Skip to content

Solution:

Interactive Filtering

The Need:

File filtering when the files arrive into a network, and once they have left the network, for instance from and to the internet.

In addition, file filtering while the files are moving between 2 separated networks (one is the external network that connects to the internet, and the second the internal sensitive network) while the requirements are:

  • Filtering threats within the incoming files into the internal sensitive network.
  • Preventing leakage within the outgoing files from the internal sensitive network.
  • Being done automatically.

The Solution:

SelectorIT - a YazamTech leading system, a state-of-the-art protection of Advanced Threats within files, provides Data Sanitization and Laundering, using YazamTech’s unique technology for deep content filtering. SelectorIT has been designed to provide automatic Advanced Filtering, both Blocking Threats by incoming files to the network, and Preventing Leakage by outgoing files from the network.

SelectorIT provides protection against various modern threats: APT (Advanced Persistent Threats), Zero Day Attacks, Ransomware and Data Leakage (visible and hidden).

Filtering at the same Network:

A SelectorIT system automatically filters incoming and outgoing files, between the networks:

Filtering between Networks:

A single SelectorIT system automatically filters incoming and outgoing files, between the networks:

For those customers who prefer to establish 2 separate and independent filters for incoming and outgoing files, the solution is based on 2 SelectorIT systems, the first for filtering against threats of the incoming files into the internal sensitive network, and the second to filter the outgoing files against leakage from the internal sensitive network.

In the case that the whole solution needs to include a real separation between the 2 isolated networks, there is an option to add the ShuttleIT system (also from YazamTech) between the two isolated networks, and enable an automatic transfer of files between those two networks, bi-directionally or uni-directionally, while maintaining a complete disconnection between them.

Ready to Get Started? Contact us Today for More Information