Jigsaw Threat Mitigation Model
Jigsaw Security wins Hampton Roads Emerging Cyber Security Product of the Year Award - Read More Here
Jigsaw Security receives past performance rating of 97% on our previous 6 contracts. Jigsaw Security leads by example and we treat our customers as we would wish to be treated. It's how we do business!
Threat Intel shouldn't break the bank. Get our data, sensors and protection for less than a single sensor from our competition. Security needs to be effective, not costly!
About: Jigsaw Security is a fully licensed private investigative agency and private intelligence agency. We utilize big data solutions to connect data points in ways that are truly innovative and unique. Our intelligence system features the ability to fully extract and analyze over 190+ document and file format types and is constantly updating with open source, closed source and intelligence information from over 1200+ data sources. In short we protect our customers by providing them information about the latest threats, intelligence and information that will affect their core business. We do for business what the IC does for Government, we were born on the battlefield in Afghanistan and have created an inexpensive intelligence collection and dissemination platform for private industry using the tools and methods used in Government and intelligence agencies the world over. Let us show you how intelligence management can improve your business decision making using our Intel platform.
What we do... Fully managed DNS whole network protection
PeerBlock Home User
Home users can protect their workstations by installing PeerBlock and utilizing Jigsaw Security Threat Intel data. This solution is a cost effective and managed offering that cost $9.95 for up to 254 home user personal computers.
PiHole™ Home User
Home users can protect their entire network using the free PiHole™ solution. Subscriptions for our data ensure your entire network is protected from malware, ransomware and phishing attacks. Pricing is $9.95 for up to 254 home user personal computers.
Managed security providers can resell Jigsaw Security data in a fully managed MISP, Hosted DNS servers and full Jigsaw Analytic Platform deployment. This is a cloud solution allowing security vendors to resell our data and services.
Corporate Users & MSSP's Fully Hosted Solution (MISP, PiHole™ & Peerblock Option)
Fully managed DNS appliance that stops 99.9% of all malware and phishing threats
Customer Dashboard showing DNS and IP activity
Simple installation that is cloud based, set your DNS servers to our cloud solution and you are protected
Threat Intelligence and Jigsaw SOC Support
Can support any number of users - Our solution scales
Continually monitoring to be compliant with CMMC
Automatic updates, as new threats are discovered, Jigsaw updates your DNS to drop, block or monitor malicious activity
Whole network protection with no needs for agents that slow down your computers
Inexpensive solution that stops hackers by denying them access to malicious content
Built on PiHole™ sensors using Jigsaw Security data
There is a reason 7 of the top 10 MSSP's in the US are using at least 1 of our solutions. Jigsaw Security has not had a single customer infection since 2014! Not one!
Jigsaw Threat Mitigation Model - Protecting the whole enterprise - Not just your network!
The Jigsaw Threat Mitigation Model is a service mark of Jigsaw Security Enterprise Incorporated 2007-2020 All Rights Reserved
The Jigsaw Threat Mitigation Model is a method of protecting networks utilizing intelligence products, analytics, human elements and more. It is the practical application of intelligence models to ensure that networks and devices remain secure, persons and facilities are adequately secured against many types of threats to include non cyber based attack vectors that are often overlooked by IT security personnel. In short we do not believe that you should stovepipe your security operations. Security in order to be effective has to take into account all aspects of security to include physical, personnel, facilities, cyber as well as effective policies and procedures both in times of normal and abnormal operations. We are not an IT based company but rather a true security company.