Working on the perimeter, iX acts as a transparent application layer proxy. With support for a wide range of protocols and data formats, it integrates seamlessly into a range of business processes and applications.

 DOWNLOAD DATASHEET

Safe Content

Deep Secure’s unique content transformation technology intercepts documents at the network boundary and then re-creates them from scratch, clean and safe on the other side. This destroys the threat. Nothing travels end-to-end but safe content.

 

Request a demo Contact us

Protocols:

HTTP/HTTP(S)

SMTP

Framed TCP, UDP

Formats:

Office formats
(Microsoft Office, PDF, etc.)

Image formats

Structured data
(JSON, XML, etc.)

Deployments:

  • Cloud

  • Physical

  • Virtual

Integration

For systems that face the most sophisticated attackers, a pair of iX appliances can be deployed separated by Deep Secure’s High Speed Verifier (HSV).

The HSV provides independent verification implemented in hardware logic and as such uses none of the software and networking components that might house a backdoor exploit or make it vulnerable to attack.

 

Request a demo Contact us