Deep Secure PoC Test Site
This web site is RESTRICTED for use during customer/partner demonstrations and Proof of Concepts.
There are a number of example scenarios to assist you during evaluation of our Content Threat Removal Platform.
Please select the scenario from the menu on the left and then follow each set of instructions to complete the test.
NOTE:
All files are harmless - each will demonstrate the functionality of our content transform approach and explain how this form of weaponised content can be used to attack your organisation or to exfiltrate data covertly.
RECOMMENDATION:
However, we recommend that the scenarios are performed within a lab or test environment as it may be necessary to make changes to the local workstation to complete certain tasks.
ADDITIONAL TOOLS:
In some instances you may need additional tools on the endpoint to help analyse files before and after applying Content Threat Removal.
This is an optional step but recommended. In most instances you will need only Notepad/Notepad++.