Tracking / Management
Forensic Data Retention
Privacy Breach Reporting
Compliance Reporting
SIEM Data Ingestion / Correlation
Timeline Analysis
Attack Behavior Analytics