The GX is deployed as a “sidecar” to a Web Gateway or Firewall using the industry standard ICAP protocol so it integrates seamlessly with existing perimeter Web defences.

 

Features

Simple setup –

intuitive GUI and pre-built ICAP integration file means the GX is up and running in a matter of minutes.

Content transformation –

the gateway or firewall passes Office documents and images to the GX which transforms them to remove any concealed threat and passes them back 100% safe, guaranteed.

Malware removal –

threats concealed in Office documents and PDFs are removed during transformation.

Stegware removal –

threats concealed in Web images and social media feeds using steganography (stegware) are removed during transformation.

Bi-directional protection –

stops malware being infiltrated, prevents covert outbound data loss and smashes CnC channels.

Auditing and offbox logging –

for offline forensic examination.

Web Content

Deep Secure’s unique content transformation technology intercepts Web content at the network boundary and then re-creates it from scratch, clean and safe on the other side. This destroys the threat. Nothing travels end-to-end but safe content.

 

Request a demo Contact us

Protocols:

HTTP/HTTP(S)

Formats:

Office formats (Microsoft Office, PDF, etc.)

Image formats (JPG, PNG, GIF, BMP)

Deployments:

  • Cloud

  • Physical

  • Virtual

Integration

The GX can be deployed with any ICAP capable Web gateway or application layer firewall.

The ICAP integration between GX and the McAfee Web Gateway Version 7.6.2 and above has been approved as McAfee Compatible.

 

 Request a demo Contact us 

2017’s strong performance for Deep Secure delivered results ahead of expectations. The company maintained sustainable real revenue growth, profitability and operating expense control allowing for significant investment in the new platform.

Jane Mercer

CFO

Are you ready to talk to Deep Secure?