ACTIVE CYBER PROTECTION

 

Real-time cyber protection of your data, device, identities and digital behaviours

iG2  Technologies

Cyber Security Products

Enabling layered cyber protection

for data, application, & infrastructure

iG2 provides the security and connectivity tools you need to securely connect users and applications, and in a work-from-anywhere world. This includes:

- Secure Access Service Edge (SASE): SASE delivers network security services — cloud access security brokers (CASB), secure web gateways (SWG), Firewall-as-a-Service (FWaaS), and more.

- SIEM (Security Information and Event Management) platform to identify IOC, IOA, SIEM event correlation with integrated automated response.

- Bot Management: Stop bad bots by using threat intelligence at-scale

- DDoS Protection: Block DDoS attacks of any size and kind

- Web Application Firewall (WAF & CDN): Protect your business-critical web applications from malicious attacks

- IT and OT Vulnerability Scanner
…and more.

Provided by iG2 leading Industry Partners. Cloudflare, Intel and AT&T among the lot.

 

iG2 Cyber Shield Program

Good Cyber hygiene and cyber insights program

 

 

A cyber security program subscription which includes:

-          Cyber risk assessment,

-          Vulnerability and patch management,

-          Access and identity management, 

-          Threat management

-          Security Monitoring

-          Cloud Security management

-          DR & BCP platform and management

 

Deception Technologies
Project Needle

Cyber Deception Solution Suite

An iG2 complied Linux distro, which includes a comprehensive suite of next generation deception technologies - design to deceive, detect and defeat cyber attackers.

This all-inclusive package is design to complement organization cyber defence tool kit. It is strategically helpful in providing cyber security posture of OT/ICS systems and reducing volume of data sent to SIEM platforms

 

 

 

 

MITRE ENGAGE

Based on MITRE ENGAGED framework

Within MITRE Shield, active defense ranges from basic cyber defensive capabilities to cyber deception and adversary engagement operations. The combination of these defenses allows an organization to not only counter current attacks but also to learn more about that adversary and better prepare for new attacks in the future. Now include adversary group mapping, based in information found in MITRE ATT&CK.

 

https://shield.mitre.org/attack_groups/

EDGE PROTECTION - EDGE SECURITY MANAGER

 

EXTENDED SECURITY ACCESS SERVICE EDGE 
(eSASE)

next-gen firewall | real time filtering | anti-malware | bandwidth optimization & sd-wan | threat detection and prevention| wi-fi protection

iG2 eSASE is a cloud-based web security solution that protects against advanced Internet-born threats, advanced malware, filters by app category, ensures data protection, and controls app use for any user, location or device.  iG2’s Next-Gen SWG is foundational for the organization's Secure Access Service Edge (SASE) architecture that combines network security functionality a (NG-SWG, CASB, DLP, NG-FW) with SD-WAN capabilities to support secure user access. Capabilities that include: URL and content filtering; SSL decryption that scale to your needs; 

Advance Threat Protection (ATP) that utilizes intelligent anomaly detection and sandboxing of unknown malware instances and integrates with threat intelligence platforms and feeds; Rich context detailed reporting; Compliance reporting against industry security standards and privacy; and more


iG2 CG unparalleled visibility and threat protection when accessing cloud services, web applications for all users anywhere, on any device. iG2 understands the nature of the cloud and takes a cloud-centric methodology that gives empowers security teams with the right balance of protection and agility they need to secure their data in today’s cyber threat landscape.


<<contents are being updated>>

iG2 NG-SIEM : COMPLETE SECURITY MONITORING

SECURITY INCIDENTS & EVENTS MANAGEMENT (SIEM)

SECURITY MONITORING  | THREAT DETECTION | .FORENSICS & INCIDENT RESPONSE | LOG COLLECTION | NOTIFICATION