Deep Secure’s unique content transformation technology intercepts documents at the network boundary and then re-creates them from scratch, clean and safe on the other side. This destroys the threat. Nothing travels end-to-end but safe content.
HTTP/HTTP(S)
SMTP
Framed TCP, UDP
Office formats
(Microsoft Office, PDF, etc.)
Image formats
Structured data
(JSON, XML, etc.)
For systems that face the most sophisticated attackers, a pair of iX appliances can be deployed separated by Deep Secure’s High Speed Verifier (HSV).
The HSV provides independent verification implemented in hardware logic and as such uses none of the software and networking components that might house a backdoor exploit or make it vulnerable to attack.