ODIX is a revolutionary process which removes all malware, known and unknown, hidden in files. Our patented process handles all types of files and uses a unique mathematical algorithm specially-adapted to each file type.
ODIX-based solutions provide dramatically enhanced information security for organizations, without compromising system performance. The solution comprises several components, all based on ODI’s core Content Disarm & Reconstruction technology.
ODI’s core technology contains 4 lines of defense
Defense Line #1:
Five Anti Virus Engines
ODIX’s first line of defense is comprised of five antivirus engines which simultaneously check media and files. Running on Linux-based UBUNTU, which is recognized as less vulnerable and more reinforceable than other operating systems, ODI carefully selected the antivirus engines to complement each other and provide the widest coverage against all known viruses.
Defense Line #2:
Smart TrueType check
Defense Line #3:
Defensive Line #4 – Smart Management Server
ODIX smart management server allows corporate security policy enforcement, permissions management, analytics and forensics – therefore, is an actual 4th line of defense.
The final line of ODIX defense, the ODIX Smart Management Server enables corporate security policy enforcement, permissions management, analytics and forensics.
The company’s slogan “Odix Your Files”
has become a common global concept among cyber-related terms
Why Odix ?
Because antivirus and sandbox solutions are simply insufficient
Many organizations believe that they are safe from cyberthreats because they implement the latest antivirus solutions.
Yet if an attacker releases a virus right now, antivirus labs will at best identify it tomorrow. An update won’t be released, optimistically, until the following day.
This two-day window is more than enough time for a virus to wreak havoc on an organizational network. And this scenario doesn’t even take into account Advanced Persistent Threats (APT), zero-day attacks, and other malware that antivirus solutions don’t address.
Defending from known cyberthreats by identifying and blocking them cannot provide a level of protection for organizations that are constantly targeted. To meet this challenge, ODI developed ODIX, an advanced, next generation threat neutralization and removal process based on advanced heuristics and mathematical algorithms. Unlike legacy solutions, ODIX can neutralize and remove both known and unknown threats. Moreover, ODIX is easily integrated into existing business processes, ensuring maximum security and maximum productivity.
• Protects you from the known threats of the past and the unknown threats of the future
• Utilizes state of the art mathematical algorithms to neutralize and remove threats
• Can be easily integrated into existing business processes