Jigsaw Security Products and Services 1 | Page 15

Information Sharing Community

Why crowdsourcing works...

David W. Bauer Ph.D

Jigsaw Security Enterprises

CTO

David W Bauer, Ph.D., serves as the Chief Technical Officer of Jigsaw Security Enterprises. Dr. Bauer has long been recognized as an expert in the area of distributed computing with over a two decades of experience in complex systems architecture, design and development for Supercomputing, High Performance Computing, Big Data and Cloud Computing. His work across multiple DoD-related intelligence programs has allowed him to have an impact across the NSA, CIA, NRO, FBI, DHS, U.S. Army, Navy, Marine Corps, Special Operations Command and Air Force, including deploying over 100PB of Enterprise platform capabilities around the world. He has hands-on experience with the world’s largest supercomputing platforms and has personally developed applications that demonstrate super-linear performance on over 2 million processors.

Why Crowdsourcing Works

Jigsaw Security believes in the concept of: there is power in numbers. By utilizing our platforms not only do you get the benefit of our analysts but also the benefit of our other customers that share information through our platform. When a threat is detected at a company and they choose to share details of the cyber attack our platform automatically protects all of our other customers from such attacks.

This concept allows all of our customers to securely share indicators of compromise and intelligence between organizations in a secure and efficient manner. This ensures that you can alert others in your industry to issues that are of interest in securing your network. The more information shared the greater the benefit to all members of our community.

Security requires a complete end to end solution but the cost of providing security cannot be more expensive than the cost of remediating a breach or the service cost to prevent a breach. It has been our goal to create and implement a solution in a cost effective, sensible manner through leveraging big data, the right technical solutions, engineers, and scientist. In addition, best of breed integration with your existing investments, ingestion frameworks, and systematic processing of attributes for detecting, monitoring and managing cyber threats.

We look forward to you joining our community of clients, partners and integrators.