Home / Products / itWash

itWash

itWash

 
 

 
 

 
 

 

 Architecture

  • The System scales in several dimensions:
    • Safety: Protection can be defined up to 100%. Attacks are prevented
    • Costs: Low cost solution through focusing on use cases: The system scales from a central up to a dedicated system regarding costs and throughput
    • Throughput: The performance of the overall system is balanced to the customers need. All components will match each other while highly parallelizing (also realtime monitoring)
  • Safety:
    • Protection of productive systems (PS)
    • Protection of all contentbased-attacks
    • No possibility of IP-based attacks
    • System’s integrity is always safeguarded
    • Selected data flow control between acceptance station, system (lock) and PS – including monitoring
    • Recursive decryption and unpacking of data before content examination
    • Secure identification of undesired embedded data due to XRayWatch’s complex recursive content checking
    • Integration of any number of anti virus- and external systems (documentation included)
    • Processes can be separated due to process-specific authorizations and/or due to stand-alone hardware systems
    • Essential data transformation of one file into another "safe" format such as PDF/A-1a is possible

Archiving of undesirable data/files

  • Different possibilites of using "undesired" data/ files:
    • Data conversion into a secure format
    • Data will be deleted
    • Secure deletion of data
    • Data will be stored separately in a so-called "contamination zone"
  • Supplier notification is possible
  • "Contamination zone" behind firewall system
  • Only authorized people (e.g. forensic) can gain access to this "contamination zone"
  • Evidence of original data and metadata (time and origin) with legal evidence

Factsheet