Delivering game changing intelligence requires technology


Our partnership with the best in breed forensics,cybersecurity and mobile encryption manufacturers enables iSG to deliver a unique risk management portfolio to our customers across the globe

iSG was chosen as only 1 of 3 global partners to participate in the Guidance Software 2016 year kickoff. Our founder, Bob Henderson, is on stage and provides some insight into what makes us unique.

logo-stack (002).jpg

Guidance Software (EnCase)

The gold standard in digital investigations and endpoint data security, Guidance provides a mission-critical foundation of applications that have been deployed on an estimated 33 million endpoints and work in concert with other leading enterprise technologies from companies such as Cisco, Intel, Box, Dropbox, Blue Coat Systems, and LogRhythm.


Carbon Black

Carbon Black has designed the most complete next-gen endpoint security platform, enabling organizations to stop the most attacks, see every threat, close security gaps, and evolve their defenses. The Cb Endpoint Security Platform helps organizations of all sizes replace legacy antivirus technology, lock down systems, and arm incident response teams with advanced tools to proactively hunt down threats.



SaltDNA protects your right to privacy. We keep conversations between executives, customers and partners private. Whether you're texting, calling, or accessing data from a mobile device, SaltDNA gives you the tools to communicate globally with complete privacy. Prevents “man-in-the-middle” attacks.

With military-grade voice and messaging encryption, SaltIM prevents the monitoring of sensitive communications across public networks. Our global solution offers unlimited international calling for anonymous mobile communications and supports true Off-The-Record (OTR) conversations.


HyperSpace Security

Key Shadowing is a patented secret sharing technology that permits a master key to be created, used to protect data in flight or at rest,“shadowed” into any number of parts, and then destroyed. The master key is never persistently stored. When the data needs to be accessed, a pre-defined number of the shadows (current options are 2, 3, or 4) mustbe used to regenerate the master key.