TECHNOLOGY
1
Identify
Gryphon’s advanced deep file inspection methods firstly identify
true format of the file
2
Disarm
Gryphon deconstructs a file into its components, identifies and strips away anything that doesn’t comply with international or vendor file type specifications
3
Rebuild
Gryphon then rebuilds the threat-free file with only known, safe elements in original format