Professional Documents
Culture Documents
Deep Secure Briefing Pack For Threat Removal
Deep Secure Briefing Pack For Threat Removal
Deep Secure Briefing Pack For Threat Removal
November 2019
IoT Autonomous
systems
The Content Threat Removal Process
CTR is the engine of digital transformation
1 2 3 4 5
Extract Build
Faster transform process than any detection based technology, with far superior efficacy
CTR extracts the business information content is carrying as it arrives and discards the source data, including any hidden threats. Completely new data is then
built to carry the information to its destination. The new data is digitally pure and independent of the source data, ensuring 100% protection (inbound and
outbound). The HSV hardware logic protects the CTR build process.
Highly differentiated sales proposition
Sandboxing Email
Secure Web Gateway
CTR pre-filters to materially reduce latency CTR delivers threat-free message bodies and
CTR cleans content at the boundary of the Enterprise
attachments
(forward proxy)
Enterprise Mobility
Portal Protection
CTR delivers threat-
CTR helps protect portals free message bodies
by delivering digitally and attachments
pure content at the
boundary (reverse proxy)
Web Services
DLP CTR delivers
CTR prevents digitally pure
covert data M2M
leakage (e.g. transactions
Stegware
exfiltration)
Content may
Complex orComplex
content may not at
arrives data transformed Semantic
Simple data verified Transformation verification
from performed
simple structure
contain malware
Application Proxy
to simple data structure in FPGA logic to ensure
back to the business content is valid
original format
• Protocol breaks
Hardware
Isolated
Enforced Security
Browsing
Commercial in Confidence 12
Deep Secure - Leading by example
• Better than any existing approaches
– If they are using Detection based technology (and they all are ☺ )
• If they are using detection the bad guys will beat them
• If Detection technologies were any good we wouldn’t be having this conversation
• Why don’t you try us and see if we defeat the things that have defeated your current detection based defences
Commercial in Confidence 13