Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

iX, utilizing Deep Secure’s distinctive Threat Removal technology, ensures complete protection against both known and zero-day malware in documents and images with a 100% guarantee. Operating on the perimeter, it functions as a transparent application layer proxy, allowing for seamless integration across various business processes and applications. Capable of supporting an extensive array of protocols and data formats, iX intercepts documents at the network boundary, re-creating them securely from the ground up. This process guarantees that only safe content is transmitted, effectively halting malware infiltration and preventing covert data leakage, such as through image steganography. By employing Deep Secure’s specialized content transformation technology, iX not only eliminates threats but also maintains the integrity of the information being processed. Ultimately, nothing but secure content is transmitted from one end to the other, ensuring a robust defense against potential cyber threats. This comprehensive approach enhances organizational security by safeguarding sensitive information at all times.

Description

Xtract One represents the forefront of security for entrances and perimeters, delivering cutting-edge AI-driven hardware and software solutions aimed at enhancing safety while respecting individuals' privacy and comfort. Among its offerings, SafeGateway stands out as a precise, swift, and discreet method for ensuring secure access for both patrons and staff. This groundbreaking solution employs advanced technology to detect hidden weapons such as firearms, blades, and explosive components more efficiently and accurately than traditional security practices like metal detectors. By mitigating or entirely removing the need for lengthy queues, uncomfortable searches, and intrusive procedures, SafeGateway is exceptionally suited for environments such as stadiums, arenas, theaters, casinos, nightclubs, art galleries, and various venues where effective security screening is paramount without compromising the enjoyment of guests. Additionally, it features a subtle security system that signals potential dangers without triggering disruptive alarms, further enhancing the experience for everyone involved.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Accellion
Amazon Web Services (AWS)
Boldon James Email Classifier
SAP Store
Sophos Email
iboss

Integrations

Accellion
Amazon Web Services (AWS)
Boldon James Email Classifier
SAP Store
Sophos Email
iboss

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Deep Secure

Founded

2009

Country

United Kingdom

Website

www.deep-secure.com/information-exchange-ix.php

Vendor Details

Company Name

Xtract One

Country

United States

Website

xtractone.com/products/

Product Features

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Incident Response

Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Security Orchestration
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management

Product Features

Alternatives

Glasswall Reviews

Glasswall

Glasswall Solutions

Alternatives

Athena Security Reviews

Athena Security

Athena Security Weapons Detection System
SandBlast Threat Extraction Reviews

SandBlast Threat Extraction

Check Point Software Technologies
SafetySmart Platform Reviews

SafetySmart Platform

SoundThinking
SafePointe Reviews

SafePointe

SoundThinking