Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Cryptosmart stands out as the sole "Restricted" solution certified by both French authorities and NATO, developed in collaboration with Samsung to ensure secure mobile communications on consumer devices. It is designed for Samsung smartphones and tablets, offering an intuitive and user-friendly experience. This solution has been embraced by notable clients, including top French government officials and major global organizations. Additionally, Cryptosmart PC guarantees that data transmissions are protected throughout their journey, preventing any interception between your PCs and the gateway situated within your information system. Leveraging technology certified by ANSSI (National Agency for the Security of Information Systems), Cryptosmart PC provides an extra layer of security in today's digital landscape. As a result, users can confidently rely on Cryptosmart to safeguard their sensitive communications.

Description

iX, utilizing Deep Secure’s distinctive Threat Removal technology, ensures complete protection against both known and zero-day malware in documents and images with a 100% guarantee. Operating on the perimeter, it functions as a transparent application layer proxy, allowing for seamless integration across various business processes and applications. Capable of supporting an extensive array of protocols and data formats, iX intercepts documents at the network boundary, re-creating them securely from the ground up. This process guarantees that only safe content is transmitted, effectively halting malware infiltration and preventing covert data leakage, such as through image steganography. By employing Deep Secure’s specialized content transformation technology, iX not only eliminates threats but also maintains the integrity of the information being processed. Ultimately, nothing but secure content is transmitted from one end to the other, ensuring a robust defense against potential cyber threats. This comprehensive approach enhances organizational security by safeguarding sensitive information at all times.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Accellion
Amazon Web Services (AWS)
Boldon James Email Classifier
Sophos Email
iboss

Integrations

Accellion
Amazon Web Services (AWS)
Boldon James Email Classifier
Sophos Email
iboss

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Ercom

Founded

1986

Country

France

Website

www.ercom.com/solutions/cryptosmart-pc

Vendor Details

Company Name

Deep Secure

Founded

2009

Country

United Kingdom

Website

www.deep-secure.com/information-exchange-ix.php

Product Features

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Product Features

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Incident Response

Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Security Orchestration
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management

Alternatives

Alternatives

Glasswall Reviews

Glasswall

Glasswall Solutions
Systancia Gate Reviews

Systancia Gate

Systancia
Cryptobox Reviews

Cryptobox

Ercom
SandBlast Threat Extraction Reviews

SandBlast Threat Extraction

Check Point Software Technologies