Delivering game changing intelligence requires technology

 

Our partnership with the best in breed forensics, data security and encryption manufacturers enables iSG to deliver a unique risk management portfolio to our customers across the globe

 

logo-stack (002).jpg

Opentext (EnCase)

The gold standard in digital investigations and endpoint data security, Guidance provides a mission-critical foundation of applications that have been deployed on an estimated 33 million endpoints and work in concert with other leading enterprise technologies from companies such as Cisco, Intel, Box, Dropbox, Blue Coat Systems, and LogRhythm.

 

Carbon Black

Carbon Black has designed the most complete next-gen endpoint security platform, enabling organizations to stop the most attacks, see every threat, close security gaps, and evolve their defenses. The Cb Endpoint Security Platform helps organizations of all sizes replace legacy antivirus technology, lock down systems, and arm incident response teams with advanced tools to proactively hunt down threats.

 

SaltDNA

SaltDNA protects your right to privacy. We keep conversations between executives, customers and partners private. Whether you're texting, calling, or accessing data from a mobile device, SaltDNA gives you the tools to communicate globally with complete privacy. Prevents “man-in-the-middle” attacks.

With military-grade voice and messaging encryption, SaltIM prevents the monitoring of sensitive communications across public networks. Our global solution offers unlimited international calling for anonymous mobile communications and supports true Off-The-Record (OTR) conversations.

keeper.jpg

Keeper

KSI is a Zero-Knowledge security provider. The Keeper user is the only person that has full control over the encryption and decryption of their data. With Keeper, encryption and decryption occurs only on the user's device upon logging into the vault. Each individual record stored in the user's vault is encrypted with a 256-bit AES key that is randomly generated on the device. The record keys are protected by an additional key, called the Data Key. The Data Key is encrypted by a key derived on the device from the user's Master Password. Data stored at rest on the user's device is also encrypted by another key, called the Client Key. Secure record syncing between the user's devices is also encrypted at the network layer and routed through Keeper's Cloud Security Vault. This multi-tiered encryption model provides the most advanced data protection available in the industry.

 
HS-Logo-385_3.png

HyperSpace Security

Key Shadowing is a patented secret sharing technology that permits a master key to be created, used to protect data in flight or at rest,“shadowed” into any number of parts, and then destroyed. The master key is never persistently stored. When the data needs to be accessed, a pre-defined number of the shadows (current options are 2, 3, or 4) mustbe used to regenerate the master key.