[1] Unlike other defenses, including antivirus software and sandboxed execution, CTR does not rely on being able to detect threats.
Advanced attacks continuously defeat defenses that are based on detection.
[2] A Content Threat Removal defence works by intercepting data on its way to its destination.
Then entirely new, clean and safe data is built to carry the information to its destination.
Data transfers can be intercepted by in-line application layer proxies and these can transform the way information content is delivered to remove any threat.