Jigsaw Security Products and Services 1 | Page 8

Managed Security

Firewalls: Jigsaw SOC manages your firewall change request, firewall traffic, and will enforce your policies using our MISP platform.

Intrusion Detection and Prevention Devices: Jigsaw Security will push policies for monitoring to your IDS or IPS devices. We also support Snort and Suricata.

Mail Gateway Protection: Jigsaw Security provides mail scanning and gateway protection to keep malware and viruses out of your email inbox. We utilize best of breed solutions as part of our MSSP product offerings.

Proxy Server Management: Jigsaw Security provides a web proxy solution to organizations that utilize our commercial IOC feeds as well as customized category rules. We also integrate our RPZ solution to keep your end users from accessing malicious websites and illegal content.

Centralized Big Data SOC Console: Jigsaw Security utilizes best of breed Big Data solutions to include our own Big Data Engine, Ikanow Cyber Security Big Data Solution, or we can integrate with Arcsight, QRadar or RSA Security Analytics. Or create your own solution uzing the ELK stack.

DNS Blackhole Servers: Our RPZ zone generation from our MISP platform allows you to null route traffic that threatens your organization. Instead of letting end users infect your network you get the benefit of dropping request to bad locations.

Antivirus and HIDS Client: The Jigsaw Security HIDS client provides instant notification of activity that needs attention. Combined with Antivirus and you have a complete endpoint solution that ensures client safety.

VPN and Report Access: VPN services and integration. Remote access for your enterprise with security as a focus.

Date at Rest Encryption and Proprietary Encryption Solution: Jigsaw Security provides a complete encryption solution for data at rest and data in transit. Our encrypted drop zone solution and point to point encrypted file transfer solution synchronizes your files securely over public networks securely and safely while storing data encrypted while at rest. The only encrypted synchronization point to point server drop zone solution.

Cyber Insurance Options: Get covered against breaches and data theft with comprehensive cyber insurance. Affordable coverage for our clients that ensure that in the event of a corporate breach or employee theft, you are protected.

Additional services available...