Threat Removal (TR) is a cyber security technology that delivers 100% malware-free data. In contrast to other defences, including antivirus scanners and sandboxing, it does not rely on being able to detect threats but instead transforms content to render it completely safe.

3 Stage Threat Protection Process

Threat Removal uses a 3 stage Extract, Verify and Build process to deliver 100% malware-free data. In contrast to This ensures safe information exchange and advanced threat protection by always delivering malware-free data and preventing covert exfiltration.

1. Extract

Rather than identifying known malware, Threat Removal takes the data and extracts the useful information from it. 

The extracted information is transformed into an intermediary format, whilst the original data is stored or discarded, along with any malware – known or unknown.

Advanced threat protection


2. Verify

Complex data formats such as office documents and images cannot be reliably verified, so the extracted information is held in a simple form, that is subject to a secure, high speed verification process. 

This advanced threat protection and ransomware prevention process makes sure no threats or attacks can reach the next stage.

Advanced threat prevention


3. Build

Brand new data is then built in a normalised way, containing the verified information. 

The new data replicates the original data, without the threat of embedded malware and is now guaranteed to be safe.

Advanced threat removal