1. Extract

Rather than identifying known malware, Threat Removal takes the data and extracts the useful information from it. 

The extracted information is transformed into an intermediary format, whilst the original data is stored or discarded, along with any malware – known or unknown.


2. Verify

Complex data formats such as office documents and images cannot be reliably verified, so the extracted information is held in a simple form, that is subject to a secure, high speed verification process. 

This makes sure no attacks can reach the next stage.


3. Build

Brand new data is then built in a normalised way, containing the verified information. 

The new data replicates the original data, without the threat of embedded malware and is now guaranteed to be safe.