Deep Secure Briefing Pack For Threat Removal

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 13

An introduction to Deep Secure

November 2019

We stop bad stuff getting in.....


The information included herein is confidential and proprietary to Deep-Secure
Limited and should not be...and bad
copied or people
distributed getting
to others good
without stuffwritten
our prior out
consent.
Delivering digital superiority

Defence & Intelligence

Government • Ministry of Defence Critical National Infrastructure


• Department of Defense
• Bank of England
• GCHQ
• Cabinet Office • Vodafone
• Czech Army • 10 PoCs with Banks
• Home Office • Canadian CSE
• Scottish Government • UAE Navy
• Australian Government
• UAE Government
We are on the edge of a digital revolution

Future technology mega-trends will require digitally pure inputs

Machine learning &


artificial intelligence Cloud & API economy

Social media Blockchain

IoT Autonomous
systems
The Content Threat Removal Process
CTR is the engine of digital transformation

1 2 3 4 5

Data Information Information Data


Independent
verification

Extract Build

Faster transform process than any detection based technology, with far superior efficacy

1. Source data (with or without malicious content)


4. Stage 2: High Speed Content Building
Microsoft Office Files, PDFs, Images, Structured Data 3.
Information built on completely new, independent data
Information verified by the Deep Secure
2. Stage 1: High Speed Content Extraction High Speed Verifier (HSV)
5. Digitally pure data delivered (100% guaranteed)
Information extracted & source data discarded

CTR extracts the business information content is carrying as it arrives and discards the source data, including any hidden threats. Completely new data is then
built to carry the information to its destination. The new data is digitally pure and independent of the source data, ensuring 100% protection (inbound and
outbound). The HSV hardware logic protects the CTR build process.
Highly differentiated sales proposition

We have a compelling completeness


of vision: cybersecurity finally
enables the Enterprise
CTR integrates seamlessly into the vendor eco-system
Deep Secure integrates near instantaneously with existing detection-based vendors thereby helping clients move beyond detection effectively

Sandboxing Email
Secure Web Gateway
CTR pre-filters to materially reduce latency CTR delivers threat-free message bodies and
CTR cleans content at the boundary of the Enterprise
attachments
(forward proxy)
Enterprise Mobility
Portal Protection
CTR delivers threat-
CTR helps protect portals free message bodies
by delivering digitally and attachments
pure content at the
boundary (reverse proxy)

Web Services
DLP CTR delivers
CTR prevents digitally pure
covert data M2M
leakage (e.g. transactions
Stegware
exfiltration)

IoT & ICS


CTR delivers
CASB
small form-
CTR prevents factor, high-
covert leakage assurance digital
(e.g. Stegware purity
exfiltration)

Endpoint Content Collaboration Hyper-Scale Cloud/MFT Isolation


CTR removes malware that currently evades Delivering transactional digital purity to CTR delivers digital purity within cloud environments and enables CTR delivers threat free content to
detection at the endpoint content collaboration platforms the bulk ‘lift & shift’ managed transfer of work-loads end users
Threat Removal using the iX Appliance
UK National Cyber Security Centre Data Import Pattern

Content may
Complex orComplex
content may not at
arrives data transformed Semantic
Simple data verified Transformation verification
from performed
simple structure
contain malware
Application Proxy
to simple data structure in FPGA logic to ensure
back to the business content is valid
original format

Deep Secure information eXchange (iX) Appliance


Inline Boundary Device iX Appliance
• Assured network separation
using a hardware only device

• Protocol breaks

• Transformation to defeat all


• Accredited for Government Internet to Secret
malware including zero day network connections
without detection
• Listed on the NATO IA Product Catalogue

• Independent verification using


FPGAs
Each appliance comprises
- Low Server 1 x 1u rack mountable
- High Server 1 x 1u rack mountable
- High Speed Verifier 1 x 1u rack mountable
- HP Switches 2 x 1u rack mountable

iX Appliance Protocol Support


Technical Description -
-
Web Services
Email
HTTP(S)
SMTP
- File Transfer DSFSP
- Streamed Data TCP, UDP

File Format Support


- Office Documents Word, PowerPoint, Excel, PDF, RTF, Text
- Images Bitmap, GIF, JPG, JPG 2000, PNG, TIFF
- Archive ZIP, MHT
- Structured Data MIME, HTML, CSV, JSON, XML, Proto3
iX Appliance Threat Removal Use Cases
WEB WEB
FILE EMAIL SERVICES
BROWSE

Secure Mail Web App


File Server Gateway Front End

Hardware
Isolated
Enforced Security
Browsing

File Mail Web App


Server Server Back End
Deep Secure – A very different approach
• CTR Implementation
– CTR process itself
• Extracting the business information
• Throwing away carrying data
• Writing out into an internal representation - XDS
• Verifying we have safe / known structures
• Building a completely new file
– Two stage transformation
• Conversion and Transformation on the Low side of the iX appliance
• Rebuilding clean content on the High side of the iX appliance

• HSV / Hardware Enforcement / Diode like /


– Protecting the build process
– Providing assured separation between domains
– Guaranteeing no bypass of the entry point
• Classic Software
– We have 30 years understanding of data formats and how to pick them apart
– We have a full range of proxies
• Mail
• Web
• Network Management
• Chat
• Fixed Format data

Commercial in Confidence 12
Deep Secure - Leading by example
• Better than any existing approaches
– If they are using Detection based technology (and they all are ☺ )
• If they are using detection the bad guys will beat them
• If Detection technologies were any good we wouldn’t be having this conversation
• Why don’t you try us and see if we defeat the things that have defeated your current detection based defences

• Deep Secure as a company


– I’ve always thought that we have the best people
• Every company might say it but we have
– A CEO with the vision and experience to grow the business
– A CTO who inspires those around him and has people following him
– A growing team of world class technical and commercial people
– Growing rapidly
• 25% per year for the last two years and 50% target this year which we are slightly ahead of
– Mature company turning out 4 releases of our software a year
• ..actually 5 last year!
– Well respected in the security communities around the world
• A well kept secret….
– A Unique proposition

Commercial in Confidence 13

You might also like