What file types can you clean?

What happens if you can not clean a particular file type?

Will my file still be editable after you have cleaned it?

How long does it take to clean a file?

What Secure Web Gateways do you work with?

Do you store my data in the cloud?

Does your solution need access to the Internet?

Does your solution require hourly/daily signature updates?

Does your solution clean Webmail?

How can I integrate your technology into my portal?

Where does the technology sit in an architecture?

Can this replace my AV scanner?

Can this replace my sandbox?

Who are your customers?

Can you handle password protected files?

Can you handle macros?

 

 

 

 

 

 

What file types can you clean?

Threat Removal appliances can clean the following file types:

Threat Removal cloud APIs can clean the following file types:

What happens if you can not clean a particular file type?

Unsupported file types can be configured to be delivered or redacted depending on the needs of the deployment.

Will my file still be editable after you have cleaned it?

Yes, 100%. Transformed files are delivered in the original file format, are fully revisable and pixel perfect.

How long does it take to clean a file?

The process of transforming and rendering a file safe typically takes fractions of a second. Even for very large and complex files, the time taken to transform with be a fraction of that associated with a sandbox.

What Secure Web Gateways do you work with?

Deep Secure’s Gateway eXtension (GX) product will plugin to any ICAP compliant Secure Web Gateway (SWG), Next Generation Firewall or other perimeter Web security defence that supports the respmod mode in ICAP. Some examples include the McAfee Web Gateway, Symantec Bluecoat Proxy SG, iboss Secure Cloud Gateway, F5 BIG-IP Application Delivery Controller.

Do you store my data in the cloud?

Deep Secure’s Threat Removal as a Service cloud APIs never store your files permanently in the cloud. The S3 API temporarily stores data within the AWS region that the API is running in.

Does your solution need access to the Internet?

Deep Secure Threat Removal appliances do not require access to the internet.

Does your solution require hourly/daily signature updates?

Deep Secure Threat Removal technology does not require any signature updates.

Does your solution clean Webmail?

Yes, users that connect to a web mail service such as Gmail or Hotmail will be protected from malicious attachments downloaded from emails.

How can I integrate your technology into my portal?

You can do this using the Threat Removal as a Service API (See Threat Removal Development Platform). Alternatively you can use a GX Appliance connected over ICAP to a customer boundary device protecting the customer portal. Devices include Firewall, Web Application Firewall, Load Balancer, Application Delivery Controller, Reverse Proxy.

Where does the technology sit in an architecture?

When delivered as an appliance, the technology sits at the boundary of an organisation (either on-premise or in the cloud). When delivered via the API, the technology is built into the customer application “security as code”.

Can this replace my AV scanner?

Yes, this technology can replace AV scanners where the file types that need to be handled are in the above list of supported file types.

Can this replace my sandbox?

Yes, this technology can replace a sandbox where the file types that need to be handled are in the above list of supported file types.

Who are your customers?

Deep Secure solutions are used by Government, Defence & Intelligence, Law Enforcement, Critical National Infrastructure and Finance organisations worldwide.

Can you handle password protected files?

Password protected files can be configured to be delivered or redacted depending on the needs of the deployment.

Can you handle macros?

By default macro enabled documents are blocked. If required, macros can be stripped from Office documents or preserved during transformation depending on the needs of the deployment.

Digital Purity with 100% efficacy

Contact Us