DISRUPT Line of Products

Our DISRUPT line of products include systems that operate inline on networks to detect and disrupt attacks nullifying the threat to the network. DISRUPT is a concept of resetting connections when they are determined to be malicious in nature, redirecting malware traffic from known bad to known good sites to alert the end user of the infection attempt and providing a security platform to detect when systems on a network are infected or in the control of adversaries.

The DISRUPT products include IDS/IPS, Custom Built Proxy Servers, DNS RPZ Sinkhole Services and other technologies that consume our threat intelligence feeds and protect the end user from malicious attack through the method of interrupting the connection when an attempt is made to download bad content (protection through hashes), secondary payload installation (protection through disruption of a malware infection chain of events), DNS Sinkhole (the process of redirecting name resolution from harmful to safe data points) and the detection of these activities by security personnel to be able to focus on real threats instead of security console chatter.

DISRUPT PROXY

The DISRUPT proxy server is a Jigsaw product that uses Jigsaw Threat Feeds to disrupt request made through a proxy server to prevent infection, stop the theft of information and hide your users from identification through IP address masking, cookie collection and analysis and preventing direct Internet access by employees. In addition the proxy is capable of attribution of end users by forcing 2 factor authentication for access to Internet resources.

DISRUPT DNS

The DISRUPT DNS server prevents the lookup of bad known sites such as phishing sites to ensure users are not scammed by threat actors. Known and unknown bad sites are blocked based on content, IP address and domain name. End users that make request to known bad locations are easily identified so security personnel can then follow up with training, remediation or incident response. This system allows identification of bad destinations allowing you to concentrate security efforts on known bad request so you can respond to more incidents without wasting time and resources on false positives.

The DISRUPT line of products are available through Jigsaw as part of the Jigsaw Protection Model (also known as the JPM)

Contact: (800)447-2150 Ext. 1        To contact Jigsaw simply send a message in our chat window!

  • Facebook - Black Circle
  • Twitter - Black Circle
RSS Feed

© 2017-2018 Jigsaw Security Enterprise Inc.

Jigsaw Security Enterprise Inc is a SDVOSB - Service Connected Disabled Veteran Owned Small Business Jigsaw Security is an operator of WIMAX networks and is operating under license WQVC235 as a common carrier, non-common carrier and private communications operator. Jigsaw Security operates cable and satellite services. Courses may be provided by a third party authorized training partner in some cases. Some training is only available for cleared and US Citizens. Courses approved by the North Carolina Department of Public Safety Private Protective Services Board for licensing and CE credits. JPM program insurance is provided by an authorized Jigsaw Security Insurance Partner and is not underwritten by Jigsaw Security. For insurance information please contact our JPM program manager. Jigsaw Security operates a network through our NCBroadband brand.