+
+

Related Products

  • ManageEngine Log360
    140 Ratings
    Visit Website
  • Guardz
    105 Ratings
    Visit Website
  • SpamTitan
    815 Ratings
    Visit Website
  • Resolver
    275 Ratings
    Visit Website
  • Blumira
    145 Ratings
    Visit Website
  • ThreatLocker
    499 Ratings
    Visit Website
  • Jscrambler
    33 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,195 Ratings
    Visit Website
  • ConnectWise SIEM
    191 Ratings
    Visit Website
  • IPVanish
    111 Ratings
    Visit Website

About

Featuring Deep Secure’s unique Threat Removal technology, iX provides 100% guaranteed protection from known and even zero day malware in documents and images. Working on the perimeter, iX acts as a transparent application layer proxy. With support for a wide range of protocols and data formats, it integrates seamlessly into a range of business processes and applications. Documents are intercepted at the boundary and then re-created from scratch, clean and safe on the other side. Nothing travels end-to-end but safe content – 100% guaranteed. Stops malware being infiltrated and prevents covert outbound data loss – for example via image steganography. Deep Secure’s unique content transformation technology intercepts documents at the network boundary and then re-creates them from scratch, clean and safe on the other side. This destroys the threat. Nothing travels end-to-end but safe content.

About

The only file security solution that ensures all files coming into your enterprise are completely safe. Unlike detection-based file security solutions that scan for suspicious elements and block files, Positive Selection singles out only the safe elements of each file, ensuring every file that enters your organization is 100% safe. Any file, anywhere, anytime. With a deep, expert understanding of all types of files, Votiro’s Secure File Gateway eliminates threats from the widest possible range of files, no matter how they enter your organization.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Cybersecurity software for businesses that need a document malware solution

Audience

IT security teams searching for a powerful Secure Email Gateway solution

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Deep Secure
Founded: 2009
United Kingdom
www.deep-secure.com/information-exchange-ix.php

Company Information

Votiro
Founded: 2010
Israel
www.votiro.com

Alternatives

Alternatives

Glasswall

Glasswall

Glasswall Solutions
SandBlast Threat Extraction

SandBlast Threat Extraction

Check Point Software Technologies
SandBlast Threat Extraction

SandBlast Threat Extraction

Check Point Software Technologies

Categories

Categories

Integrations

Accellion
Amazon Web Services (AWS)
BUFFERZONE
Boldon James Email Classifier
FortiSandbox
Sophos Email
iboss

Integrations

Accellion
Amazon Web Services (AWS)
BUFFERZONE
Boldon James Email Classifier
FortiSandbox
Sophos Email
iboss
Claim Deep Secure and update features and information
Claim Deep Secure and update features and information
Claim Votiro and update features and information
Claim Votiro and update features and information