The GX is deployed as a “sidecar” to a Web Gateway or Firewall using the industry standard ICAP protocol so it integrates seamlessly with existing perimeter Web defences.



Simple setup –

intuitive GUI and pre-built ICAP integration file means the GX is up and running in a matter of minutes.

Content transformation –

the gateway or firewall passes Office documents and images to the GX which transforms them to remove any concealed threat and passes them back 100% safe, guaranteed.

Malware removal –

threats concealed in Office documents and PDFs are removed during transformation.

Stegware removal –

threats concealed in Web images and social media feeds using steganography (stegware) are removed during transformation.

Bi-directional protection –

stops malware being infiltrated, prevents covert outbound data loss and smashes CnC channels.

Auditing and offbox logging –

for offline forensic examination.

Web Content

Deep Secure’s unique content transformation technology intercepts Web content at the network boundary and then re-creates it from scratch, clean and safe on the other side. This destroys the threat. Nothing travels end-to-end but safe content.


Request a demo Contact us




Office formats (Microsoft Office, PDF, etc.)

Image formats (JPG, PNG, GIF, BMP)


  • Cloud

  • Physical

  • Virtual


The GX can be deployed with any ICAP capable Web gateway or application layer firewall.

The ICAP integration between GX and the McAfee Web Gateway Version 7.6.2 and above has been approved as McAfee Compatible.


 Request a demo Contact us 

We have a clear plan to revolutionise content security, offering the sort of protection from cyber threats we are all entitled to expect - a level of protection that the market at large has so-far failed to deliver.

Richard Beaton


Are you ready to talk to Deep Secure?