Overview

Total Content Threat Removal is Here

Our ground-breaking Content Threat Removal Platform creates secure zones around key parts of a business, or the entire organisation that renders zero-day threats, the latest ransomware, steganography attacks, phishing and whaling exploits an irrelevance.

Dispensing with the failed paradigm of detecting threats, or isolating the business, we treat all data with the potential to do harm equally to ensure total Content Threat Removal.

We are the global leaders in Content Threat Removal because we have perfected the integration of our three market leading capabilities: recursive content decomposition, veracious policy enforcement, and content transformation into a single, highly resilient platform.

Benefits

100% “threat free” assurance
Threats just can’t transverse our platform – guaranteed. NO FAIL.

Nowhere to hide
Total content inspection to combat data loss and compel user compliance. NO LOSS.

Take back the initiative
No more patches, signature updates, breach remediation and no more playing catch-up with the bad guys.

Delivering Content Threat Removal

Deep Secure, the pioneer of Content Threat Removal, deploys its solutions as boundary appliances and applications, placed between the corporate environment and the outside world – and internally – to create secure zones within the corporate environment.

Our Content Threat Removal Platform – a highly configurable platform – contains a combination of product modules depending on the needs of your organisation, all working together within the framework of a platform architecture.

Content Threat Removal

Defeating the unknown threat

Highlights

  • Defeats unknown content threats
  • Prevents data loss via covert channels & application dark-corners
  • Disrupts command & control channels
  • Self-defending architecture & high assurance option
  • Supports common user centric applications like Email, File, Transfer & Chat
  • Supports high-speed machine to machine transactions for Web services
  • Broad content packs to support PDF, Office X, Image Formats, JSON & XML
  • Maintains the user experience without isolation
  • Easy to deploy, easy to manage

The Content Threat Removal Platform protects without the need to detect threats or isolate the business. This unique approach is the only viable way to defeat the unknown Zero Day threat.

It works by extracting the useful business information from the data and re-constructing new, clean data to carry the information to its destination.

Our transformation process is unique as the threat is removed immediately, without the need to detect or isolate.

Read More: Content Threat Removal Datasheet

Benefits

100% “threat free” assurance

Ensures only safe content is exchanged.

Nowhere to hide

For threats and data leaks.

Take back the initiative

Don’t detect, don’t isolate, remove the threat.

Anti-Steganography Gateway

Unmasking malicious payloads

Highlights

  • Expose the risk to the business of target covert cyber-attacks
  • Destroys threats that use sophisticated Steganography techniques
  • Disrupts command & control networks
  • Prevents stealthy data loss
  • Remove threat from malvertising campaigns
  • Tightly integrates with existing perimeter security controls
  • Easy to deploy, easy to manage

Deep Secure’s approach for unknown Zero Day exploits is to remove the threat entirely.

The Anti-Steganography Gateway, part of our Content Threat Removal Platform, is the world’s first cyber security solution that mitigates the risk of attacks that use steganography techniques.

In the most sophisticated form of this attack, which uses social media, cyber criminals use specially crafted tweets to hide a web address within an image and then use this to deliver their payload, such as Ransomware, to already compromised workstations.

The same Steganography approach can be used to bypass existing detection based security to leak sensitive content out in a covert data loss tactic – your intellectual property is completely masked by innocuous image files. Quite literally the attack is hidden in plain sight – and cyber criminals are exploiting this old technique to make millions every day.

Unlike first and second generation security products, Content Threat Removal doesn’t try to detect or isolate threats, it actually removes the threat from the content.

Read More: Anti-Steganography Gateway

Benefits

100% “threat free” assurance

Ensures only safe content is exchanged.

Nowhere to hide

For threats and data leaks.

Take back the initiative

Don’t detect, don’t isolate, remove the threat.

Threat Removal for Mail

100% email Content Threat Removal

Highlights

  • Eliminates the risks of a zero-day threat penetrating your secure zone via email
  • Content transformation for 100% inbound threat removal
  • Content inspection for rigorous outbound data loss checking
  • No patches, no signature updates
  • No need to “know” about the latest exploit attempts
  • No endpoint software
  • Choice of O/S, virtual, and hardware platform

Threat Removal for mail protects an organisation’s most valuable digital operations – their “crown jewels” from cyber attack via email.  It totally eliminates the risk posed by zero-day threats, as well as ransomware, phishing, whaling, steganography exploitation, fraud, IP theft, customer data theft, and malicious attachment threats.

Using a truly innovative technique, inbound messages are transformed at the zone boundary into an intermediate format and then re-created from scratch, clean and safe on the other side.  Nothing travels end-to-end but safe business data.  There’s no signature updates and no patches, just total email hygiene.

Outbound messages are subject to recursive content decomposition – down to the smallest component – and veracious policy enforcement to mitigate the risk of data loss, and satisfy compliance and audit requirements.

Threat Removal for Mail is available as a hardware or virtual appliance, or as software for stock industry servers, supporting on-premise, cloud and hybrid Content Threat Removal platforms.

Benefits

100% “threat free” assurance
Threats just can’t transverse our platform – guaranteed. NO FAIL.

Nowhere to hide
Total content inspection to combat data loss and compel user compliance. NO LOSS.

Take back the initiative
No more patches, signature updates, breach remediation and no more playing catch-up with the bad guys.

Threat Removal for Web

100% web Content Threat Removal

Highlights

  • Eliminates the risks of a zero-day threat crossing the boundary via web
  • Transformation for 100% inbound threat removal
  • Content inspection for rigorous outbound data loss checking
  • No patches, no signature updates
  • No need to “know” about the latest exploit attempts
  • No endpoint software
  • Works seamlessly with existing web security assets

Threat Removal for Web protects an organisation’s most valuable assets – their “crown jewels” from cyber attack via the web. It totally eliminates the risk posed by zero day threats such as ransomware, steganography attacks, and web-borne malware.

Working seamlessly with your existing web gateway and URL filtering capability, the Threat Removal for Web uses a truly innovative technique. Web content can be transformed at the zone boundary into an intermediate format and then re-created from scratch, clean and safe on the other side. Nothing travels end-to-end but valid business data. There’s no signature updates and no patches, just the peace of mind that comes with knowing users can safely access the Internet without infecting internal systems and assets.

Outbound web traffic (file transfers, POSTS and webmail) are subject to rigorous content inspection – down to the smallest component – to mitigate the risk of data loss and aid in compliance with organisational or regulatory requirements.

Threat Removal for Web is available as a hardware or virtual appliance, or as software for stock industry servers, supporting on-premise, cloud and hybrid Content Threat Removal platforms.

Benefits

100% “threat free” assurance
Threats just can’t transverse our platform – guaranteed. NO FAIL.

Nowhere to hide
Total content inspection to combat data loss and compel user compliance. NO LOSS.

Take back the initiative
No more patches, signature updates, breach remediation and no more playing catch-up with the bad guys.

Threat Removal for Transactions

100% web services and application Content Threat Removal

Highlights

  • Eliminates the risks of a zero-day threat crossing the boundary via web services and applications
  • Transformation for 100% inbound threat removal
  • No patches, no signature updates
  • No need to “know” about the latest exploit attempts
  • Ideal for document management, collaboration, billing, e-commerce and inventory
  • Multi-protocol support allows easy integration with applications

Threat Removal for Transactions controls structured data entering and leaving the organisation, defending against advanced attacks and misuse. It totally eliminate the risk posed by zero-day threats and exploits designed to use e.g. e-commerce applications to penetrate internal systems.

Threat Removal for Transactions uses a truly innovative technique. Business information carried by protocols including JSON, XML, and SOAP is transformed at the zone boundary into an intermediate format and then re-created from scratch, clean and safe on the other side. Nothing travels end-to-end but valid and safe business information. There’s no signature updates and no patches, just the peace of mind that comes with knowing web services and Internet-facing applications that can safely interact with internal systems.

Threat Removal for Transactions is available as a hardware or virtual appliance, or as software for stock industry servers, supporting on-premise, cloud and hybrid Content Threat Removal platforms.

Solution Brochure

Threat Removal for Mail
Threat Removal for Transactions

Benefits

100% “threat free” assurance
Threats just can’t transverse our platform – guaranteed. NO FAIL.

Nowhere to hide
Total content inspection to combat data loss and compel user compliance. NO LOSS.

Take back the initiative
No more patches, signature updates, breach remediation and no more playing catch-up with the bad guys.

Next Generation Data Diodes

Guaranteed one-way only

Highlights

  • Uni-directional connection means NO risk of contamination in reverse direction – NO attacker feedback
  • Uniquely uses content transformation to guarantee clean feeds, making it truly next generation
  • Less than 10 minutes to setup and get running
  • Business data moves freely and applications run at optimum speed due to diskless file transfer
  • Pre-built applications for Windows updates and file transfers
  • Drops in-line transparently at network and application level – no changes to existing application
  • Web based GUI for ease of administration

Deep Secure Next Generation Data Diodes securely allow data into an isolated network OR allow production data out of an isolated network while protecting against attack from the opposite direction. In short, we deny an attacker feedback on their attack.

The Next Generation Data Diode connects the two networks by enforcing a uni-directional flow at a hardware level. The source server uses a fibre optic one-way link to send data to the destination server. Physical properties make the link one-way – there is no reliance on firmware or software.

Next Generation Data Diodes are ideally suited to organisations with isolated networks that need to get updates in or data out in a secure, controlled, auditable and totally uni-directional manner. They are designed to pass information from one network to another without needing intervention from users or administrators, acting like an “air gap”, in preserving the isolation of critical networks, but without the negative manpower, efficiency and reliability implications.

Next Generation Data Diodes are supplied as appliances comprising a pair of servers, connected by a single strand of optical fibre.

Read More: How do Data Diodes work?

Benefits

Mitigates risk
Guaranteed one-way flow, no possibility of information passing in the opposite direction.

Effortless to configure
Drops in-line transparently at network and application level so no changes to existing infrastructure or applications.

Easy to deploy
6-step setup guide and the ability to be up and running in less than 10 minutes – with pre-built applications for common file transfer tasks.

Personal Quarantine

Safely view messages that have failed the security controls

Highlights

  • Add-on to Content Threat Removal for Mail
  • Search and query personal quarantine areas without fear of contamination
  • Safe viewing of potentially risky attachments (e.g. password-protected, executable)
  • Ideal for kiosk, thin-client or dedicated workstation
  • 100% browser based
  • No endpoint client software
  • Quarantined items can be imported using Personal Exchange without bypassing security checks

Threat Removal for mail protects an organisation’s most valuable digital operations – their “crown jewels” from cyber attack via email. It totally eliminates the risk posed by zero-day threats, as well as ransomware, phishing, whaling, steganography exploitation, fraud, IP theft, customer data theft, and malicious attachment threats.

This stringent approach leaves no room for the attacker, but there will be occasions where important business information is lost in the process – content might be encrypted or in a proprietary format. To handle these cases, the Personal Quarantine (PQ) module is included in the holding zone. All incoming content is sent here in its original form.

The PQ application allows users, working in the holding zone, to access the content that has been sent to them. The quarantine areas can be searched and queried. A further Personal Exchange (PX) module can optionally be used to recover any important information that would not be allowed into the clean zone, without bypassing the security controls.

Personal Quarantine is an add-on module to Threat Removal for Mail.

Benefits

100% “threat free” assurance
Threats just can’t transverse our platform – guaranteed. NO FAIL.

Nowhere to hide
Total content inspection to combat data loss and compel user compliance. NO LOSS.

Take back the initiative
No more patches, signature updates, breach remediation and no more playing catch-up with the bad guys.

Personal Exchange

Securely move files between clean and holding zones

Highlights

  • All content is subject to Content Threat Removal – no backdoor access
  • Obviates the need for removable media air gaps
  • File transfers logged and audited for forensic analysis and compliance
  • 100% browser based
  • No endpoint client software

Personal Exchange (PX), provides users who have accounts in both the holding and clean zones, with a personal exchange mechanism that lets them pass files between them. Content is subject to Content Threat Removal, so the mechanism doesn’t provide a back-door way for attackers to get into a system.

Content retrieved from the Internet can be pulled into the clean zone through the Personal Exchange mechanism, where it is subject to Content Threat Removal. Where content from the clean zone needs to be uploaded to Internet services, it can first be exported to the holding zone through PX where it is again subject to Content Threat Removal.

PX increases staff efficiency, ensures user accountability, and increases security by dispensing with the need for – and the risks inherent in – exchangeable media.

PX is available as a hardware or virtual appliance, or as software for stock industry servers, supporting on-premise, cloud and hybrid Content Threat Removal platforms.

Benefits

100% “threat free” assurance
Threats just can’t transverse our platform – guaranteed. NO FAIL.

Nowhere to hide
Total content inspection to combat data loss and compel user compliance. NO LOSS.

Take back the initiative
No more patches, signature updates, breach remediation and no more playing catch-up with the bad guys.

Want to go deeper?

If you’d like to find out how simple it is to defeat the unknown, contact the Deep Secure team and get our experts to answer your questions in a little more depth or arrange a demo - please get in touch.