Log in
Enquire now
Deep-Secure

Deep-Secure

Deep-Secure provides security solutions using network border gateway technology.

OverviewStructured DataIssuesContributors

Contents

ProductsTimelineTable: Funding RoundsTable: ProductsTable: AcquisitionsTable: SBIR/STTR AwardsTable: PatentsTable: Further ResourcesReferences
deep-secure.com
Is a
Organization
Organization
Company
Company

Company attributes

Industry
Cybersecurity
Cybersecurity
Location
Worcestershire
Worcestershire
England
England
United Kingdom
United Kingdom
B2X
B2B
B2B
4
CEO
‌
Daniel Turner
Pitchbook URL
pitchbook.com/profiles.../62201-53
Number of Employees (Ranges)
51 – 2005
Email Address
info@deep-secure.com
Phone Number
+448455194524
Full Address
Deep Secure Ltd 1 Nimrod House Sandy's Road Malvern WR14 1JJ United Kingdom6
Investors
YFM Private Equity
YFM Private Equity
‌
Chandos Fund
Founded Date
2010
5
Total Funding Amount (USD)
5,596,159
Latest Funding Round Date
December 22, 2009
Headquarters
Malvern, Worcestershire
Malvern, Worcestershire

Other attributes

Company Operating Status
Active
Wikidata ID
Q5250048

Deep-Secure is a UK-based company that provides protection products to free user documents and images of malware. Deep-Secure was founded in 2009 and is a private company headquartered in Worcestershire.

The company provides Content Threat Removal (CTR) products to protect user documents and images from document-based malware. Deep-Secure provides Document Download Protection, Email Attachment protection, and Document Upload Protection.

Products

DeepSecure's main products are:

  • Information eXchange (iX)/Application eXchange (AX) : For information exchange from platforms such as email, file sharing, logging and network management applications, etc
  • Gateway eXtension (GX) : For web and social media content
  • File eXchange (FX) : For moving files between stores
  • Policy Engine Guard : To incorporate granular content security policies
  • Data Diode: Creates a uni-directional data flow for data entering or leaving an isolated network or system.

CTR eliminates file-based malware attacks by transforming documents to render them safe, and is designed around a "True Zero Trust Security Model" where every document is assumed to be potentially malicious. The software works via policy rules that inspect all business content for potential threats. Deep Secure’s policy enforcement technology intercepts content at the network boundary and applies content inspection policies to determine whether it should be allowed to pass.

Timeline

No Timeline data yet.

Funding Rounds

Products

Acquisitions

SBIR/STTR Awards

Patents

Further Resources

Title
Author
Link
Type
Date
No Further Resources data yet.

References

Find more companies like Deep-Secure

Use the Golden Query Tool to find similar companies in the same industry, location, or by any other field in the Knowledge Graph.
Open Query Tool
Access by API
Golden Query Tool
Golden logo

Company

  • Home
  • Press & Media
  • Blog
  • Careers
  • WE'RE HIRING

Products

  • Knowledge Graph
  • Query Tool
  • Data Requests
  • Knowledge Storage
  • API
  • Pricing
  • Enterprise
  • ChatGPT Plugin

Legal

  • Terms of Service
  • Enterprise Terms of Service
  • Privacy Policy

Help

  • Help center
  • API Documentation
  • Contact Us
By using this site, you agree to our Terms of Service.